Home Project-material USING THE COMPUTER SYSTEM IN CRIME INVESTIGATION

USING THE COMPUTER SYSTEM IN CRIME INVESTIGATION

Dept: COMPUTER SCIENCE File: Word(doc) Chapters: 1-5 Views: 2

Abstract

Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the following text, key research findings in the area of traditional American criminal investigations are summarized. Similarities and differences between traditional and computer crime investigations are then presented, and consequent implications are discussed. Pragmatic suggestions as to how American computer crime investigative task forces can most competently fulfill their intended objectives are given in conclusion via a hypothetical example of a specialized unit. It is hoped that past knowledge can b

1.0     INTRODUCTION

Criminal investigation has been a topic of study for academics and practitioners alike, and is defined as ‘the process of legally gathering evidence of a crime that has been or is being committed’ occurred, and works toward building a case that may lead to the successful prosecution of the offender(s). Many research studies have sought to determine the best way in which the investigative process can be conducted and managed.

1.1   STATEMENT OF PROBLEM

Computer crime investigation is not far-reaching since it can affect the personal records of the individuals involved in a particular crime. It can impact the financial resources of a bank, causing confusion and, potentially, affecting customer accounts. PURPOSE OF THE STUDY

1.2   IMPORTANCE OF THE STUDY

Adding the ability to practice sound computer forensics will help you ensure the overall integrity and survivability of your network infrastructure. You can help your organization if you consider computer forensics as a new basic element in what is known as a “defense-in-depth”1 approach to network and computer security.

1.4   DEFINITION OF THE STUDY

COMPUTER CRIME–refers to any crime that involves a computer and a network.

Netcrime– refers to criminal exploitation of the Internet.

1.5   ASSUMPTION OF THE STUDY

Cyber crime can result in confidential information being compromised; affecting the price of the victim’s publicly traded shares. It can be an attack on a corporation’s marketing information, causing misinformation to be communicated to the sales force.



Recent Project Materials

Abstract Studies on the biology of silver catfish Chrysichthys nigrodigitatus (Lacèpède, 1803) in Jebba La...
Word(doc) 1-5 5 Read More
Abstract Amietophyrnus regularis a synonym of Bufo regularis is an amphibian in the family Bufonidae.Amietoph...
Word(doc) 1-5 2 Read More
Abstract A preliminary study of helminth parasites of toad in Nnamdi Azikiwe University Awka, Anambra State,...
Word(doc) 1-5 4 Read More
Abstract ...The study investigated the lethal and sublethal effects of imidacloprid on stingless bee. Imidac...
Word(doc) 1-5 1 Read More
View More Topics

Browse by Departments