Preview

Cybercrime And Its Impact On

Satisfactory Essays
Open Document
Open Document
1541 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime And Its Impact On
Cybercrime and its Impact on
New Media and Discourse

Robert M. Hayes, Professor Emeritus, UCLA
Information Technology and Journalism Conference
Dubrovnik, Croatia
24 May – 28 May 2010

My Website
 http://polaris.gseis.ucla.edu/rhayes/courses/courses.htm
 This PowerPoint presentation is available at that site.
Simply click on “Other” and it is the first entry there.

Introduction
 Cybercrime
 Social Networking:
The New Media and
Means for Discourse

The Contexts of Cybercrime
1. Cybercrimes against individuals
2. Cybercrimes against groups
3. Cybercrimes against property
4. Cybercrimes against corporations
5. Cybercrimes against governments

1. Cybercrimes against individuals





Identity Theft
Sexual Predation
Confidence tricks and con artists
Financial Predation

 It is fascinating to observe the number of cybercrimes against individuals that are reported on a daily basis
 Just within the weeks before my departure for this trip, the following items were in the LA Times and Daily News:




It was the text message of their lives, May 6, 2010
Facebook as a target for Internet criminals, May 15, 2010
Gruesome death photos and Internet privacy, May 15, 2010

 And, believe me, these are just a sample.

2. Cybercrimes against groups



The Game Online
System Predators

 Again, it is fascinating to observe the number of reported attacks against groups, such as the following:


UC San Diego professor studies disobedience, Mat 7, 2010

3. Cybercrimes against property


Violations of Intellectual Property Rights

4. Cybercrimes with corporations







Denial of Service
Cracking
Unauthorized access
Financial Manipulations
Violations of Record Keeping Laws
Spamming

5. Cybercrimes against Governments



Cyberterrorism
Cyberwar

Internet Social Networking





Internet Social Networking sites
Internet Dating Sites
Scientists Strive to Map the Shape-Shifting Net
Internet paradox: A social technology that reduces socia l involvement



References:  Asokhia, M. O. (2010). Enhancing National Development and Growth through Combating Cybercrime/Internet Fraud: A Comparative  Arquilla, John & Ronfeldt, David (1996). The Advent of Netwar: Analytic Background  Brenner, S. (2007) Law in an Era of Smart Technology, Oxford: Oxford University Press  Clarke, Richard A. (2010). Cyber War. HarperCollins.  Csonka P. (2000) Internet Crime; the Draft council of Europe convention on cyber-crime: A response to the challenge of crime in the age of the  “Cybercrime More Profitable Than Drugs”, Sydney Morning Herald, June 9, 2009 http://news.smh.com.au/breaking-news-national/cyber-crime-moreprofitable-than-drugs-20090609-c1qm.html  Fafinski, S. (2009) Computer Misuse: Response, regulation and the law.  Faturechi, Robert. “It was the text message of their lives”. Los Angeles Times, May 6, 2010  Grabosky, P. (2006) Electronic Crime, New Jersey: Prentice Hall  Kraut, Robert; Patterson, Michael; Lundmark, Vicki; Kiesler, Sara; Mukophadhyay, Tridas; Scherlis, William. (1998). “Internet paradox: A social technology that reduces social involvement and psychological wellbeing?”  Krone, T., (2005). High Tech Crime Brief. Australian Institute of Criminology  Longe, O.B. (2004): Proprietary Software Protection and Copyright issues in contemporary Information Technology  McQuade, S. (2006). Understanding and Managing Cybercrime, Boston: Allyn & Bacon.  McQuade, S. (ed) (2009) The Encyclopedia of Cybercrime, Westport, CT: Greenwood Press.  Parker D (1983) Fighting Computer Crime, U.S.: Charles Scribner’s Sons.  Smith, R. G., Holmes, M. N. &Kaufmann, P. (1999): Nigerian Advance Fee Fraud., Trends and Issues in Crime and Criminal  Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling.  Walden, I. (2007) Computer Crimes and Digital Investigations. Oxford: Oxford University Press.  Wall, D.S. (2007) Cybercrimes: The transformation of crime in the information age  Williams, M. (2006) Virtually Criminal: Crime, Deviance and Regulation Online, Routledge, London.  Vernor, Jeff; Parija, Soubhagya; McGuire, Russell (2010). Identification of Emerging Risk Using Bayesian Conditional Probability  Zeviar-Geese, G. (1997-98). The State of the Law on Cyberjurisdiction and Cybercrime on the Internet of International Law. Volume 1. 1997-1998.

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Cybercrime is defined as any crime that is conducted via the Internet or another computer network. When it comes to cybercrime it is very easy for someone to fall victim to it. We use computers for everything; searching the internet, shopping, accessing our bank accounts, email, and online gaming are some examples. Communication is faster and much more reliable than in the past which has allowed more to be accomplished in any given day. The problem is just like anything else; vulnerability. There are individuals that hack into computers as well as networks of businesses and government agencies. The problem is that sensitive data can be stolen and/or destroyed. There needs to be more focus on the security of computers and the internet.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    For an individual to fully understand the difference between cybercrime and traditional crime, the individual needs to understand what cybercrime is. The definition of cybercrime is according to "Oxford Dictionaries" (2014), "crime conducted via the internet or some other computer network" (cybercrime). Cybercrime is committed by hackers with the goal of financial gain in min by stealing personal information(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are many different categories for cybercrime but the main four include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are charged on a state law level; however, there are plenty of federal laws that can be violated through committing cybercrime. The main difference that needs to be known is that when cybercrimes are committed, the crimes are done so from the luxury of a hacker 's house or place of business while traditionally crimes are not. Another difference worth noting is that cybercrime criminals have the ability to commit these crimes from different states, even internationally at some levels. When cybercrimes are committed liken that, it makes it hard to prosecute as the laws may vary from place to place. That is usually when federal laws are reviewed for a…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Best Essays

    The World Intellectual Property Organization (WIPO) saw a 20 per cent increase in the number of cyber squatting (abusive registration of trademarks as domain names) cases filed in 2005 as compared to 2004. In 2005, a total of 1,456 cyber squatting cases were filed with WIPO 's Arbitration and Mediation Centre, according to a WIPO release.…

    • 3218 Words
    • 13 Pages
    Best Essays
  • Better Essays

    I. The direct impact that these crimes can have on us is through our finances. Cyber crimes attack our personal information,…

    • 1233 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The Fourth Amendment can be applied to the Internet, computer, and cybercrimes, but it must be done very carefully. The protections that are granted by the Fourth Amendment should depend on the data. If the data is content, which means any kind of communications such as email, or any remotely stored files on a computer system, then the information is protected by the Fourth Amendment. However, if the data is non-content information, such as IP address and email addresses then those are not guaranteed to be protected by the Fourth Amendment. In 2012, a federal judge ruled that the computer of an individual is not protected by the rights granted under the Fifth Amendment. Many times cybercriminals will claim that their Fourth and Fifth Amendment rights were violated when investigators conducted the initial or follow-up investigations. One such situation is the court case United States of America v. Richard D. King, Jr. which was argued in the Third Judicial Circuit in 2009. In this case the defendant argued that his Fourth and Fifth Amendment rights were violated when the investigators served an arrest warrant for an accomplice at his residence.…

    • 1122 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a façade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the innocent are left vulnerable. In all three cases, the judges failed the victims of unidentified slander. In his article, Keen forcefully expresses his opinion on why he believes we, as Americans, should take a stand against the anonymity of today’s internet tormenters because too many innocent lives are destroyed due to the cruel intentions of anonymous speech.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Crime Theories

    • 468 Words
    • 2 Pages

    Taylor, R., Fritsch, E. J., Liederbach, J., Holt, T. J. (2011). Digital crime, digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson.…

    • 468 Words
    • 2 Pages
    Good Essays
  • Best Essays

    CyberCrime Motivation

    • 1610 Words
    • 5 Pages

    Kshetri, N. (2010). The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. New York: Springer.…

    • 1610 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cyber crimes here in the United States are becoming very dangerous and serious, this could include online scams, also here in the United States we are the highest target for cyber crimes. And sometimes, it is very hard to measure the extent of cyber-crime in the US, due to the fact that when authorities record cyber-crime, they don't necessarily record it as a computer-related offense. It is most often recorded as fraud or some other conventional crime. The people who hack alone cost the US billions of dollars every year.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    KUALA LUMPUR: Cybercrime is increasing at an alarming rate worldwide with more than a million people becoming victims every single day, according to the Norton Cybercrime Report 2011. The victims of cybercrime also paid dearly with a total loss of US$388bil (RM1.21bil) to cybercriminals in 2010. Effendy Ibrahim, director of consumer business at Symantec Asia Pacific, said that cybercrimes don’t only cost victims financially but emotionally too. “On average, it takes 10 days for a victim to recover from a cybercrime and it can be emotional too considering the amount of data they lose,” he said at the launch of Norton 2012, Symantec’s latest cybersecurity solution. However, victims could have saved themselves money and regret as the type of cybercrimes they fell victim to were preventable. The report found that the most common type of cybercrimes are malware, scams and threats targeted at mobile devices. However many people tend to underestimate the dangers of online crime thinking that it will happen to everyone else but themselves. The survey found that seven out of 10 adults thought they would more likely be a victim of physical crime rather than an online crime. “This is a lingering attitude users have when they are offline and it gets replicated when they are online,” Effendy said. The report also found that men, particularly those in the generation Y demographic, are most likely to become victims of cybercrimes. “Men spend more time online and do more ‘dangerous’ activities,” Effendy said. The report stated that more men watch adult content, gamble and participate in online dating sites compared to women. “All these are social engineering techniques and it’s quite easy to fall victims to such tactics,” Effendy said.…

    • 558 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Recently the terms "governance" and "good governance" are being increasingly used in development literature. Bad governance is being increasingly regarded as one of the root causes of all evil within our societies. Simply put "governance" means: the process of decision-making and the process by which decisions are implemented (or not implemented).…

    • 6489 Words
    • 21 Pages
    Powerful Essays