|This article is of interest to the following WikiProjects:|
|Sources for development of this article may be located at|
It seems that the poor organization of the the article could be improved upon. It seems like this is more of a list of types of computer crime at the top, possible reasons/effects/uses and then famous documented cases at the bottom. It could be more beneficial to have a more fleshed out design, one that elaborates more on each of the uses of computer crime and then categorizes each of the cases into related topics instead of being one large paragraph. Andersme (talk) 20:23, 14 October 2011 (UTC)
Stub or not
I'm not quite sure whether to call this a stub or not. Most of what could be added is already covered in the articles it links to. There's not a lot of consistency in these, which is no suprise, there are lots of opinions in this area. But I think overall the coverage of the topic is pretty good already. Always room for improvement of course. Andrewa 21:06, 15 Oct 2003 (UTC)
Who was the first person to ever start Computer Forensics?
I just was wondering if anyone knew who was the first to start that. I have to write a paper about it, but i cant seem to find it anywhere. Please Help. mrswayzee thomas trevenoi he did it all —Preceding unsigned comment added by 18.104.22.168 (talk) 19:38, 8 October 2009 (UTC)
Getting lottery emails and fund transfer emails regularly
hello I am getting such type of emails regularly. They asks processing charges to transfer the winning amount. All from Sweden, Netherland.
From Nigeria fund transfer email comes. They have 10 million US Dollors to transfer, they offer 30% to me. Rest to them. What Profit they gets by this transfer, God only knows. But the thing which I know is these all are crimes.
- Nigerian Letter, Lottery Scams, etc. fit under the category of Advance fee fraud. They profit by falsely promising money in return for a relatively small advance fee, paid by the victim. Check out the Wikipedia article for more info. 22.214.171.124 05:30, 1 September 2006 (UTC)
"...except where a non-commercial distribution has a not-insignificant effect on the copyright owner's business."
Shouldn't it be "significant effect"? Or are double negatives cool when you do law?
- All I do is copy it down as parliament wrote it. Sadly, I did not make this up which would have been a not-unamusing thing to have done. David91 05:30, 1 February 2006 (UTC)
many kids find ways to hack on to the computer and do the wrong things . this should be stopped and men should have respect and leave kids alone. internet crime is to much. to many kids are being abused and raped from the wrong people.
as a student :gina
- I'd like to see you find a way to stop computer crime. Especially when the combined
Added to Cyberterrorism
I added a definition to cyberextortion, a type of cyberterrorism and extended it to link to a page for cyberextortionists.
leeaaro4 15:05, 17 February 2011 (UTC)
- I think the part talking about cyber extortion should be re-written;
- it's poorly written
- cyber extortion isn't a form of cyber terrorism, it's just that in the cases given cyber terrorism is used as a means to do cyber extortion
- uses cyberextortion and cyberterrorism instead of cyber extortion and cyber terrorism
It seems that the poor organization of the the article could be improved upon. It seems like this is more of a list of types of computer crime at the top, possible reasons/effects/uses and then famous documented cases at the bottom. It could be more beneficial to have a more fleshed out design, one that more on each of the uses of computer crime and then categorizes each of the cases into related topics instead of being one large paragraph. — Preceding unsigned comment added by Andersme (talk • contribs) 20:22, 14 October 2011 (UTC)