Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2016 | OriginalPaper | Chapter

8. Computer Crimes

Author : Joseph Migga Kizza

Published in: Ethics in Computing

Publisher: Springer International Publishing

Abstract

This chapter surveys the history and examples of computer crimes, their types, costs to society, and strategies of detection and prevention. In the discussion, it is noted that a great number of computer attacks fall into two categories, penetration and denial-of-service attacks, and these are discussed in depth. Attack motives are also discussed. Are nations, businesses, and individuals prepared for computer attacks? Are they ready to pay the price? We look for answers to these questions as we ponder the costs and consequences of computer crimes. We note also that although it is difficult to estimate the actual costs of e-attacks on physical system resources, progress is being made for better and more accurate estimates. An in-depth discussion of the social and ethical consequences that include psychological effects, moral decay, loss of privacy, and loss of trust follows. We end the chapter with recommendations for educating users of computing devices in computer ethics. The need to educate the user to be aware of possible sources of computer crimes and what to do if and when one becomes a victim of these crimes is stressed. It is noted that education can go a long way in reducing computer crimes if the users take crime preventive steps every time they use the computer and computer-related technologies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Kizza JM (2011) Computer network security and cyber ethics, 3rd edn. McFarland, Jefferson Kizza JM (2011) Computer network security and cyber ethics, 3rd edn. McFarland, Jefferson
3.
go back to reference Dictionary.com. http://​www.​dictionary.​com/​browse/​virus Dictionary.com. http://​www.​dictionary.​com/​browse/​virus
4.
go back to reference Forchet K (1994) Computer security management. Boyd & Fraser, Danvers Forchet K (1994) Computer security management. Boyd & Fraser, Danvers
6.
go back to reference Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York
8.
go back to reference Levy S (1984) Hackers: heroes of the computer revolution. Anchor Press/Doubleday, Garden City Levy S (1984) Hackers: heroes of the computer revolution. Anchor Press/Doubleday, Garden City
9.
go back to reference Security in cyberspace: U.S. senate permanent subcommittee on investigations. June 5, 1996 Security in cyberspace: U.S. senate permanent subcommittee on investigations. June 5, 1996
10.
go back to reference Christensen J (1999) Bracing for guerilla warfare in cyberspace. CNN Interactive, 6 April, 1999 Christensen J (1999) Bracing for guerilla warfare in cyberspace. CNN Interactive, 6 April, 1999
14.
go back to reference Trigaux R (1998) Hidden dangers. St. Petersburg Times, 16 June, 1998 Trigaux R (1998) Hidden dangers. St. Petersburg Times, 16 June, 1998
go back to reference Anderson KE (1997) Criminal threats to business on the Internet: a white paper. Global Technology Research, June 23, 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage Anderson KE (1997) Criminal threats to business on the Internet: a white paper. Global Technology Research, June 23, 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage
go back to reference Chaturvedi A et al (2000) Fighting the Wily Hacker: modeling information security issues for online financial institutions using the SEAS environment. INET JAPAN 2000 Conference, July 18, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry Chaturvedi A et al (2000) Fighting the Wily Hacker: modeling information security issues for online financial institutions using the SEAS environment. INET JAPAN 2000 Conference, July 18, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry
go back to reference Computer Security Institute/Federal Bureau of Investigation (1998) Annual cost of computer crime rise alarmingly: organizations report $136 million in losses, Press Release, Computer Security Institute, March 4, 1998. This is a summary of the 1998 survey on computer crime Computer Security Institute/Federal Bureau of Investigation (1998) Annual cost of computer crime rise alarmingly: organizations report $136 million in losses, Press Release, Computer Security Institute, March 4, 1998. This is a summary of the 1998 survey on computer crime
go back to reference Counterintelligence Office of the Defense Investigative Service (1996) Industry CI trends, OASDPA/96-S-1287, December 26, 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors Counterintelligence Office of the Defense Investigative Service (1996) Industry CI trends, OASDPA/96-S-1287, December 26, 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors
go back to reference General Accounting Office (GAO) (1996) GAO executive report B-266140. Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security General Accounting Office (GAO) (1996) GAO executive report B-266140. Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security
go back to reference Grampp F, Morris R (1984) Unix operating system security. AT&T Bell Lab Tech J 63(8, Part 2):1649 Grampp F, Morris R (1984) Unix operating system security. AT&T Bell Lab Tech J 63(8, Part 2):1649
go back to reference Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18 CrossRef Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18 CrossRef
go back to reference Kapor M (1991) Civil liberties in cyberspace: when does hacking turn from an exercise of civil liberties into crime? Scientific American, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study Kapor M (1991) Civil liberties in cyberspace: when does hacking turn from an exercise of civil liberties into crime? Scientific American, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study
go back to reference Kizza JM (1999) Civilizing the internet: global concerns and efforts toward regulation. McFarland, Jefferson Kizza JM (1999) Civilizing the internet: global concerns and efforts toward regulation. McFarland, Jefferson
go back to reference National Counterintelligence Center (1998) Annual report to congress on foreign economic collection and industrial espionage, Annual Report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare National Counterintelligence Center (1998) Annual report to congress on foreign economic collection and industrial espionage, Annual Report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare
go back to reference Overill RE (1994) Computer crime–an historical survey. Defence Systems International, 1998. This paper discusses the historical development of computer crime. United Nations, “International Review of Criminal Policy–United Nations Manual on the Prevention and Control of Computer-Related Crime.” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crime Overill RE (1994) Computer crime–an historical survey. Defence Systems International, 1998. This paper discusses the historical development of computer crime. United Nations, “International Review of Criminal Policy–United Nations Manual on the Prevention and Control of Computer-Related Crime.” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crime
Metadata
Title
Computer Crimes
Author
Joseph Migga Kizza
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-29106-2_8

Premium Partner