Categories of Cybercrime
Autor: khalaf • October 27, 2013 • Essay • 564 Words (3 Pages) • 1,044 Views
Nowadays crime is a word that always appears in news. Crimes refer to any violation of law or the commission of an act forbidden by law. Crime and criminality have unified with human since first civilization. Cybercrime is a new type of crime that just occurs since 1820 after computer invented. There are a lot of definitions for cybercrime. According to Wikipedia.com cybercrime also known as computer crime that refers to any crime that involves a computer and a network. Cybercrime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. Cybercrime also use old fashion crimes that been conducted with the access of Internet. For example hate crimes, telemarketing Internet fraud, identity theft, and credit card account thefts. In simple word, cybercrime can be defined as any violence action that been conducted by using computer or other devices with the access of internet. There are three major categories of cybercrimes which are crimes against the person, property and the government.
The first category of cybercrimes is cybercrime against person. This type of crime involved harassment via email or cyber-stalking. Cyber Stalking means following the moves of an individual's activity over internet. It can be done with the help of many ways such as e-mail, chat rooms, user net groups while, harassment are included sexual, racial, religious, or others. This crime always happens to women and teenagers as victim. There is a case where a girl was lured to a hotel through the Facebook by a man, attempted to rape her. Fortunately she was rescued by pedestrian that heard she cried.
Second category of cybercrimes is that of cybercrimes against all forms of property. Computer vandalism and stealing information or property are included in this category. Computer vandalism normally occurs by computer virus that is small program spread from one computer to another computer and starting interferes with
...