Cybercrimes Essay

This essay has a total of 1774 words and 7 pages.

cybercrimes

Millions of people around the world use computers and the internet everyday. We all use it
in school, work even at home, computers have made us life easier, it has brought so many
benefits to society but it has also brought some problems, cybercrimes is one of them. The
internet could be considered a type of community of computer networks, therefore we could
consider it a society. Like in every society, in the internet there is commerce,
education, entertainment, and of course there is crime, cybercrime. Real life society has
police and laws to regulate people actions, unfortunately right now the internet is
missing this type of control. Governments around the world need to work together to find a
solution to this problem. The solution is in the creation and implementation of
international laws that deal specifically with cybercrimes.

To be able to understand cybercrimes we need to know where it all started, it all started
with the birth of the internet. The internet is a computer-based global information system
composed of many interconnected computer networks (Beekman, 1999). Internet works through
a system of switching from computer to computer packets of information. Packet switching
began in the 1960s in the United States when the Department of Defense Advanced Research
Projects Agency (ARPA) funded a research project that created a packet switching network
known as the ARPANET. ARPA also created networks that worked through satellites. By 1970
ARPA had a problem, the networks it had created where incompatible, so they focused on
investigating ways to intercommunicate their networks. The solution to the problem came
with the creation of a protocol that every network could understand the TCP/IP protocol,
and the internet started. In the early 1980 a group of academic computer scientists formed
the Computer Science NETwork, which used TCP/IP protocols, also government agencies
started to link their networks using the TCP/IP protocol. Later in the 1980s large
commercial companies began to use TCP/IP to build private internets and ARPA investigated
transmission of multimedia across the Internet. Little by little new technologies such as
hypertext, helped create the World Wide Web. Initially the WWW was created to communicate
physicists around the world. Also during the late 1980s the government of the United
Stated began to take away the restrictions of who could use the Internet, and
commercialization of the Internet began. In the 1990s without the restrictions the
internet began to be used by everybody. Now the internet is used by universities,
companies, schools, government agencies, families and individual users (Encarta, 2001).

Cybercrimes are committed by using computers, so they could be considered computer crimes.
Computer crimes started in the 1960s with the introduction of computers into businesses
and government agencies. Through the years computers and computer crimes have evolved, now
most of computer crimes are done through the internet (Godwin, 1995). Right now it is
estimated that $100 billion dollars is lost annually because of cybercrimes and 97% of the
offenses go undetected (Gebhardt, 2001). Cybercrimes will continue to evolve becoming more
and more dangerous.

Right now there are different types of cybercrimes, the most important and dangerous are
the following. Computer network break-ins, this type of crime is performed by hackers that
break into computer systems to steal data or plant viruses, this type of crime has been
made illegal by the U.S. federal government but its detection is difficult; Industrial
espionage, this occurs when a corporation hires a hacker to obtain information about
another corporation; Software piracy, this the illegal copying and distribution of
software, this copies of software work as well as the originals but are much cheaper
because it is very simple to create this copies; Mail bombings, this type of crime consist
in ordering the computer to repeatedly send electronic mail to a specified person's email
address to saturate the recipients personal account and by this way be able to shut down
entire systems; Password sniffers, this are programs that monitor and record user names
and passwords of network users, when the cybercriminal obtains this information he can
perform malicious activities in the network as well as be able to obtain valuable
information; Credit card fraud, cybercriminals access large databases of credit card
information (Digital Century, on-line). As we can see there are many types of cybercrimes
and all of this crimes need solutions and there is a need to control all this crimes.

The persons that commit this crimes are very often computer expertise, and are considered
either hackers or crackers (Alexander, Encyclopedia Britannica, p. 185). A hacker somebody
who uses computer expertise to be able to gain unauthorized access to a computer system to
learn about the system or to examine its data (Beekman, 2000). A cracker is also a person
that access a computer system but with the intention of performing malicious activities.
Almost any type of person can be a cybercriminal, they could be students, terrorists,
amateurs or members of organized crime to name a few. Cybercrimes committed in companies
Continues for 4 more pages >>




  • Ayasofya
    ayasofya Architecture, the practice of building design and its resulting products; customary usage refers only to those designs and structures that are culturally significant. Architecture is to building as literature is to the printed word. Vitruvius, a 1st-century BC Roman, wrote encyclopedically about architecture, and the English poet Sir Henry Wotton was quoting him in his charmingly phrased dictum: "Well building hath three conditions: Commoditie, Firmenes, and Delight." More prosaically,
  • Cockpit Video CamerasThe Issues
    Cockpit Video CamerasThe Issues Introduction The National Transportation Board has recommended to the Federal Aviation Administration that all FAR Part 121, 125, and 135 passenger-carrying aircraft be equipped with cockpit video recorders, cockpit voice recorders and digital flight data recorders (Rimmer, 2000). The use of flight data information has been very useful to the National Transportation Safety Board for solving countless aircraft accidents and mishaps. The recent surge for the upgrade
  • Deregulation
    Deregulation Deregulation of the U.S. airline industry has resulted in ticket prices dropping by a third, on an inflation-adjusted basis. As a result some 1.6 million people fly on 4,000 aircraft every day. Airlines carried 643 million passengers in 1998, a 25% increase over 1993 and the FAA estimates that the nation¡¦s airline system will have to accommodate 917 million passengers by the year 2008. The growth in air travel threatens to overwhelm the presently inadequate air traffic control syst
  • Money laundering
    money laundering Money Laundering The word money laundering, according to the myth, is derived from Al Capone\'s practice of using a string of coin-operated launderettes in Chicago to disguise his revenues from gambling, prostitution and protection rackets. It\'s a nice story but not true, money laundering is so called because it perfectly describes the process of removing the stains and smells which money acquires when criminals earn it. In this report I will go on to discuss the topic of money
  • The Third Twin
    The Third Twin The Third Twin The Third Twin by Ken Follett is a type of mystery book. It makes you look at different aspects of the story. When you think you know what’s happening it is not always what you think. Dr. Jeannie Ferrami, a scientist funded by a university who is doing a study on twins is one of the main characters in the story. Jeannie Ferrami is tall with long brown hair and is also very athletic. Steve Logan a student at another college is also a very important character in the s
  • Webonomics
    Webonomics Introduction Webonomics, by Evan I. Schwartz, is a practical, strategic tool for positioning and growing your business in the today’s exploding World Wide Web economy. Schwartz addresses the unique problems and rewards businesses can expect to encounter when conducting business in cyberspace. He also dispels some of the most common misconceptions about doing business on the Web. More importantly, Schwartz targets the key to business success on the Web: understanding consumer behaviors
  • ADP Security Evaluation
    ADP Security Evaluation Valuation of a Security Automatic Data Processing, Inc. ADP by: Katie S. McCarthy April 7, 1999 Spring Hill College Management of Financial Resources Dr. Ralph Sandler ADP – Automatic Data Processing, Inc. (NYSE:AUD) ADP is one of the largest independent computing services firms in the world with more than .5 billion in annual revenues and more than 425,000 clients. Founded in 1949, ADP provides computerized transaction processing, data communications, software, and inf
  • Advantages and disadvantages of a Web Presence
    Advantages and disadvantages of a Web Presence Advantages and disadvantages of a Web Presence The World Wide Web is a World Wide Market. It is a new way of selling. More and more customers expect to find your product news and specifications on the web. But even on the Net, you have to advertise your product. Using Internet as a media to advertise your product is different from traditional media. Through Internet companies can be present all over the world. Using the web as an advertising tool is
  • Business analysis of a Limited Company
    Business analysis of a Limited Company The Limited, Inc. Three Limited Parkway Columbus, Ohio 43230 614-415-7000 www.limited.com Written by:Dan Di Pietro s_djdipietro@clarion.edu Administrative Decision Making BSAD 490 Dr. Roth July 12, 1999 Overview Name: The Limited, Inc. Headquarters: Three Limited Parkway Columbus, Ohio 43230 Telephone: 614-415-7000 Internet Address: www.limited.com Top Officers: Leslie H. Wexner, Chairman and Chief Executive Officer Kenneth B. Gilman, Vice Chairman and Chie
  • BUSINESS PLAN
    BUSINESS PLAN Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emphas
  • BUSINESS PLAN
    BUSINESS PLAN Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emphas
  • BUSINESS PLAN
    BUSINESS PLAN Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emphas
  • Computer fraud
    computer fraud As much as billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately billion, and about million were stolen from various companies such as GTE Corp., AT&T, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporati
  • Corporate Downsizing
    Corporate Downsizing Corporate Downsizing Organizations in every segment of business, industry, government, and education are downsizing. Downsizing is and has been a controversial phenomenon in the last few years. The controversy that surrounds downsizing may be better described as a debate in organizational theory about whether change is adaptive or disruptive. The issues which establish the outcome of the controversy include why the downsizing is taking affect, how it is implemented, and what
  • Drug laws
    drug laws NOTE:This draft document represents a joint effort by the SAMHSA/CSAP Division of Workplace Programs and members of the SAMHSA Drug Testing Advisory Board (DTAB). It has not been reviewed by all members of the DTAB, by industry working groups, or by other Federal agencies. This draft document is the first release to a wider audience. It will serve as the basis for developing the guidelines for Federal Workplace Drug Testing Programs. All interested parties are invited to comment on the
  • FROM BRICK AND MORTAR TO CLICK AND MORTAR
    FROM BRICK AND MORTAR TO CLICK AND MORTAR FROM BRICK AND MORTAR TO CLICK AND MORTAR: MAKING THE TRANSITION FROM CONVENTIONAL BUSINESS TO ELECTRONIC COMMERCE FROM BRICK AND MORTAR TO CLICK AND MORTAR: MAKING THE TRANSITION FROM CONVENTIONAL BUSINESS TO E-COMMERCE TABLE OF CONTENTS Summary 1 Making the Transition from Conventional Business to E-Commerce 4 Introduction 4 Background 4 Problem Definition 5 Hypothesis 6 Methodology 6 Research Design 6 Sources of Data 7 Research Results 7 The Question
  • Gates world
    Gates world Gates World Congrats to the man of the millennium Mr. Bill Gates. Bill developed the wonderful software that makes computing so much fun! As his company, Microsoft, surges for domination in the computing industry, I picture Bill installing little buttons under his desk for possible world take-over. Forget the Y2K bug, that’s nothing! Through Windows I see Bill using Microsoft much like a chess move for world-wide Gates time! But don’t worry, I’m sure Bill has some pretty exciting pla
  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • International Law Ireland
    International Law Ireland INTERNATIONAL LAW IRELAND Ireland is the fastest growing economy in Europe today. It is amazing to think That this is true after so many years of being a struggling nation and people Forced to pay high taxes in order to keep the economy from collapsing. All that has changed since we joined the EC. A lot of people can now enjoy the high standards of living and many overseas company are now coming over to invest here because of our superior workforce and education system
  • Japanese Work Ethics vs American Work Ethics
    Japanese Work Ethics vs American Work Ethics Japanese Work Ethics vs American Ethics "For an American to consider the Japanese from any viewpoint for any reason, it is important for us to remember that they are products of a unique civilization, that their standards and values are the results of several thousand years of powerful religious and metaphysical conditioning that were entirely different from those that molded the character, personality and habits of Westerners" ( De Mente, p.19). To u
  • Marketing Cyberlaw
    Marketing Cyberlaw Introduction Marketers must confront many legal issues in today’s society in order to create a successful business. Many marketing elements are within their control however they must also deal with the competitions marketing strategies or new technologies. Marketers are quickly leaving their television, print, and radio ads to the way of the future, the Internet. Businesses local, regional, and national have quickly embraced the Internet as an inexpensive means of advertising
  • None Provided1
    None Provided1 The number one question to ask when starting a business, whether on the Web or in a traditional setting, is why would people want to buy the product or service. Somewhere in the world, one can find people selling anything so why would people come to you? Are you selling something unique, do you make or market something that no one can find anywhere else or would find it almost impossible to find elsewhere? Do you sell your product at a lower price then anyone else? Maybe your pric
  • None Provided4
    None Provided4 Sample Work When evaluating the quality of EssayEdge\'s edits, please bear in mind the quality of the original version to understand the dramatic improvement made to the essay. Praise The below edit and critique earned this comment from the customer: I would like to thank you for a job well done! You improved upon these essays immensely. Unedited Version: Unedited version will contain poor writing and uncorrected typos. To view the edited version and critique, please click here. Q
  • OPTIONS AND FUTURES
    OPTIONS AND FUTURES The Options and Futures Market Outline 1. Introduction: The world of futures and options. 2. Futures Market A. Explanation of futures contract. B. The risk of futures contract. 3. Options Market A. Explanation of options contract. B. The risk of options contract. C. Intrinsic value and time value of contracts. 4. Conclusion: Risky investments. Futures and options are very similar financial investments. Basically, these two investments are the result of financial uncertainty.
  • Payment Methods for an International Transaction
    Payment Methods for an International Transaction One of the subjects of international business that I have a particular interest in concerns the different payment tools that importers and exporters use when selling goods. There is an added level of risk present when conducting transactions internationally. This risk is in the form of theft, fraud, non-payment, complications of multiple governing agencies, and the inability to meet time deadlines. There are many financial payment tools that are c
  • Peoples bank and porters five forces
    peoples bank and porters five forces Introduction People’s Bank is a multi-service financial institution that has grown to have assets reach nearly billion. When it started in 1842, it opened as a general savings bank aimed at the blue-collar worker who wanted to save his/her money. Now People’s offers many services such as mortgage loans, credit cards, checking accounts, and investment advisory and brokerage services. People’s also offers many different ways in which to do your banking whet
  • Artificial Intelligence
    Artificial Intelligence ABSTRACT Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made the transition from laboratory curiosities to large, successful commercial applications. To enhance the security of automated financial transactions, current technologies in both speech recognition and handwriting recognition are likely ready for mass integration into financial institutions. RESEARCH PROJECT TABLE OF CO
  • Career As a Webmaster
    Career As a Webmaster Webmaster I. Introduction II. History of Occupation A. Beginning B. Future III. Earnings IV. Education and Training A. College B. Tech School V. Machines and Tools A. Hardware B. Software VI. Work Duties VII. Extra Benefits VIII. Attractive Features IX. Unattractive Features X. Conclusion Webmaster The Webmaster career is new and getting very exciting for the years to come. There are constant changes in the technology used to create web pages, and the Webmasters job is to s
  • Censorship
    Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical world society as a whole conspires to protect children, but there are no social or physical constraints to Internet surfing. The Internet Censorship Bill of 1995, also known as the Exon/Coats Communications Decency Act, has been introduced in the U.S. Congress. It would make it a criminal
  • Clientserver
    Clientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execute specific local tasks with local resources. Servers provide shared resources and fulfill broad tasks. Communication enables definition and completion of full work processes. Client/Server software Infrastructure With competing paradigms-SQL databases, TP monitors, groupware, and distributed objects-the middleware that connects
  • Comparing computers
    comparing computers ASSIGNMENT 12 ’00 COMPARE AND CONTRAST PROGRAMS FOR SMALL BUSINESS OWNERS At home I have Microsoft Office, not the 2000 version but I can tell you this program is like no other when it comes to presentation and processor capabilities. It is the cadillac of the programs. I have contemplated getting the office 2000 version however I am told it is very complicated and not generally for home or small business use. It is generally for the company that networks and moves around on
  • Comparing operating systems
    Comparing operating systems Comparing Microsoft Operating Systems : 95/98/NT This report is centered on the similarities and differences of the three major operating systems provided by Microsoft during the previous decade. There were and will always be changes and upgrades some of the information may not be current, as these systems have had certain upgrade modules that may not covered. Windows 95, Windows 98, and Windows NT all have related functionality but they differ in many ways. All three
  • Computer Crime
    Computer Crime New times bring new crimes. It\'s a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by telephone fraud. Now we\'ve got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more peopl
  • Computer Crime1
    Computer Crime1 Computer Crime Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in nature--sometimes recorded, more often not--occurring only
  • Computer Crime
    Computer Crime New times bring new crimes. It\'s a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by telephone fraud. Now we\'ve got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more peopl
  • Computer Crimes
    Computer Crimes Computer crime started in the early 1970’s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are
  • Computer fundermentals
    computer fundermentals The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality of life we enjoy. In order to satisfy these demands, suppliers must produce the goods and services, which the consumer wants by combining factors of production such as land, labour and capital in the most efficient manner. To do this the hiring of workers, rent or purchase of the appropriate premises, and maybe, even investi
  • Computer hackers
    computer hackers REACTION PAPER FOR CASE STUDY #2, Chapter 17 This Reaction Paper represents my comments about and answers to questions concerning Case Study #2 in Chapter 17, pages 531 and 532 of the textbook. The comments and answers represent my interpretation of what the Case Study is about. Question 1. Sometimes, a successful break-in into system makes it easy to invade many other systems. Answer. Some systems include information that helps hackers invade other systems. Some systems hold su
  • Computer Hacking Thesis
    Computer Hacking Thesis Introduction: Hacking is very well-know way of "crashing" a computer system. Listed below is some information on the problems caused by hacking and some solutions of how to stop hacking. Thesis: Hacking has become such a problem in today\'s computer dependent society that stronger measures must be implemented to stop hackers, and if hackers are still successful, they should be severely punished. I. Hackers are a problem because... A. With the amount of businesses and corp
  • Computer purchase
    computer purchase PROF. MARTINEZ COMPUTER PURCHASE Recently, I decided to purchase a new computer. Buying a computer can be a complicated procedure. A number of decisions must be made before making this purchase. I must decide what type of software and hardware I need for my everyday use. Another decision that must be made is how much money do I want to spend. There is no real budget for this purchase. I am not really concerned with the price of the computer. I am not looking to cut corners. My
  • Computer underground
    computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast t
  • Computer virus
    computer virus Computer Virus Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The similarity between them is that they can cause damage to your computer. In short they are simply known as “computer viruses”. For most users, the term “computer virus” is a synonym of the worst nightmares that can happen on heir system. A computer virus is an illegal and potentially damaging computer program designed to infect o
  • Computer Viruses
    Computer Viruses Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthori
  • Computer Viruses1
    Computer Viruses1 Computer Viruses Essay written by Jeramiah Billings Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justi
  • Computer Viruses3
    Computer Viruses3 Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don’t worry if you haven’t heard about them, you won’t find it in your bloodstream. Unfortunately you may find one in your computer memory or disk storage. “ Some may be as benign as the common cold and others as deadly to your hard drive as the Ebola virus “. - 1 -What is a Computer Virus? Usually defined as “ a malicious code of computer programming” it is actually just a
  • Computing professional
    Computing professional A Formal Comprised Interview of ‘Devin Blank’ “Computing Professional” Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of ‘Devin Blank’ The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of today’s business networks. Email, fax and file services, print sharing and remote file access, are among the many vital fun
  • Contrast DOS to Unix
    Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX Arthur Bennis Microcomputer Operating Systems CGS 1560 INTRODUCTION As is suggestive of its name, an operating system (OS) is a collection of programs that operate the personal computer (PC). Its primary purpose is to support programs that actually do the work one is interested in, and to allow competing programs to share the resources of the computer. However, the OS also controls the inner workings of the computer, acting as a t
  • Cyber Terrorism
    Cyber Terrorism The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today’s society. Be it a kid trying to get his kicks bypassing the security or his local Internet Service Provider, or an established terrorist trying to get classified information, the amount of funds we put into protecting ourselves from cyberterrorism is not nearly enough if we were to think about what could be at harm. The vulnerability of commercial sys
  • Data Encryption
    Data Encryption The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and th
  • Databases
    databases The Many Faces of Databases Large databases can contain hundreds of interrelated files. Fortunately a database management system can shield users from the complex inner workings of the system, providing them with only the information and commands they need to get their jobs done. In fact, a well-designed database puts on different faces for different classes of users. Downsizing and Decentralizing The earliest file management programs could only do batch processing, which required user