Social Implications of Computer Technology: Cybercrimes Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Cybercrime, returning to a definition provided by Toby Finnie, Tom Petee, and John Jarvis, refers to any crime that involves a computer and a network, where a computer may or may not have played an instrumental part in the commission of crime (7).

The term cyber crime or cyber related crime would be used to refer to criminal act like that of identity theft, fraud, security breach, child pornography (Finnie, Petee, and Jarvis 7). Many of the techniques involve the use of a computer or a network, but many more techniques have nothing to do with computers other than information stored in text files on a computer’s hard drive.

To address cyber crime and cyber related crimes further, a distinction is made between computers as targets of crime and computer-facilitated crime.

While the former refers to crimes targeting computers or other electronic channels as such and include acts like unauthorized entry into computer systems, vandalism, virus attacks, or warfare offensives, so called computer-facilitated crimes are in fact “traditional crimes that can be or have been committed by using other means of perpetration which are now carried out through an Internet based computer-related venue (e.g. email, newsgroups, other networks) or other technological computing advancement”; or, to put in other words, crimes that use the computer as a medium to commit crimes (Finnie, Petee, and Jarvis 8).

Computer-facilitated crimes can be more systematically classified under three main traditional categories of crime: against persons, against property, and against public order and public interest.

In reading the discussion above it becomes clear that the term cybercrime actually refers to computer-related crime; however, some consider computer crime to be a subdivision of cybercrime that warrants its own definition and understanding.

The term ‘cyberspace’ became popular descriptor of the mentally constructed virtual environment within which networked computer activity takes place. ‘Cybercrime’ broadly describes the crimes that take place within that space and the term has come to symbolize insecurity and risk online.

By itself, cybercrime is fairly meaningless because it tends to be used metaphorically and emotively rather than scientifically or legally, usually to signify the occurrence of harmful behavior that is somehow related to the misuse of a networked computer system (Finnie, Petee, and Jarvis 10).

Largely an invention of the media, ‘cybercrime’ originally had no specific reference point in law and the offending that did become associated with the term was a rather narrow legal construction based upon concerns about hacking. In fact, many of the so-called cybercrimes that have caused concern over the past decade are not ethically crimes in criminal law.

However, regardless of its merits and demerits, the term ‘cybercrime’ has entered the public parlance and we are stuck with it. It is argued that the term has a greater meaning if we construct it in terms of the transformation of criminal or harmful behavior by networked technology, rather than simply the behavior itself.

This is an interesting happenstance within the context of transformation thesis, because although the contemporary meaning of ‘cyber’ is firmly linked to technological innovation, its origins lie in the Greek Kubernetes, which is also the root of the word ‘govern’.

More by happenstance than plan, the word cyber and crime interrelates linguistically. This linkage becomes more significant if we understand cybercrimes as the crimes which are mediated (governed) by networked technology and not just computer.

Works Cited

Finnie, Toby, Petee Tom, and Jarvis John. The Future Challenges of Cybercrime: Volume 5 Proceedings of the Futures Working Group. Quantico, Virginia 2010. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, December 11). Social Implications of Computer Technology: Cybercrimes. https://ivypanda.com/essays/social-implications-of-computer-technology-cybercrime-and-cyber-related-crimes/

Work Cited

"Social Implications of Computer Technology: Cybercrimes." IvyPanda, 11 Dec. 2018, ivypanda.com/essays/social-implications-of-computer-technology-cybercrime-and-cyber-related-crimes/.

References

IvyPanda. (2018) 'Social Implications of Computer Technology: Cybercrimes'. 11 December.

References

IvyPanda. 2018. "Social Implications of Computer Technology: Cybercrimes." December 11, 2018. https://ivypanda.com/essays/social-implications-of-computer-technology-cybercrime-and-cyber-related-crimes/.

1. IvyPanda. "Social Implications of Computer Technology: Cybercrimes." December 11, 2018. https://ivypanda.com/essays/social-implications-of-computer-technology-cybercrime-and-cyber-related-crimes/.


Bibliography


IvyPanda. "Social Implications of Computer Technology: Cybercrimes." December 11, 2018. https://ivypanda.com/essays/social-implications-of-computer-technology-cybercrime-and-cyber-related-crimes/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1