 |  Criminal Investigation, 8/e Charles R. Swanson,
University of Georgia Neil C. Chamelin,
Assistant State Attorney, Second Judicial Circuit Leonard Territo,
University of South Florida- Tampa
Computer Crime
Chapter Objectives
1) Outline the types of crimes in which computer is the target |
 |  |  | 2) Discuss computers as an instrumentality of the crime |
 |  |  | 3) Describe computers as incidental to the crime |
 |  |  | 4) Explain crimes associated with the prevalence of computers |
 |  |  | 5) Understand the tools that computer criminals use to commit crime |
 |  |  | 6) Discuss debates regarding privacy issues concerning the regulation of the Internet |
 |  |  | 7) Outline profiles of computer crime suspects |
 |  |  | 8) Explain techniques for investigating computer crime |
 |  |  | 9) Assess methods to prevent computer crimes. |
|