A Critical Look at the Regulation of Cybercrime

(B) Computer Forgery and Desktop Counterfeiting . When a criminal alters data stored in a computer system, the crime committed may be forgery. In this case computer systems are the target of criminal activity. However, computers can also be … ................
................