The definition of what constitutes computer fraud becomes increasingly complex with the ingenuity of people seeking to deceive, misrepresent, destroy, steal information, or harm others by accessing information through illegal and deceptive means. Just as people should be careful when walking down the street or at home when locking their doors at night, they should be careful about the many examples of fraud that will show up on their computers.
Children need to be taught how to use the Internet safely to protect themselves from predators.
The types of computer fraud vary and can be complex or simple. Simple types of fraud can include the following:
Hacking a computer is a type of computer fraud.
Sending fake emails with the intention of scaring people. Illegally using another person’s computer or “impersonating” another person on the Internet. Use of spyware to collect information about people.
Committing computer fraud can lead to arrest.
These actions are frauds because they are deliberate misrepresentations of the truth. They progress to more damaging actions as they become more complex and include the following:
People who use their credit cards for online purchases need to protect themselves from cyber fraud.
Emails asking for money in exchange for “small deposits”. Pyramid schemes or computer investment schemes designed to take and use someone else’s money. Emails that attempt to collect personal information to access and use credit cards or Social Security numbers. Using another person’s computer to access personal information with the intent to use it fraudulently. Using the computer to entice minors into sexual alliances. Violate copyright laws by copying information with the intent to sell it.
Hack computer systems to collect large amounts of information for illegal purposes. Hacking or illegally using a computer to change information such as grades, work reports, etc. Send computer viruses or worms with the intent to destroy or damage another person’s computer.
There are many different legal ramifications for those who engage in computer fraud, especially when such a practice could be harmful and harm others physically or financially. Most laws distinguish between a person who commits fraud intentionally and someone who does it accidentally. For example, transmitting a fictitious letter about a possible virus is a common feature among new computer users and is not really fraudulent. Deliberately generating a fake letter to scare others is fraud with the intent to at least emotionally harm others. Generally, when a person intentionally commits a fraudulent act with a computer, he or she may be subject to criminal and sometimes civil prosecution and, at a minimum, will pay fines if convicted of petty fraud. People who steal information or money with a computer,
Although there are severe penalties for committing computer fraud, the laws that govern it can be difficult to enforce. Some of the email scams for investment opportunities and get-rich-quick schemes originate outside the country where the victims are located, and it can be difficult to instigate investigations on foreign soil. Computer users should exercise caution and commit to the following computing philosophy when on the Internet:
Users should not give personal information to anyone or any company they have never heard of before. This includes the person’s full name, address, phone number, credit card number, Social Security number, or information about the people in the household. People should not pay attention to get-rich-quick schemes. If they sound too good to be true, they absolutely are. Email users should not open messages from strangers. Everyone should install antivirus software and spam blocking programs. People should never download attachments from people they don’t know. Children should be taught about safe communication on the Internet to protect them from predators. People should not store passwords on their computer and should not use common passwords such as children’s names, birthdays, or other guessable words. Nobody should give a password to another person.
The types of computer fraud vary and can be complex or simple.