Computer Crimes, Characteristics And More Common Forms In Which They Commit

0 / 5. 0

Computer crimes, characteristics and more common forms in which they commit

Introduction

To begin crime on the Internet, it is aimed at the exploitation of information and communication networks taking advantage of the virtues of the non -existence of geographical barriers as well as the displacement of intangible and volatile data. Also citing the author will have this one considers that with the expression "crime through computers", all acts are alluded to, unlawful according to the current criminal law made with the use of an automatic data processing equipment. 

Developing

In the same order of ideas, the definition established by Sarzana is also presented, citing Téllez, who establishes that computer crimes include “any criminogen behavior in which the computer has been involved as material or as an object of criminogenic action,or like mere symbol ". 

The most common crimes

  • The crimes of impersonation of identity: this is carried out when a person passes through another individual, and results in the scam, obtaining data, among others.
  • Extortion: This is considered a crime and happens when a person exerts pressure to an individual in order to force him to act in a way, it should be noted that such extortion can consist of threats, intimidations or aggressions.
  • HACKEO: It is that occupation that aims to compromise those digital devices such as computers, smartphones tablets and even entire networks and through this confidential information is steal and can also affect the businesses of a company.
  • Harassment: It occurs through the activity on the Internet to disturb or harass one or several people through personal attacks, dissemination of confidential or false information.
  • Child pornography: it is another of the most common crimes in these types of crimes, since through the Internet the distribution of child pornography is carried out.

Computer crimes

Computer crimes are all those illegal, criminal or unauthorized actions that make use of electronic devices and the Internet, in order to violate, impair or damage the assets, patrimonial or not, of third parties or entities. Also known as cyber or electronic crimes, they cover a broad spectrum of illegal actions of different nature. Everyone has in common information technologies, whether the environment or objective itself. 

In this context, computer criminals are called active subjects. On the other hand, the persons or entities that are victims of such crimes are called passive subjects. Taking Valdés into consideration, it conceptualizes the computer crime in a typical and atypical way, understanding by the first “the typical, unlawful and guilty behaviors in which computers are taken as instrument or end” and by the second “illegal attitudes in whichThey have computers as an instrument or end ".

Characteristic:

  • They are white -collar criminal behaviors, while only certain number of people with certain knowledge can commit them.
  • They are occupational actions because they are often carried out when the subject is at work.
  • They are opportunity actions because an occasion created or highly intensified in the world of functions and organizations of the technological and economic system is used.
  • They cause serious economic losses for those affected and almost always produce benefits of more than five figures to those who carry them out.
  • They offer ease and space facilities, since in thousandths of second and without the necessary physical presence they can be committed.
  • There are many cases and few complaints, all due to the lack of legal regulation at international level.
  • They are extremely sophisticated and frequent in the military field.
  • They present great difficulties for checking, this due to their same technical character.
  • They are mostly malicious or intentional, although there are also many guilty or reckless nature and sometimes go beyond intention.
  • They offer facilities for their commission to minors.
  • They tend to proliferate more and more, so they require an urgent international legal regulation.

conclusion

Finally, this crime of attacking the security and integrity of a person has great weight, more and more cases are presented about this situation in which many end up being affected, either by hacking, harassment or extortion, andIn the worst case to promote child pornography, it is for them that it is important to act against this problem and denounce, since disseminating, and revealing the identity of the person is a fatal fact, which harms the innocent.

Free Computer Crimes, Characteristics And More Common Forms In Which They Commit Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...

Comments

Leave feedback

Your email address will not be published. Required fields are marked *