Professional Documents
Culture Documents
Name
Institution
COMPUTER CRIME AND ITS IMPACT 2
According to Gordon & Ford, 2006, computer crime or cybercrime is a criminal activity
smart devices to gain unauthorized access to personal information, private enterprise data, or
secret government information. The aim of the perpetrator of this type of offense is to use the
acquired information for criminal activities or to damage the device storing the information.
Computer crimes fall into three categories: property, individual, and government (Gordon &
Ford, 2006).
Property crime is a type of computer crime where a criminal element breaches the
security of a computer and steals sensitive details such as credit card information. The computer
hacker in this case uses the stolen bank details to gain an illegal access to the victim's funds
(Gordon & Ford, 2006). Also, the perpetrator of this criminality may use the obtained data to
make unauthorized online purchases. Moreover, this type of cybercriminal can utilize the details
to execute pushing scams to trick unsuspecting people to give away their private information
Individual cybercrime is the form of computer crime where a person distributes malicious
information through the internet (Anderson et al. 2013). This illegal information may be in the
online acts are highly harmful to children as the content involved is unsuitable for their age
crime where governments get their data stolen, modified, or destroyed. Although this is the least
COMPUTER CRIME AND ITS IMPACT 3
common type of computer crime, it is the most serious one (Gordon & Ford, 2006). The
perpetrator in this case may hack a government website or a military website. Also, the criminal
here may distribute malicious propaganda. The culprits in this form of crime are enemies of the
targeted governments (Anderson et al. 2013). For instance, in 2013-2016, Yahoo had a breach
where up to 3 billion user accounts were stolen (Confente, Siciliano, Gaudenzi & Eickhoff,
2019).
The cost of computer crime is quantified through estimating the costs in anticipation of
the cybercrime, costs as an eventuality of cybercrime, and cost incurred in efforts to respond to
References
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... & Savage, S.
(2013). Measuring the cost of cybercrime. In The economics of information security and
Confente, I., Siciliano, G. G., Gaudenzi, B., & Eickhoff, M. (2019). Effects of data breaches
Journal, 37(4), 492-504.
Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in