 Contemporary issues: Cyberspace By Toby and Michael.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
How to protect yourself, your computer, and others on the internet
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Contemporary Issues: The Individual and Technology
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
The Internet is Forever
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
ON LINE SAFTEY AND CYBER BULLYING DO U NO WHO R U TLKG 2?
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
Information Systems Unit 3.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
Sarah Manuel Final Presentation MCO435-Social Media.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Judith Davis – Community Safety Officer Northumberland County Council.
To Know what Cyber crime is
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
A Project on CYBER SECURITY
COMPUTER CRIME.
Ethical Use of Computers
Presentation transcript:

 Contemporary issues: Cyberspace By Toby and Michael

Introduction Cyber space is the environment in which electronic communication occurs; the culture of the internet.

The Nature of Cyberspace  There are three distinctive features of cyberspace: It facilitates anonymity – it allows anyone to say anything and remain anonymous, or have a fake identification. Creativity – the internet allows for information and service to be accessible to almost anybody. Individuals or groups can create software and further develop the internet. Global – the internet is accessible globally. Individuals from different countries can communicate and international online communities may be established. Information or ideas can be spread across countries.

Cybercrimes  A cybercrime is criminal activities committed via the use of the internet and computers.  Types of Cybercrime may include: Hacking Internet fraud Spam

Hacking (Cybercrime)  Hacking is an unauthorized access to data held in a computer or computer system. Changing data and interfering with electronic communication between devices is also considered hacking.  The Cybercrime Act 2001 (Cth) recognised offences pertaining to computers, data and the internet. These offences are recognised as federal offences under the legislation. Although in some cases they can be charged under the states powers. In some cases such as R v Boden (2002) in Queensland they can be both charged under laws that do not directly relate to cyberspace. In this case Boden hacked into the sewage system pumps which released a million liters of sewage around the sunshine coast area. He was then charged under the terms of the Criminal Code 1899 (Qld) which prohibits the use of identification information to commit an indictable offence.

Internet Fraud  Fraud is intentional misrepresentation or concealment in order to deceive or mislead.  Internet fraud can be carried in a number of ways often with conjunction to hacking.  Fraud may also be perpetrated through the use of fake websites.  An example of internet fraud is a scam, which is an attempt to obtain money through deception.  scams – these are well known scams. Often they promise large rewards for aiding an organisation or bank with financial difficulty. It involves transferring money electronically and supplying banking details.  Phishing – this is another common form of a scam where an is sent asking for account details.

Spam  Spam is junk mail received electronically. Most spam is harmless however, a lot of spam is designed to be damaging to the recipient. Spam can be used for the purpose of fraud and can advertise unwanted items.  spam act 2003 (Cth) – it is illegal to send unsolicited commercial electronic messages through , instant message services (im), sms, text, phone or multimedia message service (mms). It is enforced by the Australian Communications and Media Authority (ACMA). This act also amended other statuaries that allow for the enforcement against spam.

Law Reform:  Cybercrimes are new to the legal system and is continuously changing and so the law is also required to do so, to protect peoples rights. Many of these statutory laws have only been made in the past 20 years.  For law reform to be effective in the cyberspace it must be broad and introduced quickly to keep up with the dynamic and growing cyberspace.  ‘Unique Cases’ may arise and the courts must generate precedents to adapt to these cases.

Significant Events  Threats –  A teenage student threatened to kill two of his teachers and a school girl on his MySpace website in  A guy in WA posted a YouTube video which showed him making threatening comments towards people of a particular ethnic and religious groups.

Continued.  Stalking (online)  In 2009 an individual from Victoria copied pictures from a girl’s profile and posted them on adult websites along with her name and contact details. Police investigated the case.  In 2011 an American girl received threatening messages and unwanted gifts from a teenage boy. He was arrested under stalking.

Continued..  Defamation  In 2009 a teenager in SA made a harassment page on Facebook that made false accusations of a local police officer. He was sentenced to a two year good behavior bond for defamation.  Gutnick v Dow Jones & Co Inc. [2001] Victoria VSC was a case in the Victorian Supreme Court. The case was about the company posting on a financial journal website labeled ‘Barron’s Online’. It alleged that Gutnick had irregularities in business dealings with religious charities and with a convicted criminal Nachum Goldberg. The High Court dismissed an appeal by Dow Jones to have the court case heard in America, stating it was under Victorian jurisdiction. Gutnick successfully sued the company for defamation. The case made the precedent to the place that material is viewed is where the jurisdiction comes under rather than the location it was posted at.

Summary on Events  These events indicate that the law was administered from existing statutes, and that were not directly related to cyberspace. This may demonstrate a need for reforms/amendments in the future to aid interpretation of statutes and apply them to cybercrimes.

Conditions that gave rise to law reform  The increasing frequency of cybercrime is seen as the main condition of cyberspace law reform. Societies’ views on these crimes have remained relatively the same; however the increasing frequency of these crimes are getting the attention of the public.  This is a graph about the amount of cybercrime cases that are reported to this website.

Legal Responses  The law reforms such as the Cybercrime Act 2001 have made changes such as requiring encryption data to be released from computers; and banning some security software which allowed for complete anonymity, which contradicts some of the common law decisions made in the courts.  Some laws such as the Cybercrime Legislation Amendment Act 2012 (Cth) have been introduced to allow for greater co- operation with other countries in investigating crimes. Also some companies may keep records of conversations of employee’s. Some argue that this legislation is ‘invading their privacy’.

Difficulties of Enforcing (Effectiveness)  It is mostly anonymous.  There is no ‘nation boundaries’ so crimes can be committed across two nations. Therefore it is difficult to enforce or punish crimes committed in multiple nations. (e.g. which jurisdiction does it come under?) Another issue is that a crime in one nation may not be a crime in another in regards to the cyberspace.  People can have fake accounts on websites and make it difficult to identify the individual or group.  There is a lot of cyber crimes. It makes it difficult to investigate the crimes if there are so many of them.

 The victims rights are often not held as the perpetrator often ‘gets away’ with the crime.  Cyber crimes are relatively easy to commit instead of physically stealing money. (for example downloading a movie is easier than stealing it from the shop). Issues of Cybercrimes (Effectiveness)

THE END