Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.

Similar presentations


Presentation on theme: "Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved."— Presentation transcript:

1 Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.

2 Defining and Measuring Cybercrime How does modern society cope with the threats caused by the ubiquity of technology? Internet access and technology have affected all aspects of modern life Communications Finance and business Medicine Private entities This has benefits but also results in costs Copyright © 2016 Thomas J. Holt. All rights reserved.

3 Costs of Growth of Technology Growth has spawned a range of deviant and criminal behaviors Pose unique challenges to law enforcement and legal system Massive numbers of victims with little effort Attacks against nations/states Little time or money invested Allows for a significant degree of anonymity Significant threat creates a strong need to identify and understand online criminality Copyright © 2016 Thomas J. Holt. All rights reserved.

4 Defining and Measuring Cybercrime Cybercrime Perpetrator uses special knowledge of cyberspace Computer crime Perpetrator uses special knowledge about computer technology Various definitions Among government agencies National agencies Copyright © 2016 Thomas J. Holt. All rights reserved.

5 Global Cyber Law Survey Consensus crimes include Unauthorized access Computer-mediated espionage Privacy violations Damage or theft of computer hardware Illicit tampering of data or files Computer or network sabotage Use of information systems to commit fraud, forgery, and “traditional crimes” Copyright © 2016 Thomas J. Holt. All rights reserved.

6 Definitional and Measurement Issues Countries can agree on what behaviors constitutes cybercrime Few nations define what cybercrime is Affected by industrialization level Significant undercounting of these crimes Crimes go unreported Confusion over how or where to file reports Barriers to research Lack of statistical measures, quality data Copyright © 2016 Thomas J. Holt. All rights reserved.

7 Cybercrime Framework Cyber-trespass Cyber-deception/Theft Cyber-porn/Obscenity Cyber-violence Copyright © 2016 Thomas J. Holt. All rights reserved.

8 Cyber-trespass Crossing of invisible yet salient boundaries of ownership online Most notable example of cyber-trespass criminals are computer hackers Hackers are individuals with desire to penetrate systems they do not own Copyright © 2016 Thomas J. Holt. All rights reserved.

9 Cyber-trespass: Hackers Individuals with a profound interest in computers and technology that have used their knowledge to access computer systems Malicious or ethical purpose alike More hackers are tied to criminal breaches of networks Also responsible for malicious software programs or malware Copyright © 2016 Thomas J. Holt. All rights reserved.

10 Computer Malware Computer viruses, worms, Trojan horse programs Alter functions within computer programs and files Disrupt email and network operations Access private files Delete or corrupt computer software or hardware Enable identity theft, fraud and loss of personal information Pose significant threat to users around globe Significant costs and losses Copyright © 2016 Thomas J. Holt. All rights reserved.

11 The full set of PowerPoint slides is available upon adoption. Email bhall@cap-press.com for more information.


Download ppt "Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved."

Similar presentations


Ads by Google