Reychele’s Blog
Just another WordPress.com weblog

Chapter Title: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace

Chapter Title: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“One recent form of criminal activity that seems potentially to border on computer crime is a criminal act involving the act of digital telephony. Basse points out that in the use of cellular phones, a popular technique for avoiding charges is “cloning” – i.e. reprogramming one’s cellular phone to transmit another customer’s number. When true “computer telephony” (the merging of computers and telephones, also known as Internet phones) arrives, we may need to re-examine our proposed definition of computer crime.”

Learning Expectations:

1. To know what is the Boundaries of Computer Crime.
2. To know if we really need a category of computer crime.
3. To know what is Descriptive categories of computer crime.
4. To know the three types of computer crime.
5. To know why computer crime as a descriptive category crime.

Review:

Even though concerns about crimes involving the use of computer technology have received considerable attention in the popular press as well as in certain scholarly publications, the criteria used by the news reporters, computer ethicist and legal analyst for determining what exactly constitutes a computer crime has been neither clear or nor consistent.

Based on concerns raised by Gotterbarn and other critics, we can reasonably ask whether having a separate category of computer crime is necessary or even useful. It is perhaps also worth noting that some critics have pointed out that crimes of diverse types are committed in many different sectors, but we don’t have separate categories for crimes committed in each of those areas. So it would certainly seem reasonable for these critics to ask why we need a separate category of crime for criminal acts involving computer technology.

Arguments for having a category of computer crime can be advanced from least three different perspectives: legal, moral and information and descriptive. We consider arguments for each, beginning with a look at computer crime as a separate legal category. From a legal perspective, computer crime might be viewed as a useful category for prosecuting certain kinds of crimes.

At the outset, one might reasonably ask what the value would be in pursuing questions about computer crime from the point of view of a descriptive category. We can also see then, why our existing laws and policies are not always able to extend to cover adequately at least certain kind of crimes involving computers.
Learning’s/Insights:

• Software Piracy – using computer technology to produce one or more authorized copies of propriety computer software, distribute unauthorized software or make copies of that software available for distinction over a computer network.
• Electronic Break Ins – using computer technology to gain unauthorized access.
• Computer Sabotage – using computer technology to unleash one or more programs.

Integrative Questions:

1. What is Computer Sabotage?
2. What is Software Piracy?
3. What is Electronic Break Ins?
4. What are the three types of computer crime?
5. Do we need a Category of Computer Crime?

No Responses to “Chapter Title: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace”

Leave a comment