Talk:Computer fraud

Definition/Summary
I feel like this could probably use a more in-depth explanation of computer fraud and how it's defined and committed. It doesn't seem quite enough to go from the tiny article lede straight into a detailed list of examples. It could also probably use a lookover from someone more familiar with how this sort of thing works outside the US, since the examples are near-exclusively American. Buerish (talk) 16:57, 19 October 2015 (UTC)


 * ....now that I look over this again, this really does need better sources and examples. Buerish (talk) 17:07, 19 October 2015 (UTC)

Who is Dennis?!
Hi, who's Dennis?! — Preceding unsigned comment added by 96.231.65.243 (talk) 01:36, 4 October 2011 (UTC)


 * Good question. This article is horribly written. It looks like a copy-and-paste job, with text taken from parts of multiple articles in news sources reporting computer fraud. Dennis was probably someone mentioned earlier in the article from which this particular piece of text was cribbed, much the same as with other people mentioned in others parts of this article.


 * Somebody who knows what they're doing (which I don't) needs to tag this article appropriately, and then (I think everybody would agree) somebody needs to rewrite it completely. Anybody can do it, of course. Unfortunately, I am neither somebody nor anybody; I am nobody. :) --Craig (t|c) 21:35, 18 September 2015 (UTC)

Dates?
I'm just curious: I'd just looked at this article for the information about the Melissa virus, but it didn't say anything about when it was happening or when Mr. Smith was tried or convicted or anything. I don't have time to check the rest of the article for similar issues or to look up any information, but I might later if no one else updates anything. Just saying. :) -DTM 02:46, 21 October 2005 (UTC)

... with impunity, case study
I am the author of a historical novel (LA PLEVITSKAYA, A Gypsy Singer's life in Tsarist Russia and in exile).


 * For some years now a site called blogymate has offered pirated downloads of my book. I have tried and tried again to make them delete it, but they always hide behind 'it's the users of our site'. Twice they deleted it, but it always kept popping up again and now they no longer reply to my emails. I have never released an electronic version of my book and I do not know where they have got the file from which they offer. (I have not checked what's in the file - who knows, it could be something really sinister.)

The reason why I am posting this is the international maze that facilitates computer fraud and makes it impossible for a single author to fight - when it is international. My book is for sale at amazon.com = US. I live in Australia. The location of blogymate is ... probably in Bangla Desh, because Bangla Deshis lead that company. But of course they could also be in Britain or Dubai or ..... Hiring private detectives to find out where these people are and then hiring intellectual property attorneys for all locations involved is beyond my means.


 * They know it, so with impunity, blogymate profits from computer fraud with my book here:

http://www.blogymate.com/post.aspx?BlogID=24807&t=La-Plevitskaya-by-Ally-Hauptmann-Gurski-on-iPAD-download-pdf-and-iPad-format Ally Hauptmann-Gurski 121.209.53.9 (talk) 02:58, 9 February 2014 (UTC)

Computer and Internet Fraud
What is the difference between computer fraud and internet fraud? -User:Wikipedianuhai 14:06, 27 May 2020 (UTC)