The Common Forms Of Cyber Theft

1373 Words6 Pages
Discussing the terms of cybercrimes can be founded in several sources. Many schoolers have defined the term of cybercrimes in general sense and narrow sense. The term cybercrime in a narrow sense is “Any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them” (Gercke, 2012). Also it has been defined in a broader sense as “illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network” (Gercke, 2012). Also it has been defined as a criminal activity including the information technology
…show more content…
These devices cause trouble to the victim. The. B. cyber harassment is similar in general to cyber-bullying. However, the criminal who use cyber harassment sends unwanted emails to the victim. These emails usually are sent to the victim’s junk mail. C. cyber-stalking simply when the victim protect firms from harassment. D. hacking is always related to the internet. The unauthorized closure of victims’ sensitive and confidential information is related to hacking. The unauthorized accesses is usually done by a user who knows the organization system vluerbitities. E. virus are designed to destroy victims’ confidential data in their computers. Hackers usually use virus as a tool to reach victims (Moafa, 2014)
This paper focuses on the cybercrime that have been charged in 2010 and received a sentence. In focusing on these crimes, the consequences of the crimes are analyzed and other features such as the extent of the cybercrime, the sources of the crime, target of the crime, the harms inflicted, the economic impact of the crimes and the possible punishment. The structure of this paper paper includes three parts which are literature review, data collection, and the presentation of the results and discussing the conclusion. Figure: 1 shows the paper Procedure of Study. Figure 1: Procedure of Study

Literature Review:
Cybercrime has developed from simple to complex situations over the years, and those in charge of the investigations have done everything
Get Access