Technology in Society

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What was the primary purpose of the first computers created in the 1940s?

  • Holding calculations for radars in war (correct)
  • Playing games
  • Sharing information
  • Accessing information

The technological boom has led to decreased access to information for individuals.

False (B)

What percentage of the global population was estimated to be active internet users in December 1995?

~0.4%

Cybercrime refers to illegal and illicit activities that share the unique ______ environment.

<p>electronic</p> Signup and view all the answers

Match the category of cybercrime with it's description.

<p>Cyber-enabled crime = Crimes facilitated or augmented by digital technologies Cyber-dependent crime = Crimes that can only occur through the use of digital technologies</p> Signup and view all the answers

Which of the following is an example of cyber-dependent crime?

<p>Hacking networks (D)</p> Signup and view all the answers

Wall's Cyber-typology includes Cyber-trespass, Cyber-deception/theft, Cyber-porn/obscenity, and Cyber-violence as distinct categories.

<p>True (A)</p> Signup and view all the answers

What percentage of internet users in the US committed digital piracy in 2019, leading to $111.1 billion in losses?

<p>70%</p> Signup and view all the answers

According to the content, motives for hackers may vary by the type of ______ being carried out.

<p>activity</p> Signup and view all the answers

Match the type of hacker with their description.

<p>White hat hacker = Breaks security for non-malicious reasons (e.g., testing their own security system) Black hat hacker = Breaks computer security without authorization for malicious reasons (e.g., identity theft, piracy) Grey hat hacker = Hacks into a computer system to notify the administrator of a vulnerability, sometimes offering to repair it for a fee</p> Signup and view all the answers

Which of the following is an example of how hackers can exploit medical devices?

<p>Exploiting vulnerabilities in insulin pumps to release insulin. (A)</p> Signup and view all the answers

A bot is a flaw in software that produces an undesirable outcome.

<p>False (B)</p> Signup and view all the answers

What is the primary purpose of ransomware malware?

<p>Hold a computer system captive for ransom</p> Signup and view all the answers

A ______ is a type of malware that disguises itself as a normal program or file.

<p>trojan horse</p> Signup and view all the answers

Match the following types of malware with their descriptions:

<p>Adware = Automatically delivers advertisements, often as website pop-ups. Spyware = Spies on a user's activity, such as through a keylogger. Rootkit = Designed to remotely access or control a computer without being detected.</p> Signup and view all the answers

Which of the following best describes the primary actions of a worm in computer terminology?

<p>Functioning alone, self-replicating, and 'worming' through networks. (B)</p> Signup and view all the answers

Cyber-enabled crimes utilize digital technologies to facilitate or augment more traditional crimes

<p>True (A)</p> Signup and view all the answers

What is the term for impersonating legitimate exchanges to trick individuals into revealing confidential information via digital communication?

<p>Sophisticated phishing</p> Signup and view all the answers

Deception & theft is the category of cyber-enabled crime that includes copyright ______, misinformation, and illicit trade.

<p>infringement</p> Signup and view all the answers

Match the cybercrime with a description.

<p>Cyber-fraud = Involves an act of deception or misrepresentation conducted over the internet that deprives victims of assets, money, or property. Identity theft = Involves stealing a victim's personal information to establish a new identity or access accounts. Copyright infringement = Encompasses exercising the rights of a copyright holder without their permission.</p> Signup and view all the answers

What is the primary purpose of the process known as identity theft?

<p>Establishing someone's new identity or accessing accounts. (B)</p> Signup and view all the answers

Copyright infringement is strictly classified as theft.

<p>False (B)</p> Signup and view all the answers

In digital piracy, what type of networks facilitate computers trading data between each other anonymously?

<p>Peer-2-Peer Networks</p> Signup and view all the answers

The global reach of the internet has enabled ______, advertising, and politics, indoctrinating citizens.

<p>journalism</p> Signup and view all the answers

Match the description with the correct online illicit trade term.

<p>Dark web = Used to conduct transactions for online illicit trades. Bitcoin = Derived from the first fully implemented digital currency, Bitcoin is often used for transactions in online illicit trade.</p> Signup and view all the answers

What is a key challenge in law enforcement on the dark web?

<p>Encryption that makes tracking difficult. (D)</p> Signup and view all the answers

Image-based sexual abuse requires consent from the portrayed person(s) for the distribution of sexually explicit material.

<p>False (B)</p> Signup and view all the answers

What type of material is considered illegal, even if between two consenting young people in Australia?

<p>Underaged Sexting</p> Signup and view all the answers

The use of internet, email, or other electronic communications devices to relentlessly harass or threaten another is defined as ______.

<p>cyberstalking</p> Signup and view all the answers

Match the following actions with their cyberbullying description.

<p>Sending = Mean or threatening emails or text/instant messages Posting = Embarrassing photos of someone online Creating = A website to make fun of others</p> Signup and view all the answers

According to General Strain Theory, strain leads to negative emotions. What is the likely result of these emotions?

<p>Cybercrime (B)</p> Signup and view all the answers

Space-transition theory posits that online behavior mirrors offline behavior.

<p>False (B)</p> Signup and view all the answers

What term describes justifications for actions allowing offenders to temporarily drift away from law-abiding norms and engage in crime?

<p>Neutralisation techniques</p> Signup and view all the answers

According to ______, young people may come to drift in and out of engaging in cybercrimes as a function of the cyberspace allowing adolescents to.

<p>Digital Drift</p> Signup and view all the answers

Identify the correct definitions of the listed types of crime.

<p>Digital Piracy = Downloading copyrighted material. Sextortion = Blackmailing the victim. Clickjacking = Trick users into clicking a different destination.</p> Signup and view all the answers

Which approach centers around early parenting socialization and the regulation of antisocial behavior?

<p>Gottfredson-Hirschi's General Theory of Crime (D)</p> Signup and view all the answers

Theorists argue crime is simple.

<p>True (A)</p> Signup and view all the answers

What is the definition of self-control?

<p>Internal ability to avoid behaviors whose long-term costs exceed the immediate rewards</p> Signup and view all the answers

Crime and deviance cannot occur without the situation allowing for it to occur, and those with low self-control would feel compelled or unable to withhold with ______ given the opportunity.

<p>engagement</p> Signup and view all the answers

Combine the description with the crime.

<p>Stronger associations found amongst younger populations = offline criminal/deviant behavior The theory is relevant for more basic types of crime = online criminal/deviant behavior</p> Signup and view all the answers

Flashcards

CSIRAC

First programmable computer, made in the 1940s in Australia.

Technological Boom benefits

Connection to others, access to information, and ability to share information.

Cyber Crime

Acts explicitly prohibited by law, and hence illegal.

Cyber Deviance

Acts that breach informal social norms/rules, considered undesirable, objectionable, or illicit.

Signup and view all the flashcards

Cyber-enabled Crime

Cybercrime that facilitates or augments traditional crimes using digital technology.

Signup and view all the flashcards

Cyber-dependent Crime

Cybercrime that is computer-focused, creating entirely new criminal opportunities via technology.

Signup and view all the flashcards

Cyber-Trespass

Unauthorized crossing of online boundaries where rights of ownership are established.

Signup and view all the flashcards

Cyber-Deception/Theft

The illegal acquisition of information or materials online.

Signup and view all the flashcards

Cyber-Porn/Obscenity

Publication or trading of sexually explicit materials online, sexual abuse engagement.

Signup and view all the flashcards

Cyber-violence

Creation, distribution, or solicitation of injurious, hurtful, or dangerous materials online.

Signup and view all the flashcards

Social harms of cybercrime

Negative consequences like shame, self-harm, and exploitation resulting from cybercrime.

Signup and view all the flashcards

Economic harms of cybercrime

Financial losses and impacts stemming from digital crimes.

Signup and view all the flashcards

Hacking

Gaining access to systems to gather information.

Signup and view all the flashcards

Hacker

A person who is skilled in computer technology and uses skills to gain unauthorized access to computer systems.

Signup and view all the flashcards

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

Signup and view all the flashcards

Adware

Software that delivers advertisements automatically, often unwanted.

Signup and view all the flashcards

Bot

Software that automatically performs specific operations, often repetitive tasks.

Signup and view all the flashcards

Bug

A flaw in software that produces an unexpected and undesirable outcome.

Signup and view all the flashcards

Ransomware

Malware that holds a computer system captive while demanding a ransom for its release.

Signup and view all the flashcards

Rootkit

Malware designed to remotely access or control a computer without being detected.

Signup and view all the flashcards

Spyware

Software spying on a user's activity, like recording keystrokes.

Signup and view all the flashcards

Trojan Horse

Malware disguised as a normal program or file to trick users into executing it.

Signup and view all the flashcards

Phishing

A technique used to deceive individuals into providing sensitive information via email.

Signup and view all the flashcards

Worm

Independent software that self-replicates across networks, exploiting security holes.

Signup and view all the flashcards

Anonymity

The ability to remain anonymous or untraceable online.

Signup and view all the flashcards

Identity Theft

Stealing a victim's personal information to establish a new identity or access resources.

Signup and view all the flashcards

Copyright Infringement

Exercising rights of copyright holder without authorization, like reproducing/distributing digital media.

Signup and view all the flashcards

Digital Piracy

Downloading/distributing copyrighted content digitally without permission.

Signup and view all the flashcards

Propaganda

Information used to promote a cause, often biased/misleading.

Signup and view all the flashcards

Misinformation

False or misleading information, presented as fact.

Signup and view all the flashcards

Deepfakes

Synthetic media manipulated to misrepresent someone doing/saying something they didn't.

Signup and view all the flashcards

Online Illicit Trade

Trading illegal items through online channels.

Signup and view all the flashcards

The Dark Web

The deep and encrypted portion of the internet, used for illegal transactions and content.

Signup and view all the flashcards

Image-based sexual abuse

Sexually explicit portrayal of someone distributed without their consent.

Signup and view all the flashcards

Child sexual abuse material

Content that sexualizes children and violates child protection laws.

Signup and view all the flashcards

Cyberbullying

Using digital means to harass, threaten, or intimidate someone.

Signup and view all the flashcards

Cyberstalking

Using the internet to stalk or harass someone.

Signup and view all the flashcards

Cybercriminology

The idea that traditional criminological theories may need to be adapted, or new ones created, to understand pathways to offending in the cyberspace

Signup and view all the flashcards

General Theory of Crime

The General Theory of Crime focuses on self-control as the key factor in predicting various behaviors, including criminal ones.

Signup and view all the flashcards

Digital Drift Theory

A theory where crime can better be committed when someone lowers the possibility of formal and informal social control through various means.

Signup and view all the flashcards

Study Notes

Technology in Society

  • The first programmable computer was made in the 1940s.
  • Weighing seven tonnes, computers are still around today.
  • Engineers initially made computers for radar calculations during wars.
  • Technological advancements have led to increased connections, access to information, and ability to share data.
  • There is an increased reliance on devices to access opportunities and societal pressures.
  • In December 1995, there were 16 million active internet users, representing approximately 0.4% of the global population.
  • December 2003 saw 719 million active internet users, marking about 11% of the global population.
  • By January 2024, 5.35 billion people were active internet users, representing about 66% of the world’s population.
  • Over 90% of internet users are accessing the internet via mobile devices.
  • Unequal access to technology exists both between countries and within them.
  • Patterns of exclusion, such as employment, income, education, ethnicity, and disability impact access
  • Offender/victim characteristics are important for criminological research

Cybercrime

  • Cybercrime presents both benefits and risks, serving as the course's central focus.

Defining Cybercrime

  • Computer crime involved perpetrators using special knowledge of computer technology, and computers were primarily in government and universities.
  • Cybercrime is defined as perpetrators using special knowledge of cyberspace, facilitated by the internet, bringing computers into homes.
  • Cybercrime includes a range of illegal activities within the electronic environment
  • Cybercrime can be further classified as crime or deviance and enabled or dependent.
  • Crimes are acts explicitly prohibited by law, such as online child sexual abuse.
  • Deviance includes acts breaching informal social norms, like adult pornography, and varies regionally.
  • What is deviant may become criminal and determining criminal/deviant acts can be inconsistent.
  • Laws vary across jurisdictions due to differing social and cultural contexts, often reflecting the dominant culture rather than the majority.
  • Common forms of cybercrime and deviance include hacking, malware, and spamming, fraud, identity theft, online child sexual abuse, hate speech, and cyberstalking.

Classifying Cybercrime

  • Categorization of cybercrime and deviance,used by police/policymakers, classifies crimes as cyber-enabled or cyber-dependent.
  • Cyber-enabled crimes involve using technology to augment traditional crimes, such as cyber-fraud or cyberbullying.
  • Cyber-dependent crimes involve creating new opportunities using technology, such as hacking networks or deploying malware.
  • Wall's cyber-typology (2001) categorizes cybercrime based on intent and outcomes, including cyber-trespass, cyber-deception/theft, cyber-porn/obscenity, and cyber-violence.
  • Cyber-trespass involves unauthorized crossing of boundaries online where ownership rights are established.
  • Cyber-deception/theft is the illegal acquisition of information or materials online.
  • Cyber-porn/obscenity involves publishing or trading sexually explicit materials online.
  • Cyber-violence involves creating, distributing, or soliciting injurious, hurtful, or dangerous materials.
  • Social harms of cybercrime/deviance include shame, stigma, self-injurious behavior, alcohol/drug abuse, eating disorders, and further exploitation.
  • Economic harms include a $111.1 billion loss from digital piracy annually in the US, and 70% was committed by internet users (2019).

Cybersecurity Details

  • Hacking results in a $100 billion loss annually in the US(2017)
  • General cybercrime causes $33 billion in self-reported losses in Australia (2021)
  • The global economic cost of cybercrime is $6 trillion annually (2019).
  • The internet facilitates interactions, empowers information access, and provides anonymity.
  • The internet facilitates criminal behavior and identity and commitment formation
  • Cybercriminals may be financially motivated, often using hacking, fraud, or identity theft, and can be various individuals.
  • Cyber 'activists' or ‘hacktivists' hack for political or religious reasons; an example is Anonymous, like DDoS attack against Aus Parliament
  • Others may be revenge-motivated, like disgruntled employees or ex-partners.
  • The ‘explorers' may not be malicious but testing skills, or examining boundaries.
  • Young people, being more likely ‘deviant,’ are vulnerable to involve in cybercrime and escalation.
  • Cybercrimes can occur in physical spaces like homes or schools and on various devices like laptops or phones.
  • Internet places crimes occur are social media, forums, or the dark web.

Cybercrime & Reading

  • Issues around policing are jurisdiction, definitions, anonymity, etc
  • Some individuals do not feel comfortable providing personal information, as it is a violation of their privacy. Younger individuals do no share the same views.
  • Individuals over 55 make up 13% of Facebook users
  • There is a generational gap in technology and how one adapts to technology
  • David Wall (1998) used the term "cybercrime" to refer to crimes performed online.
  • Grabosky (2001) used the term computer crime to refer to computer misuse.
  • Cybercrime involves "special knowledge of cyberspace," while computer crimes use "special knowledge about computer technology"

Cybercrime Categorizing

  • Categorization is used by police/policymakers showing how technology is used in commission of crime
  • Cyber-enabled crimes augment traditional crimes through technology
  • Cyber-dependent crimes create new opportunities through technology
  • Wall's Cyber-typology unauthorized crossing of boundaries where ownership rights are established online.
  • Cyber-deception/theft are illegal means of acquiring information online
  • Cyber-porn/obscenity is publishing or trading sexually sexual material online
  • Cyber-violence is creating/distributing injurious or dangerous content online'

Hacker Profile

  • Hacking motivations include: financial gain, political agenda, revenge, or skill advancement.
  • Motivations vary by the activity.
  • A hacker's profile and offending pathways vary based on activities and motivations.
  • Communities connect hackers
  • Hacking requires internet access, a device, and computer knowledge from education or peers.
  • To hack requires a target, a victim, and motivation, as well as the security / lack of, awareness, equipment and knowledge
  • Barriers to hacking include policing / law and the hacker's location

Hacking Overview

  • Hackers are now computer programmers but are now malicious users
  • Definition: "identifying weakness in computer systems or networks to exploit its weaknesses to gain access"
  • Media often give 'hacker' a bad connotation
  • Laws reflect this attitude & government does not like hackers
  • Many government agents don't bother differentiating skill testing v. spy

Classifying why Hackers Hack

  • Broad categories on why Hackers hack
  • (1) White hat - Ethical and non - malicious reasons,testing their own security system for vulnerability
  • (2) Black hat - Breaks into computer security without permissions and using technology for malicious purposes
  • (3) Gray hat - Surfs internet and hacks into computer systems system to notify admin and sell their abilities to repair system at price

How Hackers Hack and Resulting Malware

  • Wiretapping Amazon and hacking a car or medical devices
  • Connecting devices to wireless networks is for reporting purposes
  • Vulnerabilities pacemakers, heart monitors, insulin pumps from researcher discovery
  • Most common act is financial funds transfer or identify theft

Hacking Techniques

  • Common practices are to use password guessing/ brute forcing until information or database is comprimised
  • Hackers also sniff passwords if encryption is lacking
  • Exploit common database server default like, Lots of functionality enabled and sometimes insecurely configured in an attempt of business-partner hack
  • Common malware types include: Adware, Bot, Bug, Ransomware, Rootkit, Spyware, and Trojan Horse
  • Distinguish between Computer worm and virus

Hackers - Reasons

  • Hackers use tools to gain access or destroy
  • Their actions are either financial, gain power or sense of chaos
  • Revenge, bragging rights, and "pushing the envelope" also play a role

How Hackers and Cybercrime Evolve

  • Evolving with Biometrics, Breach, Mimicked conversions and, Assistant Robots
  • Technology creates crimes and deviance
  • Classifications are: Deception/theft ( fraud, copyright infringement, misinformation trade) & pornograhy or violence
  • Factors that facilitate crime Anonymity, Data Pools, Instant interaction Social media leads to a great area for crime commition

Crime and Social Media

  • Create connection, create community, create entrepreneurship
  • Fraud Theft copy righr infingement trade

Cyber fraud explained

  • Cyberfraud top 10 reported and fraud are act of despretation and missed Identity theft credit card theft priracy

Cyber fraud described

  • Is the stealing of a victimes info
  • Used to help establish same type or establish credit cards
  • Can be intercept email or phone calls

What if Someone Steals Your Identity?

  • Some cases it takes 5,840h to try and correct the issue
  • Profit hackes in different levels of info Less the five gets investigated for time reasons

Digital Copyrights

  • Not sticht thef autorization of use property Trade markes Digital pirates high More anomny More people do at once

Where do Hackers Fall in With Copyrights

  • Dones matter if for commersal porpuse When createt fair use Taching reurch Digital Pirated content Easy and instant asscesss with peer to peer networks No sent server sharing and easily Bitorrete common supsuprasova iso hunt Directors author people

Hackers and Digital Copy Rights

  • Hacking with distribution is fincial gain Downlowding not crime For conte Inoframion with ads Worlds with posater Today politics and ads overal reach of internet Fake or idos Pimarly for praphu Anyone can Ten those a week hove and bounds The dark website enable actions weapons, wild life

How do Criminals Use the Dark Web

  • Law anfortan is encryption making trace Attribution routing. Onjon fluurationo dyic Victiume of trade Sellesrs reason fincall Buyers reasons for access of harm or pedifilial

Crime Using Tech

  • Development leading crato and dish of sentua contion and Mobiules created web allow comption connectom

Sex and Internet Dangers and Sexual Assault

  • Imges that are public via content to perperst Image are consent Coseion Austila laws gainst Removed abuse 5 is austriila 13.4 all Reust Thees is Internt estay Anons CSAM

What if you see Child sexual abuse

  • Offend in child of younf Explaing or Yhng child Bullying Is aglbally and Over and perpet Poos outco Tads beomes tech

Hacker Violence

Cyber stalking is dangerous to youth Can use messeges to

Cyberviolence Explained

  • Offend young be

Criminological theory

Explanation why people commit crimes

Devince through why devolp Factios drive chrm Bipo inter Sopalisatilin stain May help in certai terriws

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

The Impact of Internet Friendships
5 questions
Introduction to Digital Marketing
7 questions
Número de usuários no mundo
37 questions
Sosio-Demografi dan Transformasi Digital 2023
78 questions
Use Quizgecko on...
Browser
Browser