Defining the Boundaries of Computer Crime: Piracy, Trespass, and Vandalism in Cyberspace Herman T. Tavani.

Slides:



Advertisements
Similar presentations
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
What You’ll Learn How to define major crimes against people (p. 62)
CyberEthics Essay Outline
Law for Business and Personal Use
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Introduction to Computer Ethics
CYBER CRIME AND SECURITY TRENDS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Describe ethical considerations resulting from technological advances.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Business Law Chapter 13: Business Law in the Internet Era.
Cyber crime & Security Prepared by : Rughani Zarana.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Introduction to Computer Ethics
Albania Statistical Training Prosecution / Courts Session 4, January 31, – Overview of the Criminal Justice System and Statistics – Recording.
CYBER CRIME.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Particular Crimes Section 3.2.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Chapter Twelve: Computer Ethics and the Internet Review
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
CYBER LAW Question 1 (a)What is meant by the term ‘cyber law’? Why do we have to study cyber law? (b)Define the term ‘computer crime’ and state how it.
Bosnia & Herzegovina Statistical Training Prosecution / Courts Session 4, November 22nd Overview of the Criminal Justice System and Statistics – Recording.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Chapter Twelve: Computer Ethics and the Internet Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage.
SECURITY CYBER CRIME AND ABUSE
Add video notes to lecture
Ethical, Social, and Political Issues in E-commerce
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter # 1 Overview of Ethics
COMPUTER CRIME.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Video: Digital citizenship is defined as the norms of appropriate,
Learning Area 1 Information And Communication Technology and Society
Introduction to Computer Ethics
Chapter 13 Security and Ethical Challenges.
Computer Misuse Act 1990 GCSE ICT.
Introduction to Computer Ethics
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Introduction to Computer Ethics
Presentation transcript:

Defining the Boundaries of Computer Crime: Piracy, Trespass, and Vandalism in Cyberspace Herman T. Tavani

Introduction The media has widely reported criminal and questionable activities May 2000, I Love You Virus (Love Bug) Feb 2000 cyber-attacks on commercial web sites Amazon, eBay, CNN, Yahoo, etc resulting in Denial of Service to customers Dec 1999, start of RIAA and Napster litigation These certainly seem like issues of cyber crime

Intro (2) Other types of computer behaviors –Pedophiles using Internet to lure unsuspecting young children –Cyberstalking, at least one resulting in death of cyberstalking victim –Some individuals use Internet to distribute child pornography –Are these criminal activities examples of computer crime –What constitutes computer crime? A key point of the paper

Do we Need a Category of Computer Crime? Quick History of Computer Crimes –70’s and 80’s Crimes characterized by disgruntled employees who altered files in computer databases or sabotaged computer systems in the act of seeking revenge on employers, and hackers breaking into systems –The Hackers would break into supposedly secure systems as a prank or malicious attempt to subvert data or its flow –Some hackers used computers to transfer monetary funds from wealthy individuals and corporations to poorer individuals and corps

Computer Crime as a Category(2) Some media reports portrayed young hackers as countercultural heroes Today, the attitude of many in the media and the public has shifted considerably Far fewer individuals and organizations are sympathetic to the causes of computer hackers –Why? Possibly the growing dependence of citizens on the Internet –A growing concern that cyberspace must become more secure and that hacking should not be tolerated

Computer Crime as a Category(3) Many reports about misuses of computers but not a clear criteria for what constitutes a computer crime -- he will now work on this Should crimes involving the presence of one or more computers be classified as computer crimes? Or, is there nothing special about crimes that involve computers? (Gotterbarn ‘91) There have been times that it was thought any crime involving a computer was a computer crime but that may not necessarily be true

Computer Crime as a Category (4) Is a murder involving the use of a scalpel automatically an issue in medical ethics just because a medical instrument was used? Johnson ‘84 initially wrote that crimes involving computers are not qualitatively different from crimes in which no computer is present but has modified her position (‘94)

Do we need a Separate Category of Computer Crime? Gotterbarn and Johnson raise important points other critics do too. Also of note is that crimes of diverse types are also committed in many sectors but we don’t have separate categories for crimes committed in each of those areas. So, do we need computer crime as a separate category?

His Answer Three scenarios involving criminal activity and a computer but is it necessarily computer crime? 1) An individual steals a computer device (like a printer) 2) An individual breaks into a computer lab and then snoops around 3) An individual enters a lab they are authorized to enter and places an explosive device on a computer mainframe or server Each of these is criminal in nature but are they necessarily computer crime?

How to look at these Are they unique because of the presence of computers? Could they be prosecuted as ordinary crimes involving theft, breaking and entering, and vandalism even though computers are present? Maybe then, we don’t need a category of computer crime? Consider though, would having a category of computer crime help us to understand better certain nuances of illegal or immoral activities involving computer technology? Or, be helpful in prosecuting certain criminal activities involving the use of the technology that could be difficult to prosecute under conventional legal statues?

Legal, Moral, and Informational/Descriptive Categories of Computer Crime There are arguments for having computer crime as a separate category from legal, moral, and informational/descriptive perspectives Legally, computer crime might be viewed as a useful category for prosecuting certain kinds of crimes Much as some states have handgun laws that allow a crime involving handguns to be prosecuted as a handgun crime Would allow a crime involving a computer to be treated as a computer crime

Would that be good? What if someone hits someone over the head with a handgun, should it be prosecuted as a handgun crime? Was that the intent of the law in that type of situation? What if the gun used was a toy? How is this different as a crime from hitting them on the head with a rock? This can be confusing to write appropriate legislation and points to potential problems in writing laws for computer crime or to prosecute all crimes involving the use or presence of computer technology under the specific legal category of computer crime

Computer Crime as a Moral Category Is it useful as a moral category? There are a number of ethical questions that both precede and follow from declaring certain computer related activities illegal Which forms of online behavior should we criminalize? Are certain forms of online behavior inherently immoral or are they considered immoral only because they are declared illegal? Many of the ethical issues dealing with computer crime also border on issues involving intellectual property, personal privacy, and free speech in cyberspace

Computer Crime as a Descriptive or Informational Nature Recall James Moor’s article introducing idea of policy vacuums and conceptual muddles Computers make possible certain kinds of criminal activities that otherwise would not have been possible in the pre-computer era Our existing laws and policies are not always able to be extended to cover adequately at least certain kinds of crimes involving computers Having a descriptive category of computer crime can help resolve some of the conceptual confusions and muddles underlying crimes involving computers That could then help us to frame some legal and ethical policies regarding computer crime

Establishing Clear and Coherent Criteria Forester and Morrison define a computer crime as a “criminal act in which a computer is used as the “principal tool.” With this, the theft of a computer hardware device (printer), theft of an automobile full of microprocessors would not be a computer crime b/c the computer is not the principal tool for carrying out the crime Similarly, when we discussed breaking into the computer lab, vandalizing a computer system in the lab, these three examples are not computer crimes using this definition

Does it work? What about the person who files their federal income tax forms online using the computer and fills in some forms with incorrect information? Clearly, they are using the computer as the principal tool Should it be a computer crime? –Could have filled in the same wrong information with pencil and paper –That he used the computer is coincident but not essential to this particular computer act Maybe this definition is not quite adequate

Another Definition Combines Moor’s ideas as well as Morrison’s and Fosters For a criminal act to be a computer crime, the act must be one that can be carried out only through the use of computer technology This capture Moor’s view that new opportunities (new possibilities for crime) are made possible because of the existence of the computer technology and, does incorporate Morrison and Fosters views while restricting the range of the crimes

So, lets test this definition The income tax case-- rules it out Using a computer device in the act of assaulting someone? –Rules it out too

Applying our Definition to some Specific Cases Consider the earlier examples of this paper ILOVE YOU VIRUS as a criminal act and also a computer crime Denial of Service attacks as a criminal act and also a computer crime Distributing MP3 files via Napster also satisfies this proposed definition of computer crime

What about the Questionable Examples? Pedophiles? Stalking someone Distributing child pornography He indicates that these are still all crimes but not strictly computer crimes using the last definition because all of these have been done in the past That is not to say that certain communities, states, or governments may not enact or have enacted laws that do make these computer crimes but from the philosophical definition given by Tavani they are not strictly computer crimes.

Three types of Computer Crime: Piracy, Trespass, and Vandalism in Cyberspace p 521 you read this section - may have a question