Describe at least three forms of computer crime and outline international and Australian attempts that have been made to regulate them
Date Submitted: 01/04/2004 21:47:14
The terms "Computer crime," "Computer-related crime," "High-tech crime" and "Cybercrime" are often used interchangeably. A difference can be made between computer specific crimes and traditional crimes performed with the aid of computer technology. Many countries have passed legislation to address computer-related crime. Under the Australian system of Government, all Australian States and Territories have a general power to enact criminal laws to operate within their own borders. The Commonwealth is limited to enacting criminal laws
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
and access over 480,000 just like this GET BETTER GRADES
of computer-related crime and to bring the perpetrators to justice. At the same time, personal communications, privacy and data protection, access to and dissemination of information are fundamental rights in modern democracies. This is why the availability and use of effective prevention measures are desirable so to reduce the need to apply enforcement measures. Any legislative measures that might be necessary to tackle computer-related crime need to strike the right balance between these important interests.
Need a custom written paper? Let our professional writers save your time.