Legal Regulation of Computer Crime: Cyber Security Analysis
VerifiedAdded on 2022/08/14
|4
|513
|27
Report
AI Summary
This report delves into the realm of computer crime, exploring various facets such as cyberbullying and fraud. It begins by defining computer crime and its prevalence, particularly focusing on cyberbullying, where individuals use digital platforms to harass others, and fraud, which involves the use of...
Read More
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: LEGAL REG COMPILANCE INVERST
Legal Reg Compilance Inverst
Name of the Student
Name of the University
Authors Note
Legal Reg Compilance Inverst
Name of the Student
Name of the University
Authors Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1LEGAL REG COMPILANCE INVERST
Computer crime
Computer crime is considered to be an activity, which is executed by a conversant
computer operator that in some cases referred to as a hacker, who unlawfully looks or steals the
personal data of a person or an organization. Computer crimes are also acknowledged as cyber-
crime, hi-tech crime, e-crime or electronic crime. There are some cases in which this individual
or group of persons may be mischievous and abolish or corrupt the data files or the computer
(Yar & Steinmetz, 2019).
Examples
Recently, different kinds of computer crimes have been observed. Among these crimes
the very common crimes are Cyberbullying or Cyber stalking and Fraud. The brief description of
both these crimes are discussed below:
Cyberbullying or Cyber stalking: If a person posts improper or unwanted things about
another person or in any ways harasses people through SMS, e-mails or IMs is called a
cyberbully or cyber stalker. By doing these things, a cyberbully usually tries to harm the
reputation of a person by posting wrong information or posts such information which the
person does not want to inform other. In order to hide the identity, cyberbully posts
information or comments by through fake accounts. Several social media platforms, such
as twitter and Facebook are common places to harass other people (Kircaburun, Jonason
& Griffiths, 2018).
Fraud: In order to cheat individuals or organizations of resources computers, the Internet
along with devices and services are used which is known as computer fraud. Unlawful
activities related to computer which include social engineering, DDoS, phishing and virus
Computer crime
Computer crime is considered to be an activity, which is executed by a conversant
computer operator that in some cases referred to as a hacker, who unlawfully looks or steals the
personal data of a person or an organization. Computer crimes are also acknowledged as cyber-
crime, hi-tech crime, e-crime or electronic crime. There are some cases in which this individual
or group of persons may be mischievous and abolish or corrupt the data files or the computer
(Yar & Steinmetz, 2019).
Examples
Recently, different kinds of computer crimes have been observed. Among these crimes
the very common crimes are Cyberbullying or Cyber stalking and Fraud. The brief description of
both these crimes are discussed below:
Cyberbullying or Cyber stalking: If a person posts improper or unwanted things about
another person or in any ways harasses people through SMS, e-mails or IMs is called a
cyberbully or cyber stalker. By doing these things, a cyberbully usually tries to harm the
reputation of a person by posting wrong information or posts such information which the
person does not want to inform other. In order to hide the identity, cyberbully posts
information or comments by through fake accounts. Several social media platforms, such
as twitter and Facebook are common places to harass other people (Kircaburun, Jonason
& Griffiths, 2018).
Fraud: In order to cheat individuals or organizations of resources computers, the Internet
along with devices and services are used which is known as computer fraud. Unlawful
activities related to computer which include social engineering, DDoS, phishing and virus

2LEGAL REG COMPILANCE INVERST
attacks are some instances that are used to interrupt services or gain access to the fund of
another.
Available laws
In order to prosecute cybercrimes and amend the prevailing computer fraud law, a cyber-
security bill was enacted by the US in 1986 which is known as Computer Fraud and Abuse Act
(CFAA) and included in the Comprehensive Crime Control Act of 1984. This law specifically
forbids a person, who has no authority to open a computer (Finklea & Theohary, 2015).
attacks are some instances that are used to interrupt services or gain access to the fund of
another.
Available laws
In order to prosecute cybercrimes and amend the prevailing computer fraud law, a cyber-
security bill was enacted by the US in 1986 which is known as Computer Fraud and Abuse Act
(CFAA) and included in the Comprehensive Crime Control Act of 1984. This law specifically
forbids a person, who has no authority to open a computer (Finklea & Theohary, 2015).

3LEGAL REG COMPILANCE INVERST
References
Finklea, K. M., & Theohary, C. A. (2015, January). Cybercrime: Conceptual issues for congress
and US law enforcement. Congressional Research Service, Library of Congress.
Kircaburun, K., Jonason, P. K., & Griffiths, M. D. (2018). The Dark Tetrad traits and
problematic social media use: The mediating role of cyberbullying and
cyberstalking. Personality and Individual Differences, 135, 264-269.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. SAGE Publications Limited.
References
Finklea, K. M., & Theohary, C. A. (2015, January). Cybercrime: Conceptual issues for congress
and US law enforcement. Congressional Research Service, Library of Congress.
Kircaburun, K., Jonason, P. K., & Griffiths, M. D. (2018). The Dark Tetrad traits and
problematic social media use: The mediating role of cyberbullying and
cyberstalking. Personality and Individual Differences, 135, 264-269.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. SAGE Publications Limited.
1 out of 4

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.