AskEssays.com - Discover essay samples

Computer Crime and its Effects on the World

4.9 of 5.0 (107 reviews)

Contains
741 words
Category
Science

Computer Crime and its Effects on the World Page 1
Computer Crime and its Effects on the World Page 2
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Computer Crime and its Effects on the World




Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers, cyber porn and various other crimes that have a drastic affect on the society and the institutions that each of us hold to keep our global society running.
To first understand computer crime one must understand first what crime is. According to Diana Kendall, ?crime is a behavior that violates criminal law and is punishable with fines, jail or other sanctions?(Kendall 1999; 161). Yet since computer technology is so new it has really no laws to govern it. A law is formal norms that are enforced, norms being established rules of behavior. Many of the crimes committed on computers often times go unpunished. As stated by David Pitchford in the London journal Focus when writing on pornography on the Internet, ? the only way illegal pornographers can be caught is through chance leads, tip-offs and telephone tracing? (Focus 1995; p10-12). Many of the crimes that are also committed on computers via the Internet are very new also. New subcultures have formed around the Internet for the possibilities it brings. Computer crime despite the many problems it has brought has also brought some needed social controls to the Internet and as stated before some laws have been formed to protect many of the institutions that because of computer crime have become targets for criminals.
Body
Now that I have briefly explained computer crime, I will go into further depth into explaining computer crime from the different sociological perspective theories. To start with is the integrationist perspective looks at of society as the sum of the interactions of individuals and groups? (Kendall; 17). Many of those that commit computer crimes are hackers or people who hack into computer systems for both fun and for gaining access to information. They have formed their own subcultures and hold many different beliefs about the information that is stored in personal computers. Said best by J. Thomas McEwen in the article Computer Ethics many hackers believe that ?computerized data [is] free and should be accessible to anyone (McEwen 1991; 8-11). A subculture is a group a group of people who share a different set of beliefs that differ significantly from the larger society (Kendall; 604). Besides forming subcultures, many hackers have learned their behavior from other hackers. The behavior they learn seems to lend credibility to Edwin Sutherlands Differential Association Theory ?which states that individuals are more likely to deviate from societal norms when they frequently associate with persons who are more favorable toward deviance than conformity (Kendall; 165). According to McEwen most ?young computer hackers beliefs come from association with other hackers, not family members and teachers (McEwen 1991; 8-11). Besides the fact that many hackers learn, their ways from other hackers many after arrested are formally labeled as a hacker and a deviant, those who violate cultural norms and beliefs (Kendall; 598) The labeling theory suggests that deviants are those have been labeled as such by others (Kendall; 166). In theory than, after the person has been arrested they than assume that label and act accordingly. As written by David Pitchford in the London magazine, Focus, one hacker after being arrested was not deterred, he instead became a more active and in ?92 became cyberspaces first megastar Pitchford; pages 10-13).? It was only after his second arrest that he stopped offences.
Besides the interactionist, perspective on computer crime is the conflict theory. ?The conflict theory states that people in power maintain their advantage by using the law to protect their own interest.? (Kendall; 168). Under the conflict perspective, hackers and other computer criminals are seen as deviant because many hackers break into large companies for the ?mindless desire for glory (Pitchford; pages 10-13). ? However besides hackers lack of any real criminal desires they are still seen as deviant because they blatantly while doing their hacking.
Since the Internet is a global tool, many of the crimes that are committed extend beyond national borders. For this reason the advent of ...

You are currently seeing 50% of this paper.

You're seeing 741 words of 1482.

Similar essays


Aluminum

is a very common metal, still used widely today. It was first discovered by Hans Christian Oersted at Denmark in 1825. Oersted reacted aluminum chloride with potassium amalgam. Heating these two substances under reduced pressure caused the mercury to boil away, leaving aluminum metal as the final solution. Ancient Greeks a...

138 reviews
Download
Intranet

Internet has been the most popular and widely used tool for fetching information on the net. However, another information system is surging in popularity, especially among business organizations and large corporations. The information system is called the . What is an ? What is not an ? And what is its role in the information age? These questio...

158 reviews
Download
No representation of allocentric space has been found in the

" brain" Critically evaluate this statement. The question of how animals and humans navigate is a fundamental research problem upon which there has been much experimentation and debate, and so it is necessary to refine the title to a specific point. As Tolman (1948) established that rats can solve spatial problems too complex for a...

101 reviews
Download
Darwinism 2

Darwinism Darwinism, a scientific theory that supported the belief of evolution, was manipulated and applied to different areas of life, and thus it became the shaping force in European thought in the last half of the nineteenth century. Darwin, through observation of organisms, determined that a system of natural selection controlled th...

30 reviews
Download
The Greenhouse Effect

The greenhouse effect occurs when gases such as methane, carbon dioxide, nitrogen oxide and CFCs trap heat in the atmosphere by acting as a pane of glass in a car. _The glass_ lets the sun light in to make heat but when the heat tries to get out the gases absorb the heat. Holding this heat in causes heat waves, droughts and...

115 reviews
Download
Atsisiųsti šį darbą