Talk:Computer crime

From Wikipedia, the free encyclopedia
Jump to: navigation, search
          This article is of interest to the following WikiProjects:
WikiProject Computer Security / Computing  (Rated Start-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 
WikiProject Computing (Rated Start-class)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
 
WikiProject Law (Rated Start-class)
WikiProject icon


This article is within the scope of WikiProject Law, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the legal field and the subjects encompassed by it.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
 

Potential Rewrite[edit]

It seems that the poor organization of the the article could be improved upon. It seems like this is more of a list of types of computer crime at the top, possible reasons/effects/uses and then famous documented cases at the bottom. It could be more beneficial to have a more fleshed out design, one that elaborates more on each of the uses of computer crime and then categorizes each of the cases into related topics instead of being one large paragraph. Andersme (talk) 20:23, 14 October 2011 (UTC)

Stub or not[edit]

I'm not quite sure whether to call this a stub or not. Most of what could be added is already covered in the articles it links to. There's not a lot of consistency in these, which is no suprise, there are lots of opinions in this area. But I think overall the coverage of the topic is pretty good already. Always room for improvement of course. Andrewa 21:06, 15 Oct 2003 (UTC)

Who was the first person to ever start Computer Forensics?[edit]

I just was wondering if anyone knew who was the first to start that. I have to write a paper about it, but i cant seem to find it anywhere. Please Help. mrswayzee thomas trevenoi he did it all —Preceding unsigned comment added by 206.77.200.87 (talk) 19:38, 8 October 2009 (UTC)

Getting lottery emails and fund transfer emails regularly[edit]

hello I am getting such type of emails regularly. They asks processing charges to transfer the winning amount. All from Sweden, Netherland.

From Nigeria fund transfer email comes. They have 10 million US Dollors to transfer, they offer 30% to me. Rest to them. What Profit they gets by this transfer, God only knows. But the thing which I know is these all are crimes.

Manoj Sinha

Nigerian Letter, Lottery Scams, etc. fit under the category of Advance fee fraud. They profit by falsely promising money in return for a relatively small advance fee, paid by the victim. Check out the Wikipedia article for more info. 206.174.154.125 05:30, 1 September 2006 (UTC)

Grammar?[edit]

"...except where a non-commercial distribution has a not-insignificant effect on the copyright owner's business."

Shouldn't it be "significant effect"? Or are double negatives cool when you do law?

All I do is copy it down as parliament wrote it. Sadly, I did not make this up which would have been a not-unamusing thing to have done. David91 05:30, 1 February 2006 (UTC)


many kids find ways to hack on to the computer and do the wrong things . this should be stopped and men should have respect and leave kids alone. internet crime is to much. to many kids are being abused and raped from the wrong people.

as a student :gina

I'd like to see you find a way to stop computer crime. Especially when the combined

LH (talk) 22:57, 2 January 2009 (UTC)

Added to Cyberterrorism[edit]

I added a definition to cyberextortion, a type of cyberterrorism and extended it to link to a page for cyberextortionists.

leeaaro4 15:05, 17 February 2011 (UTC)

I think the part talking about cyber extortion should be re-written;
  • it's poorly written
  • cyber extortion isn't a form of cyber terrorism, it's just that in the cases given cyber terrorism is used as a means to do cyber extortion
  • uses cyberextortion and cyberterrorism instead of cyber extortion and cyber terrorism
Aisteco (talk) 21:16, 9 September 2012 (UTC)

Potential rewrite?[edit]

It seems that the poor organization of the the article could be improved upon. It seems like this is more of a list of types of computer crime at the top, possible reasons/effects/uses and then famous documented cases at the bottom. It could be more beneficial to have a more fleshed out design, one that more on each of the uses of computer crime and then categorizes each of the cases into related topics instead of being one large paragraph. — Preceding unsigned comment added by Andersme (talkcontribs) 20:22, 14 October 2011 (UTC)