Four types of computer crime

While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: CASE 1: My first case is a classic example of a salami attack (Samaha, 2008). A salami attack according to Samaha (2008) is when a...

Software Counterfeiting

This essay was written for a Fall 2010 cybercrime course and outlines some of the problems faced as a result of software counterfeiting. Software Counterfeiting When the founding fathers created the Constitution, they made an odd inclusion; they included a provision...