Trends in Computer Crime

نویسندگان

  • Richard E. Overill
  • Steven Lipner
چکیده

SCOPE AND DEFINITIONS It is convenient to define computer crime as any criminal act which involves one or more computers either as the object of the crime or as accessories in its commission. Computer crime may then be subdivided into computer related crime (CRC) and computer assisted crime (CAC). In the former, the computer or its contents is the subject of the criminal act (eg hacking or denial of service attacks), while in the latter, the computer is merely an accessory in the commission of a crime which could at least in principle have been committed by other means (eg financial fraud or embezzlement). In this article, those areas of CRC and CAC covered by the UK Computer Misuse Act 1990 (CMA90) will be broadly surveyed; essentially, the Basic Hacking offence" and the Unauthorised Modification offence of CMA90 relate to CRC, while the Ulterior Intent offence relates to CAC.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The 'inverse CSI effect': further evidence from e-crime data

Analysis of incidence and impact trends mined from recent computer crime survey data has yielded circumstantial evidence in support of the previously proposed concept of the ‘inverse CSI effect’, operating in the cyber-crime domain. The implications of this finding for digital forensics and e-crime investigations are discussed.

متن کامل

An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the c...

متن کامل

A Historical Review of Computer User's Illegal Behavior Based on Containment Theory

The aim of this study is to explore research trends in computer crime and cybercrime from 1968 to 2009. The findings of the current study will provide some insight into scholarly activity related to computer crime and cybercrime and will be useful in tracking computer user’s illegal behavior research trends. Our other goal is to explore the range of the theoretical lens that can be used to unde...

متن کامل

An Improved K-Means with Artificial Bee Colony Algorithm for Clustering Crimes

Crime detection is one of the major issues in the field of criminology. In fact, criminology includes knowing the details of a crime and its intangible relations with the offender. In spite of the enormous amount of data on offenses and offenders, and the complex and intangible semantic relationships between this information, criminology has become one of the most important areas in the field o...

متن کامل

Introducing New Trends for Persian CAPTCHA

To distinguish between human user and computer program to enhance security, a popular test called CAPTCHA is used on Web. CAPTCHA has an important role in preventing Denial Of Service (DOS) attacks in computer networks. There are many different types of CAPTCHA in different languages. Due to the expansion of Persian-language and documents on internet, creating a suitable Persian CAPTCHA seems t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007