• Research Paper on:
    COMPUTER CRIME: A CASE STUDY

    Number of Pages: 6

     

    Summary of the research paper:

    This 6-page paper focuses on a case study detailing a disgruntled employee who set a time bomb in a company's computer. The paper answers questions such as whether the employee's act was criminal, how it could have been prevented, and how the database could be restored. Bibliography lists 3 sources.

    Name of Research Paper File: D0_MTcomcri.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    Jones is the retiring MIS manager at Miracle Films. Dicks assistant of seven years, Hank Smith, has been responsible for all MIS projects during that time, but Dick has accepted  all the credit for completed projects in his department. At his retirement golf outing, Dick recommends to his fellow executives that his graduating nephew, Peter, should be hired to assume  responsibilities as the MIS manager. Overlooked for a deserved promotion, Hank is furious and decides to leave Miracle Films. But he does  not go quietly. Before leaving, Hank plants a "time bomb" that will destroy much of the departments database three months hence. No one at Miracle Films is aware of what  Hank has done until it is too late. The "bomb" has gone off, and the database is destroyed. While Hank may have been justified in his actions, was he legally  within his right to do what he did? Well discuss this further through the following questions. 1) Is Hanks action considered  a computer crime? Explain. To answer this question, its first helpful to define what, exactly, a computer crime is. According to some  experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, which would include stealing a username and password, or even  accessing a victims computer via the Internet through a "backdoor" -- which is commonly known as "hacking" (Standler, 1999, 2002). The  second criminal use of computers is through creation of and releasing of a "malicious" computer program, which could be a virus, worm or Trojan horse (Standler, 1999, 2002). The third 

    Back to Research Paper Results