• Describe at Least Three Forms of Computer Crime and Outline International and Australian Attempts that Have Been Made to Regulate Them

     

    Eseja3 Tiesības

Vērtējums:
Publicēts: 25.08.2004.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Describe at Least Three Forms of Computer Crime and Outline International and Au', 1.
  • Eseja 'Describe at Least Three Forms of Computer Crime and Outline International and Au', 2.
  • Eseja 'Describe at Least Three Forms of Computer Crime and Outline International and Au', 3.
Darba fragmentsAizvērt

The terms "Computer crime," "Computer-related crime," "High-tech crime" and "Cybercrime" are often used interchangeably. A difference can be made between computer specific crimes and traditional crimes performed with the aid of computer technology. Many countries have passed legislation to address computer-related crime. Under the Australian system of Government, all Australian States and Territories have a general power to enact criminal laws to operate within their own borders. The Commonwealth is limited to enacting criminal laws which fall within one of its enumerated heads of constitutional power; although within these heads of power it can enact law which is applicable across the country and extraterritorially. The Commonwealth's constitutional power to enact laws with respect to "telephonic, telegraphic and other like services" is of particular relevance in the context of cyberspace crime.
In many areas, including cyberspace crime, Commonwealth and State and Territory offences exist and operate side by side, with the State and Territory offences applying generally to wrongful conduct within that jurisdiction and the Commonwealth offences targeting particular aspects (for example, offences involving computers owned or leased by the Commonwealth, and offences involving a telecommunications carriage service).

Atlants