Legal Regulation of Computer Crime: Cyber Security Analysis

Verified

Added on  2022/08/14

|4
|513
|27
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: LEGAL REG COMPILANCE INVERST
Legal Reg Compilance Inverst
Name of the Student
Name of the University
Authors Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1LEGAL REG COMPILANCE INVERST
Computer crime
Computer crime is considered to be an activity, which is executed by a conversant
computer operator that in some cases referred to as a hacker, who unlawfully looks or steals the
personal data of a person or an organization. Computer crimes are also acknowledged as cyber-
crime, hi-tech crime, e-crime or electronic crime. There are some cases in which this individual
or group of persons may be mischievous and abolish or corrupt the data files or the computer
(Yar & Steinmetz, 2019).
Examples
Recently, different kinds of computer crimes have been observed. Among these crimes
the very common crimes are Cyberbullying or Cyber stalking and Fraud. The brief description of
both these crimes are discussed below:
Cyberbullying or Cyber stalking: If a person posts improper or unwanted things about
another person or in any ways harasses people through SMS, e-mails or IMs is called a
cyberbully or cyber stalker. By doing these things, a cyberbully usually tries to harm the
reputation of a person by posting wrong information or posts such information which the
person does not want to inform other. In order to hide the identity, cyberbully posts
information or comments by through fake accounts. Several social media platforms, such
as twitter and Facebook are common places to harass other people (Kircaburun, Jonason
& Griffiths, 2018).
Fraud: In order to cheat individuals or organizations of resources computers, the Internet
along with devices and services are used which is known as computer fraud. Unlawful
activities related to computer which include social engineering, DDoS, phishing and virus
Document Page
2LEGAL REG COMPILANCE INVERST
attacks are some instances that are used to interrupt services or gain access to the fund of
another.
Available laws
In order to prosecute cybercrimes and amend the prevailing computer fraud law, a cyber-
security bill was enacted by the US in 1986 which is known as Computer Fraud and Abuse Act
(CFAA) and included in the Comprehensive Crime Control Act of 1984. This law specifically
forbids a person, who has no authority to open a computer (Finklea & Theohary, 2015).
Document Page
3LEGAL REG COMPILANCE INVERST
References
Finklea, K. M., & Theohary, C. A. (2015, January). Cybercrime: Conceptual issues for congress
and US law enforcement. Congressional Research Service, Library of Congress.
Kircaburun, K., Jonason, P. K., & Griffiths, M. D. (2018). The Dark Tetrad traits and
problematic social media use: The mediating role of cyberbullying and
cyberstalking. Personality and Individual Differences, 135, 264-269.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. SAGE Publications Limited.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]