Since the dawn of the first programmable computer, computers have been one of the most useful inventions in the world. The crime under investigation is computer hacking in both domestic and government environments. Hacking is a global problem that affects ordinary citizens, businesses and government. Hacking can take many forms, from hacking a social media account to hacking a government facility. The social construct of hacking is that all around us on the Internet we are in the same network as hackers. Hackers can be people who hack into someone's account or computer to steal files, which, compared to government hacking, is a minor crime. The term "hacker" has multiple meanings and variously describes a person who explores programmable systems, who is obsessed with programming, who is able to program quickly, or who is an expert in a particular program. In 1996 Eric S. Reymond referred to hackers as "an enthusiastic expert, one who likes to push boundaries creatively, or a malicious schemer seeking confidential information" (Reymond 1996). 2.0 Research Methods The information used to compile this report was obtained from a variety of both primary and secondary sources. These sources have been found in a variety of places that include the Internet and newspapers. Since computer hacking is not a common crime, sources were scarce and difficult to come by. The primary sources used were case studies, graphs and statistics. These sources provided information on several cases of hacking in Queensland and how often they occur. The secondary sources used were news articles and a survey conducted to obtain statistics and people's opinions on various aspects......half of the paper......han three-quarters (77%) of all households had access to the Internet via a broadband connection. That's a huge amount of computers that can be hacked. Figure 1 shows the increase in internet access and broadband access in homes across Australia. 3.4 What are the community's problems? The community's problems with hacking are that many people can be hackers or be victims of hacking. Hacking in the community can be seen in many forms. In today's society, computers are everywhere. They are used for general business purposes, item tracking, or something as simple as finding the price of an item. But computers are also used for more sinister purposes. These include stealing money or stealing personal data or stealing general or government files. Computer hacking crimes are classified into different levels of crimes. These are:
tags