According to Commercial Crime Investigation Department, Royal Malaysia Police (2015), commercial crime is covers crime such as fraud which is deciving a person or company to get goods and money through forgery. It is caused by greed, common criminality and uncertainty about employment. There have many types of crimes involved credit card fraud, e-banking fraud, inheritance fraud, insurance fraud, international scam, love scam and parcel scam. The famous crime among these is love scam. Love scam is
Computer Crimes Act 1997 As the technology were develop into better way nowadays, computers been upgrade into more sophisticated approach and application with the using of the networking concept. With this development, it is true that were said by Nazura Abdul Manap (2003) that crimes increase along the development of computer technologies and internet. It is because most all of our routine activities daily are involving with computers and internet. For examples at works, at home or even when we
0 Introduction The world is changing and Computer technology have overtake human ability and it has become part of our human lifestyle and this trence will continue to grow tremdeously. Computer crime such as corporate financial fraud, intrusion by insider, stealing of identity, credit card fraud, child pornography, terrorism intrusion and etc... Computer forensics play a major role in counteract those crimes that are committed by the criminal. “Computer Forensics involves obtaining and analysing
Crime is a common word that we always heard in this globalization era. The rapid growth of the internet and computer technology over the past few years had caused by the growth of the new crime which is cyber-crime throughout the world. Wordpress (n.d), research revealed that the history of cyber-crime happens when computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems and hackers even competed against one another to win the tag of
H.M. Adams Criminal Justice 102 Writing Laboratory Professor Reid Toth September 11, 2014 The first step and possibly the most important during an investigation is to secure the crime scene. Essentially the reason behind the importance needed to secure a crime scene is to protect evidence from any unnecessary intrusion by persons authorized or unauthorized that could result in the contamination of the evidence even if the cause of contamination is done unintentionally. This procedure is implemented
to globalization. Indeed, computer today touch every aspect of society including from our day to day activities, the financial institution to government agency and from individual to law enforcement. Together with these changes, which have created a global economic momentum and invite criminal activities which has become more sophisticated and the scale of their activities has increased substantially. This trend has been accelerated by the rapid proliferation of computers and the considerable increase
tracks and cars), controlled substances (chemicals that are banned by the government because it could lead to the potential for abuse or addiction), ballistics (examination of firearms) and other evidence found at a crime scene. Normally, such evidence is processed in a laboratory (crime lab). 2. Forensic Anthropology is a subdivision of forensic science that applies the science of physical anthropology (which in a certain sense is part of anthropology who tried to trace
is used to detect white collar crime, the drivers of white collar crime, the impact of the crime and what organisations can do to prevent white collar crime. Over the years organizations have lost significant amounts of money from crimes committed by the least expected people in the organizations, people who have worked for the same employer for several years. Key words White Collar Crime, ICT, White collar criminal Definitions White Collar Crime - A non-violent crime that is committed by someone,
2006 The matching of missing persons with unidentified dead bodies is being done with the help of computers. Before computerization of missing persons data, the tracing out percentage of missing persons was about 25% which has increased to 73.77% in 2006. As per the report 80% missing children were traced. Photographs of missing persons as well as unidentified dead bodies are fed in the computer. The web site developed by the Delhi Police can be accessed by general public from any part of the
an alternative, referring what's more to computer security hacker culture as a whole to differentiate it from the academic hacker ethnicity or specifically to make a difference within the computer security framework between black-hat hackers and the more ethically positive hackers (commonly known as the white-hat hackers).The outlook of computer defense hacking forms a subculture which is often referred to as a network hacker subculture or simply the computer