Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.

Slides:



Advertisements
Similar presentations
Crime and Security in the Networked Economy Part 4.
Advertisements

ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Unethical use of Computers and Networks
CYBER CRIME.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Nasca The agency relationship involves three parties: the genuine agent, the special agent, and the contractor. the independent.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
CHAPTER FIVE CRIMINAL LAW MUSOLINOSUNY CRIMINAL & BUSINESS LAW.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cybercrime What is it, what does it cost, & how is it regulated?
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Chapter 19.1 Cyberlaw and Cybercrime
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
COMPUTER CRIME.
Five Unethical Uses of Computers
Chapter 11 Business and Technology
HOW DO I KEEP MY COMPUTER SAFE?
Information Systems for Health:
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

 Cyberlaw– the area of law which concerns computers and computer- related crimes  Cybercrime—any criminal activity associated with a computer DEVELOPMENT OF CYBERLAW

1.Cybertresspass Approach (or computer tresspass)  Any illegal activity already in the criminal code committed by using a computer 2.Rewriting of Criminal Code  Some states have written statutes for every crime that can possibly be committed by using a computer  This is difficult since each new statute must be individually created by state legislature TWO APPROACHES TO DEVELOP CYBERLAW:

1.Cyberspoofing: When a user creates a false identity or adopts an identity of another user while using computer to commit fraud (Phishing)  False s, false websites  They attempt to lure people and obtain personal information of their victims 2.Cyberpiracy: Using a computer to steal data stored in digital format (intellectual property theft) CYBERCRIMES

3. Cyberblackmail: Use of data unlawfully obtained by computer to pressure victim into granting payoff  Users who spend time in chat rooms are vulnerable  Cyberblackmaler often befriends a person, learns damaging information, then uses it to extort money CYBERCRIMES CONT.

4.Identity Theft—using computer to steal financial, employment, educational, medical, and personal information  Attempt to obtain credit card numbers, PINS, SSN, access codes, etc.  Use the data to empty bank accounts, run up credit card bill, steal cash, and disrupt personal life. 5.Cyberterrorism—using computer person interrupts national infrastructure  Powergrids, air traffic control system, and the national defense CYBERCRIMES CONT.

4.Cybervandalism—disrupting, damaging, or destroying web site or computer network  Hackers- usually done for revenge or to attack a business 5.Cybergerm Warfare—transmit computer virus to destroy others computer files/systems  Firewalls and anti-virus software can sometimes block many viruses CYBERCRIMES CONT.

Definition—invasion, theft, falsification, misuse or deletion of data stored in computer to commit a crime 1.Cyberdefamation—communication via computer or other electronic device of false data to damage person’s reputation 2.Cyberinvasion of Privacy—unwelcome intrusion into private matters of another carried out or sustained by computer CYBERTORTS

What crime involved using a computer to obtain a payoff? What crime involved disrupting infrastructure? What crime involves using a computer to steal financial, employment, or personal information? CYBER ASSESS