Podcast
Questions and Answers
What was the primary purpose of the first computers created in the 1940s?
What was the primary purpose of the first computers created in the 1940s?
- Holding calculations for radars in war (correct)
- Playing games
- Sharing information
- Accessing information
The technological boom has led to decreased access to information for individuals.
The technological boom has led to decreased access to information for individuals.
False (B)
What percentage of the global population was estimated to be active internet users in December 1995?
What percentage of the global population was estimated to be active internet users in December 1995?
~0.4%
Cybercrime refers to illegal and illicit activities that share the unique ______ environment.
Cybercrime refers to illegal and illicit activities that share the unique ______ environment.
Match the category of cybercrime with it's description.
Match the category of cybercrime with it's description.
Which of the following is an example of cyber-dependent crime?
Which of the following is an example of cyber-dependent crime?
Wall's Cyber-typology includes Cyber-trespass, Cyber-deception/theft, Cyber-porn/obscenity, and Cyber-violence as distinct categories.
Wall's Cyber-typology includes Cyber-trespass, Cyber-deception/theft, Cyber-porn/obscenity, and Cyber-violence as distinct categories.
What percentage of internet users in the US committed digital piracy in 2019, leading to $111.1 billion in losses?
What percentage of internet users in the US committed digital piracy in 2019, leading to $111.1 billion in losses?
According to the content, motives for hackers may vary by the type of ______ being carried out.
According to the content, motives for hackers may vary by the type of ______ being carried out.
Match the type of hacker with their description.
Match the type of hacker with their description.
Which of the following is an example of how hackers can exploit medical devices?
Which of the following is an example of how hackers can exploit medical devices?
A bot is a flaw in software that produces an undesirable outcome.
A bot is a flaw in software that produces an undesirable outcome.
What is the primary purpose of ransomware malware?
What is the primary purpose of ransomware malware?
A ______ is a type of malware that disguises itself as a normal program or file.
A ______ is a type of malware that disguises itself as a normal program or file.
Match the following types of malware with their descriptions:
Match the following types of malware with their descriptions:
Which of the following best describes the primary actions of a worm in computer terminology?
Which of the following best describes the primary actions of a worm in computer terminology?
Cyber-enabled crimes utilize digital technologies to facilitate or augment more traditional crimes
Cyber-enabled crimes utilize digital technologies to facilitate or augment more traditional crimes
What is the term for impersonating legitimate exchanges to trick individuals into revealing confidential information via digital communication?
What is the term for impersonating legitimate exchanges to trick individuals into revealing confidential information via digital communication?
Deception & theft is the category of cyber-enabled crime that includes copyright ______, misinformation, and illicit trade.
Deception & theft is the category of cyber-enabled crime that includes copyright ______, misinformation, and illicit trade.
Match the cybercrime with a description.
Match the cybercrime with a description.
What is the primary purpose of the process known as identity theft?
What is the primary purpose of the process known as identity theft?
Copyright infringement is strictly classified as theft.
Copyright infringement is strictly classified as theft.
In digital piracy, what type of networks facilitate computers trading data between each other anonymously?
In digital piracy, what type of networks facilitate computers trading data between each other anonymously?
The global reach of the internet has enabled ______, advertising, and politics, indoctrinating citizens.
The global reach of the internet has enabled ______, advertising, and politics, indoctrinating citizens.
Match the description with the correct online illicit trade term.
Match the description with the correct online illicit trade term.
What is a key challenge in law enforcement on the dark web?
What is a key challenge in law enforcement on the dark web?
Image-based sexual abuse requires consent from the portrayed person(s) for the distribution of sexually explicit material.
Image-based sexual abuse requires consent from the portrayed person(s) for the distribution of sexually explicit material.
What type of material is considered illegal, even if between two consenting young people in Australia?
What type of material is considered illegal, even if between two consenting young people in Australia?
The use of internet, email, or other electronic communications devices to relentlessly harass or threaten another is defined as ______.
The use of internet, email, or other electronic communications devices to relentlessly harass or threaten another is defined as ______.
Match the following actions with their cyberbullying description.
Match the following actions with their cyberbullying description.
According to General Strain Theory, strain leads to negative emotions. What is the likely result of these emotions?
According to General Strain Theory, strain leads to negative emotions. What is the likely result of these emotions?
Space-transition theory posits that online behavior mirrors offline behavior.
Space-transition theory posits that online behavior mirrors offline behavior.
What term describes justifications for actions allowing offenders to temporarily drift away from law-abiding norms and engage in crime?
What term describes justifications for actions allowing offenders to temporarily drift away from law-abiding norms and engage in crime?
According to ______, young people may come to drift in and out of engaging in cybercrimes as a function of the cyberspace allowing adolescents to.
According to ______, young people may come to drift in and out of engaging in cybercrimes as a function of the cyberspace allowing adolescents to.
Identify the correct definitions of the listed types of crime.
Identify the correct definitions of the listed types of crime.
Which approach centers around early parenting socialization and the regulation of antisocial behavior?
Which approach centers around early parenting socialization and the regulation of antisocial behavior?
Theorists argue crime is simple.
Theorists argue crime is simple.
What is the definition of self-control?
What is the definition of self-control?
Crime and deviance cannot occur without the situation allowing for it to occur, and those with low self-control would feel compelled or unable to withhold with ______ given the opportunity.
Crime and deviance cannot occur without the situation allowing for it to occur, and those with low self-control would feel compelled or unable to withhold with ______ given the opportunity.
Combine the description with the crime.
Combine the description with the crime.
Flashcards
CSIRAC
CSIRAC
First programmable computer, made in the 1940s in Australia.
Technological Boom benefits
Technological Boom benefits
Connection to others, access to information, and ability to share information.
Cyber Crime
Cyber Crime
Acts explicitly prohibited by law, and hence illegal.
Cyber Deviance
Cyber Deviance
Signup and view all the flashcards
Cyber-enabled Crime
Cyber-enabled Crime
Signup and view all the flashcards
Cyber-dependent Crime
Cyber-dependent Crime
Signup and view all the flashcards
Cyber-Trespass
Cyber-Trespass
Signup and view all the flashcards
Cyber-Deception/Theft
Cyber-Deception/Theft
Signup and view all the flashcards
Cyber-Porn/Obscenity
Cyber-Porn/Obscenity
Signup and view all the flashcards
Cyber-violence
Cyber-violence
Signup and view all the flashcards
Social harms of cybercrime
Social harms of cybercrime
Signup and view all the flashcards
Economic harms of cybercrime
Economic harms of cybercrime
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Hacker
Hacker
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Bot
Bot
Signup and view all the flashcards
Bug
Bug
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Rootkit
Rootkit
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Anonymity
Anonymity
Signup and view all the flashcards
Identity Theft
Identity Theft
Signup and view all the flashcards
Copyright Infringement
Copyright Infringement
Signup and view all the flashcards
Digital Piracy
Digital Piracy
Signup and view all the flashcards
Propaganda
Propaganda
Signup and view all the flashcards
Misinformation
Misinformation
Signup and view all the flashcards
Deepfakes
Deepfakes
Signup and view all the flashcards
Online Illicit Trade
Online Illicit Trade
Signup and view all the flashcards
The Dark Web
The Dark Web
Signup and view all the flashcards
Image-based sexual abuse
Image-based sexual abuse
Signup and view all the flashcards
Child sexual abuse material
Child sexual abuse material
Signup and view all the flashcards
Cyberbullying
Cyberbullying
Signup and view all the flashcards
Cyberstalking
Cyberstalking
Signup and view all the flashcards
Cybercriminology
Cybercriminology
Signup and view all the flashcards
General Theory of Crime
General Theory of Crime
Signup and view all the flashcards
Digital Drift Theory
Digital Drift Theory
Signup and view all the flashcards
Study Notes
Technology in Society
- The first programmable computer was made in the 1940s.
- Weighing seven tonnes, computers are still around today.
- Engineers initially made computers for radar calculations during wars.
- Technological advancements have led to increased connections, access to information, and ability to share data.
- There is an increased reliance on devices to access opportunities and societal pressures.
- In December 1995, there were 16 million active internet users, representing approximately 0.4% of the global population.
- December 2003 saw 719 million active internet users, marking about 11% of the global population.
- By January 2024, 5.35 billion people were active internet users, representing about 66% of the world’s population.
- Over 90% of internet users are accessing the internet via mobile devices.
- Unequal access to technology exists both between countries and within them.
- Patterns of exclusion, such as employment, income, education, ethnicity, and disability impact access
- Offender/victim characteristics are important for criminological research
Cybercrime
- Cybercrime presents both benefits and risks, serving as the course's central focus.
Defining Cybercrime
- Computer crime involved perpetrators using special knowledge of computer technology, and computers were primarily in government and universities.
- Cybercrime is defined as perpetrators using special knowledge of cyberspace, facilitated by the internet, bringing computers into homes.
- Cybercrime includes a range of illegal activities within the electronic environment
- Cybercrime can be further classified as crime or deviance and enabled or dependent.
- Crimes are acts explicitly prohibited by law, such as online child sexual abuse.
- Deviance includes acts breaching informal social norms, like adult pornography, and varies regionally.
- What is deviant may become criminal and determining criminal/deviant acts can be inconsistent.
- Laws vary across jurisdictions due to differing social and cultural contexts, often reflecting the dominant culture rather than the majority.
- Common forms of cybercrime and deviance include hacking, malware, and spamming, fraud, identity theft, online child sexual abuse, hate speech, and cyberstalking.
Classifying Cybercrime
- Categorization of cybercrime and deviance,used by police/policymakers, classifies crimes as cyber-enabled or cyber-dependent.
- Cyber-enabled crimes involve using technology to augment traditional crimes, such as cyber-fraud or cyberbullying.
- Cyber-dependent crimes involve creating new opportunities using technology, such as hacking networks or deploying malware.
- Wall's cyber-typology (2001) categorizes cybercrime based on intent and outcomes, including cyber-trespass, cyber-deception/theft, cyber-porn/obscenity, and cyber-violence.
- Cyber-trespass involves unauthorized crossing of boundaries online where ownership rights are established.
- Cyber-deception/theft is the illegal acquisition of information or materials online.
- Cyber-porn/obscenity involves publishing or trading sexually explicit materials online.
- Cyber-violence involves creating, distributing, or soliciting injurious, hurtful, or dangerous materials.
- Social harms of cybercrime/deviance include shame, stigma, self-injurious behavior, alcohol/drug abuse, eating disorders, and further exploitation.
- Economic harms include a $111.1 billion loss from digital piracy annually in the US, and 70% was committed by internet users (2019).
Cybersecurity Details
- Hacking results in a $100 billion loss annually in the US(2017)
- General cybercrime causes $33 billion in self-reported losses in Australia (2021)
- The global economic cost of cybercrime is $6 trillion annually (2019).
- The internet facilitates interactions, empowers information access, and provides anonymity.
- The internet facilitates criminal behavior and identity and commitment formation
- Cybercriminals may be financially motivated, often using hacking, fraud, or identity theft, and can be various individuals.
- Cyber 'activists' or ‘hacktivists' hack for political or religious reasons; an example is Anonymous, like DDoS attack against Aus Parliament
- Others may be revenge-motivated, like disgruntled employees or ex-partners.
- The ‘explorers' may not be malicious but testing skills, or examining boundaries.
- Young people, being more likely ‘deviant,’ are vulnerable to involve in cybercrime and escalation.
- Cybercrimes can occur in physical spaces like homes or schools and on various devices like laptops or phones.
- Internet places crimes occur are social media, forums, or the dark web.
Cybercrime & Reading
- Issues around policing are jurisdiction, definitions, anonymity, etc
- Some individuals do not feel comfortable providing personal information, as it is a violation of their privacy. Younger individuals do no share the same views.
- Individuals over 55 make up 13% of Facebook users
- There is a generational gap in technology and how one adapts to technology
- David Wall (1998) used the term "cybercrime" to refer to crimes performed online.
- Grabosky (2001) used the term computer crime to refer to computer misuse.
- Cybercrime involves "special knowledge of cyberspace," while computer crimes use "special knowledge about computer technology"
Cybercrime Categorizing
- Categorization is used by police/policymakers showing how technology is used in commission of crime
- Cyber-enabled crimes augment traditional crimes through technology
- Cyber-dependent crimes create new opportunities through technology
- Wall's Cyber-typology unauthorized crossing of boundaries where ownership rights are established online.
- Cyber-deception/theft are illegal means of acquiring information online
- Cyber-porn/obscenity is publishing or trading sexually sexual material online
- Cyber-violence is creating/distributing injurious or dangerous content online'
Hacker Profile
- Hacking motivations include: financial gain, political agenda, revenge, or skill advancement.
- Motivations vary by the activity.
- A hacker's profile and offending pathways vary based on activities and motivations.
- Communities connect hackers
- Hacking requires internet access, a device, and computer knowledge from education or peers.
- To hack requires a target, a victim, and motivation, as well as the security / lack of, awareness, equipment and knowledge
- Barriers to hacking include policing / law and the hacker's location
Hacking Overview
- Hackers are now computer programmers but are now malicious users
- Definition: "identifying weakness in computer systems or networks to exploit its weaknesses to gain access"
- Media often give 'hacker' a bad connotation
- Laws reflect this attitude & government does not like hackers
- Many government agents don't bother differentiating skill testing v. spy
Classifying why Hackers Hack
- Broad categories on why Hackers hack
- (1) White hat - Ethical and non - malicious reasons,testing their own security system for vulnerability
- (2) Black hat - Breaks into computer security without permissions and using technology for malicious purposes
- (3) Gray hat - Surfs internet and hacks into computer systems system to notify admin and sell their abilities to repair system at price
How Hackers Hack and Resulting Malware
- Wiretapping Amazon and hacking a car or medical devices
- Connecting devices to wireless networks is for reporting purposes
- Vulnerabilities pacemakers, heart monitors, insulin pumps from researcher discovery
- Most common act is financial funds transfer or identify theft
Hacking Techniques
- Common practices are to use password guessing/ brute forcing until information or database is comprimised
- Hackers also sniff passwords if encryption is lacking
- Exploit common database server default like, Lots of functionality enabled and sometimes insecurely configured in an attempt of business-partner hack
- Common malware types include: Adware, Bot, Bug, Ransomware, Rootkit, Spyware, and Trojan Horse
- Distinguish between Computer worm and virus
Hackers - Reasons
- Hackers use tools to gain access or destroy
- Their actions are either financial, gain power or sense of chaos
- Revenge, bragging rights, and "pushing the envelope" also play a role
How Hackers and Cybercrime Evolve
- Evolving with Biometrics, Breach, Mimicked conversions and, Assistant Robots
- Technology creates crimes and deviance
- Classifications are: Deception/theft ( fraud, copyright infringement, misinformation trade) & pornograhy or violence
- Factors that facilitate crime Anonymity, Data Pools, Instant interaction Social media leads to a great area for crime commition
Crime and Social Media
- Create connection, create community, create entrepreneurship
- Fraud Theft copy righr infingement trade
Cyber fraud explained
- Cyberfraud top 10 reported and fraud are act of despretation and missed Identity theft credit card theft priracy
Cyber fraud described
- Is the stealing of a victimes info
- Used to help establish same type or establish credit cards
- Can be intercept email or phone calls
What if Someone Steals Your Identity?
- Some cases it takes 5,840h to try and correct the issue
- Profit hackes in different levels of info Less the five gets investigated for time reasons
Digital Copyrights
- Not sticht thef autorization of use property Trade markes Digital pirates high More anomny More people do at once
Where do Hackers Fall in With Copyrights
- Dones matter if for commersal porpuse When createt fair use Taching reurch Digital Pirated content Easy and instant asscesss with peer to peer networks No sent server sharing and easily Bitorrete common supsuprasova iso hunt Directors author people
Hackers and Digital Copy Rights
- Hacking with distribution is fincial gain Downlowding not crime For conte Inoframion with ads Worlds with posater Today politics and ads overal reach of internet Fake or idos Pimarly for praphu Anyone can Ten those a week hove and bounds The dark website enable actions weapons, wild life
How do Criminals Use the Dark Web
- Law anfortan is encryption making trace Attribution routing. Onjon fluurationo dyic Victiume of trade Sellesrs reason fincall Buyers reasons for access of harm or pedifilial
Crime Using Tech
- Development leading crato and dish of sentua contion and Mobiules created web allow comption connectom
Sex and Internet Dangers and Sexual Assault
- Imges that are public via content to perperst Image are consent Coseion Austila laws gainst Removed abuse 5 is austriila 13.4 all Reust Thees is Internt estay Anons CSAM
What if you see Child sexual abuse
- Offend in child of younf Explaing or Yhng child Bullying Is aglbally and Over and perpet Poos outco Tads beomes tech
Hacker Violence
Cyber stalking is dangerous to youth Can use messeges to
Cyberviolence Explained
- Offend young be
Criminological theory
Explanation why people commit crimes
Devince through why devolp Factios drive chrm Bipo inter Sopalisatilin stain May help in certai terriws
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.