Sample Essay on:
Why Study Computer Crime?

Here is the synopsis of our sample research paper on Why Study Computer Crime?. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

A 3 page paper examining why the study of computer crime is valuable. The US Department of Justice divides computer crime into three broad areas. The area is defined according to whether the computer is an object of a crime; a subject of a crime; or an instrument of a crime. It is necessary to study computer crime to prevent computer crime in any of these three areas, either as a user or an administrator. Bibliography lists 6 sources.

Page Count:

3 pages (~225 words per page)

File: CC6_KSitCompCrime.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

common complaints about putting juvenile offenders in a formal prison setting is that a young person with one serious mistake enters but is likely to emerge knowing far too much about how to be a next-level criminal. Much the same can be said about studying computer crime, but there is a twist: hackers and others know systems and their operation very well. Those who would thwart them - or merely operate (or use) a website need to know those systems equally well and how to protect them. The US Department of Justice divides computer crime into three broad areas (Huang, Radkowski and Roman, 2007). The area is defined according to whether the computer is an object of a crime; a subject of a crime; or an instrument of a crime (Huang, Radkowski and Roman, 2007). It is necessary to study computer crime to prevent computer crime in any of these three areas. The Categories A computer can be the object of a crime in instances such as those involving the theft of hardware or software. It can be the subject of a crime when it is the site of any damage caused by incidence of computer crime. This includes virus attacks, spam, worms, denial of service (DOS) attacks or other attacks preventing the computer from operating as it is intended. The computer is an instrument of crime when it is used to commit crime, obviously. This category includes identity theft, child pornography, copyright infringement and similar crimes (Huang, Radkowski and Roman, 2007). Benefits of Training McQuade (2007) states, "Higher education can and must help to prepare graduates who can keep ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now