ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Computer Crimes and the Fight to Stop Them

Updated on September 12, 2012

Computer crime is on everyone’s mind in this modern day. Tuning in the news or reading a newspaper only gives a new and almost daily account of yet another example of computer crime. This has merely given authentication to our knowledge that we live in a new world of computer driven threats. For discussion by students and professors the following paper list a brief history of computer crime patterns and the methods that need to be established to fight these crimes.

Cyber Crimes and Solutions
Cyber Crimes and Solutions | Source

Computer Fraud

The histories of man are full of fraudulent activities and are defined as the use of trickery, deceit or sharp practice for the purpose of profit or gain an unfair or dishonest advantage. Moses even used fraud to compel Ramses to free the Israelites when he brought the plagues on Egypt. Today with the development of computers, fraudulent schemes have been designed that have bilked unsuspecting persons and business out of billions. Computer fraud covers a vast array of dishonest computer usages. A criminal may changing computer input, delete or change stored data, misusing or change software packages or existing system tools, writing or changing code, or various means of creating fraudulent transactions. (A Brief History of Cybercrime, 2012)



Harassment has grown with internet world. Harassment prior to computers could be a number of illegal activities from childhood bullies at the bus stop to sexual harassment at the work place. Sometimes internet harassment is acute, but it can also develop into chronic problems, such as cyber stalking, cyber bullying, online predatory behavior, hate crimes, and real-world stalking. Internet harassment shows similar patterns of starting in computer chat-rooms or email and move into an actual meeting where a person can be kidnapped or even murdered.

Drug Trafficking

Drug trafficking has been a problem for dozens of years, but the internet has made it easier. Trafficking drugs is much easier over the internet where dealers can sell products through encrypted emails. They may use private chat rooms and forums to swap recipes and find new buyers.

Cyber Terrorism

Terrorism before the development of computers relied on the newspapers and television to spread their coverage of their activities. With regulation from government persons could only see what was not deemed a threat to national security. Cyber terrorism has become a major concern amongst federal officials. Cyber terrorists use online postings and emails to advance their terrorist activities through coercion and threats of political and economic violence. They also attempt to infiltrate computer networks to destroy the information that they store.


The Fight

With the identification of some types of cybe-rcrime the next discussion will be of the processes to fight these crimes. The following lists of processes are part of many company policy directives that have been established to address the securing of company computer systems and the data that they contain.

Regular Maintenance-this includes system patch updates, antivirus and firewall updates before the computer is allowed to access the internet. (Wright, 2010)

Periodic Evaluations-This can be checking the reported results of an antivirus or firewall and the discovery of any patterns or vulnerabilities in the network or computer security.

Awareness-This can be communications from the IT department or from security software manufactures of new threats that appear on the internet.

Policy Standards and Guidelines-as new employees come on board with companies with secure computer systems they are required by the company to adhere to specific computer usage and access policies to protect the company and the public information that is stored on their system.

Training and Education-As new software programs and faster computer networks are developed, a need for training and education is needed to train employees how to keep their work safe using encryption and passwords. Further training on standards for protecting the integrity and risk are needed to promote a safer from hacking and social networking.

Computers have been said, to have made this world a better place to live; and it is very true now that they have entered our daily lives we would be at a great loss if we had to do without them. Realizing this has merely given authentication to our knowledge that we live in a new world of computer driven threats, and they too are here to stay.


A Brief History of Cybercrime. (2012). Retrieved June 19, 2012, from Bright Hub:

McQuade, S. (2006). Understanding and managing cybercrime (1st ed.). Upper Saddel River, NJ: Pearson Education.

Wright, C. (2010). Implementating an Information Security Management System Training Process. Darling Harbor, Austrialia: Sans Institute.

Computer Victim

Have you ever experienced a computer crime? What type?

See results


    0 of 8192 characters used
    Post Comment

    • mecheshier profile image


      6 years ago

      Nice Hub. There is some great info here. Many years ago I wrote an article for a college newspaper about Identity theft. You would not believe how many people thought I was paranoid. Today it is a worldwide epidemic.

      Thank you for sharing. Voted up for useful.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)