Cybercrime And Its Impact On

Topics: Social network service, E-mail spam, Computer crime Pages: 41 (1541 words) Published: April 15, 2015
Cybercrime and its Impact on
New Media and Discourse

Robert M. Hayes, Professor Emeritus, UCLA
Information Technology and Journalism Conference
Dubrovnik, Croatia
24 May – 28 May 2010

My Website
 http://polaris.gseis.ucla.edu/rhayes/courses/courses.htm  This PowerPoint presentation is available at that site.
Simply click on “Other” and it is the first entry there.

Introduction
 Cybercrime
 Social Networking:
The New Media and
Means for Discourse

The Contexts of Cybercrime
1. Cybercrimes against individuals
2. Cybercrimes against groups
3. Cybercrimes against property
4. Cybercrimes against corporations
5. Cybercrimes against governments

1. Cybercrimes against individuals





Identity Theft
Sexual Predation
Confidence tricks and con artists
Financial Predation

 It is fascinating to observe the number of cybercrimes
against individuals that are reported on a daily basis
 Just within the weeks before my departure for this trip, the following items were in the LA Times and Daily News:




It was the text message of their lives, May 6, 2010
Facebook as a target for Internet criminals, May 15, 2010
Gruesome death photos and Internet privacy, May 15, 2010

 And, believe me, these are just a sample.

2. Cybercrimes against groups



The Game Online
System Predators

 Again, it is fascinating to observe the number of
reported attacks against groups, such as the following:


UC San Diego professor studies disobedience, Mat 7, 2010

3. Cybercrimes against property


Violations of Intellectual Property Rights

4. Cybercrimes with corporations







Denial of Service
Cracking
Unauthorized access
Financial Manipulations
Violations of Record Keeping Laws
Spamming

5. Cybercrimes against Governments



Cyberterrorism
Cyberwar

Internet Social Networking





Internet Social Networking sites
Internet Dating Sites
Scientists Strive to Map the Shape-Shifting Net
Internet paradox: A social technology that reduces socia
l involvement and psychological well-being?

Social Networking in Cybercrimes
 Identity Theft
 Sexual Predation
 Internet Bullying
 Internet Harassment
 Con Games
 Cyberterrorism
 Cyberwar

Governmental Efforts
 U.S. National Efforts
 U.S. State Efforts
 International Efforts

U.S. National Legislation
















Counterfeit Access Device & Computer Fraud & Abuse Act of 1984 Computer Fraud and Abuse Act of 1986
The Electronic Communications Privacy Act of 1986
Telephone Consumer Protection Act of 1991
The National Information Infrastructure Protection Act of 1996 The Communications Decency Act (CDA) of 1996
Fraud and Related Activity in Connection with Computers of 1996 The No-Electronic Theft Act (NET Act) of 1997
The Child Online Protection Act (COPA) of 1998
The Protection of Children from Sexual Predators Act of 1998 Digital Millennium Copyright Act of 1998
The Patriot Act of 2001
Do-Not-Call Implementation Act of 2003,
CAN-SPAM Act of 2003
Enforcement of Intellectual Property Rights Act of 2008



Agency Procedures










Reporting of Cybercrime
Determining relevant laws
Court warrants for procedures
Identifying crimes
Identifying perpetrators
Prosecuting perpetrators
Investigating and gathering evidence

Active Cases

U.S. State Legislation








Nevada
Arizona
Florida
Massachusetts
California
Washington
Texas

International Efforts

What can individuals do to
protect themselves?
 Prevention
 Caution
 Protection
 Proaction

Some relevant web sites:
 http://abcnews.go.com/Technology/TheLaw/teens-charged-bullying-mass-girl-k ill/story?id
=10231357 Teens Indicted After Allegedly Taunting Girl Who Hanged Herself Nine Teens Accused of Cyberbullying Phoebe Prince, 15. By RUSSELL GOLDMAN March 29, 2010
...

References:  Asokhia, M. O. (2010). Enhancing National Development and Growth
through Combating Cybercrime/Internet Fraud: A Comparative
 Arquilla, John & Ronfeldt, David (1996). The Advent of Netwar: Analytic
Background
 Brenner, S. (2007) Law in an Era of Smart Technology, Oxford: Oxford
University Press
 Clarke, Richard A. (2010). Cyber War. HarperCollins.
 Csonka P. (2000) Internet Crime; the Draft council of Europe convention
on cyber-crime: A response to the challenge of crime in the age of the
 “Cybercrime More Profitable Than Drugs”, Sydney Morning Herald, June
9, 2009 http://news.smh.com.au/breaking-news-national/cyber-crime-moreprofitable-than-drugs-20090609-c1qm.html
 Fafinski, S. (2009) Computer Misuse: Response, regulation and the law.
 Faturechi, Robert. “It was the text message of their lives”. Los Angeles
Times, May 6, 2010
 Grabosky, P. (2006) Electronic Crime, New Jersey: Prentice Hall
 Kraut, Robert; Patterson, Michael; Lundmark, Vicki; Kiesler, Sara;
Mukophadhyay, Tridas; Scherlis, William. (1998). “Internet paradox: A
social technology that reduces social involvement and psychological wellbeing?”
 Krone, T., (2005). High Tech Crime Brief. Australian Institute of
Criminology
 Longe, O.B. (2004): Proprietary Software Protection and Copyright
issues in contemporary Information Technology
 McQuade, S. (2006). Understanding and Managing Cybercrime,
Boston: Allyn & Bacon.
 McQuade, S. (ed) (2009) The Encyclopedia of Cybercrime,
Westport, CT: Greenwood Press.
 Parker D (1983) Fighting Computer Crime, U.S.: Charles
Scribner’s Sons.
 Smith, R. G., Holmes, M. N. &Kaufmann, P. (1999): Nigerian
Advance Fee Fraud., Trends and Issues in Crime and Criminal
 Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling.
 Walden, I. (2007) Computer Crimes and Digital Investigations. Oxford: Oxford
University Press.
 Wall, D.S. (2007) Cybercrimes: The transformation of crime in the information
age
 Williams, M. (2006) Virtually Criminal: Crime, Deviance and Regulation
Online, Routledge, London.
 Vernor, Jeff; Parija, Soubhagya; McGuire, Russell (2010). Identification of
Emerging Risk Using Bayesian Conditional Probability
 Zeviar-Geese, G. (1997-98). The State of the Law on Cyberjurisdiction and
Cybercrime on the Internet
of International Law. Volume 1. 1997-1998.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cybercrime Essay
  • Cybercrime Essay
  • Cybercrime Essay
  • Essay about Cybercrime
  • cybercrime Essay
  • Cybercrime and Its Impact in Bangladesh Essay
  • Cybercrime Essay
  • cybercrime Essay

Become a StudyMode Member

Sign Up - It's Free