Chapter 31 Title: Defining the boundaries of Computer Crime: Piracy, Break‐Ins, and Sabotage in Cyberspace Quote:
“An attempt is made to establish clear and coherent criteria for determining which
criminal activities involving the use of computer technology…” Expectations:
I expect to learn more about the different kinds of computer crimes and how to prevent
it. Book Review:
This chapter talks about the recent criminal cases that can happen in cyberspace such as
piracy, break‐ins and sabotaging. Reports have been recorded in some various cover stories, headlines in newspaper and leading periodicals. Some categories of computer crime are legal, moral and information or descriptive. Computer crime can be defined as descriptive because it reasonably asks what the value would be in pursuing questions. Establishing clear and coherent criteria and applying our definition to some specific cases are very important in preventing computer crime. There are also three types of computer crime; these are software piracy, electronic break‐ins and computer sabotage. Things I have learned:
I have learned more about the three types of computer crimes and its categories.
Integrity Questions: 1. Who is Herman T. Tavani? 2. What are the three types of computer crimes? Explain each.
3. Why computer crime is defined as descriptive? 4. What are the two important ways in preventing computer crime? 5. What are the categories of computer crime?