![](/olcweb/styles/shared/spacer.gif) | ![Swanson, Criminal Investigation 8/e](/sites/dl/free/0072564938/title/Swanson_sm.jpg) Criminal Investigation, 8/e Charles R. Swanson,
University of Georgia Neil C. Chamelin,
Assistant State Attorney, Second Judicial Circuit Leonard Territo,
University of South Florida- Tampa
Computer Crime
Chapter Objectives
1) Outline the types of crimes in which computer is the target |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 2) Discuss computers as an instrumentality of the crime |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 3) Describe computers as incidental to the crime |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 4) Explain crimes associated with the prevalence of computers |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 5) Understand the tools that computer criminals use to commit crime |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 6) Discuss debates regarding privacy issues concerning the regulation of the Internet |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 7) Outline profiles of computer crime suspects |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 8) Explain techniques for investigating computer crime |
![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) | 9) Assess methods to prevent computer crimes. |
|