Essay database with free papers will provide you with original and creative ideas.
Describe at least three forms of computer crime and outline international and Australian attempts that have been made to regulate them
The terms "Computer crime," "Computer-related crime," "High-tech crime" and "Cybercrime" are often used interchangeably. A difference can be made between computer specific crimes and traditional crimes performed with the aid of computer technology. Many countries have passed legislation to address computer-related crime. Under the Australian system of Government, all Australian States and Territories have a general power to enact criminal laws to operate within their own borders. The Commonwealth is limited to enacting criminal laws
of computer-related crime and to bring the perpetrators to justice. At the same time, personal communications, privacy and data protection, access to and dissemination of information are fundamental rights in modern democracies. This is why the availability and use of effective prevention measures are desirable so to reduce the need to apply enforcement measures. Any legislative measures that might be necessary to tackle computer-related crime need to strike the right balance between these important interests.