Essay on “conduct research to determine three types of computer crime”