The speed and geographic coverage of the computer system and the difficult y of tracing the transactions through computers makes catching the thieves troublesome.
Computers are abused in
i) stealing by employees at work,
ii) stealing by non- employees or former employees,
iii) stealing from or cheating clients and consumers,
iv) violating contracts for computer sales or service and
v) Conspiring to use computer networks to engage in widespread fraud.
Penalties for computer crime are mild compared to conventional crimes. Passwords and more recently, data encryptions are used for security with limited effectiveness.
Comments are closed.