1 / 22

Computer Crimes

Computer Crimes . Wikipedia. World-wide data base of information that can be edited by anyone Uses programs to monitor malicious behavior Effective? Ex: 2008 Presidential Election. What Is Crime?. It is define: instance of negligence injurious to the public welfare or morals

havyn
Download Presentation

Computer Crimes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crimes

  2. Wikipedia • World-wide data base of information that can be edited by anyone • Uses programs to monitor malicious behavior • Effective? • Ex: 2008 Presidential Election

  3. What Is Crime? • It is define: • instance of negligence • injurious to the public welfare or morals • Ex: Murder, Stealing, Breaking and Entering

  4. What Would You Do? • Example: You are sitting in your classroom when… • You see a man outside mugging an old lady AND • You see a random person in the corner smugly typing on his computer Who would you go to first and why?

  5. How Does Crime Interact with Technology? • Also called “Cyber Crimes” • Defined as: • the use of information technology for illegal purposes • unauthorized access of a computer system • damage, delete or alter the data present in the computer.

  6. Genres of Computer Crimes 1.) New Versions of old crimes ex: Theft, Fraud, Stalking, Libel, and Defamation 2.)Crimes that couldn’t exist without computers or are directed at computers ex: Virus, Denial-of-Service Attack, and Inappropriate Pinging

  7. Which Is Worse? • Example: Child Pornography v. Rape • Pornography is one of the most frequent computer crime to date • Every second - 28,258 Internet users are viewing pornography • 3% of college women nationally have experienced rape or attempted rape during the academic year. • Ex: A campus with 6,000 coeds will have an average of one rape per day during the school year.

  8. Hacking • In olden days, considered to be computer enthusiasts who found new things to do with technology • Now, refers to those who use computers for illegal actions such as unauthorized access to computer systems and stealing proprietary software.

  9. Examples of Hacking Robert T. Morris Jr.- Created the most invasive computer worm that spread across the internet. Attempted to show security flaws, but had its own flaw which enabled people from stopping it. Charged with violating Federal Computer Fraud and Abuse Act and suspended from Cornell.

  10. Is Hacking Ever Good? • Ex: Wikileaks • “The founder of whistleblowing website Wikileaks has defended the release of almost 400,000 classified US documents about the war in Iraq.” (BBC News) • Video: http://www.bbc.co.uk/news/world-middle-east-11612731

  11. Hacker Defense Discussion Topics: 1.) All Information Should be Free Give me an example of information should not be available 2.) Benificial because it illustrates security problems that can be fixed Does hacking for the purpose of government security violate either act or rule utilitarianism?

  12. Hacker Defense cont. 3.)Gaining unauthorized access does no harm as long as hackers don’t change anything Do you believe this is true? Why? 4.)Help keep Big Brother at bay

  13. Sextortion Example • Ex: Isanybodydown.com • People send naked pictures in • Posted to site with personal information • $250 fee to get the info and picture down • What would you do if you found your picture on this website?

  14. Sextortion and Pornography • Sexortion is: • Sexual exploitation • Non-physical forms of coercion sexual favors • Pornography is: • Explicit portrayal of sexual encounters • Although some is legal, most frequented porn is not

  15. Facebook and Pornography • Facebook had almost 1 billion users • 435 children were trafficked last year in Indonesia alone • 40,000-70,000 children were involved in Trafficking. Pornography, and/or Prostitution • Is Facebook a computer crime?

  16. What About the Children? • How do we protect children from something they don’t know about? • New research suggest that the young and the old are the most vulnerable and used targets for computer criminals • http://www.wishtv.com/dpp/news/local/marion_county/cyber-crime-snapped-teens-photo-while-online

  17. What Have You Done?

  18. China and Technology • Limited use of internet • Google and Facebook are banned • Considered a crime if used without authorization • Are computer crimes a moral or objective and why?

  19. How is This Ethical? • Who is hurt by computer crimes? • Fraud, viruses, extortions, identity theft, even Facebook? • Ethical Relativism- Does this change dependent on where you are?

  20. Current Events • Ours: • Hackers in China and the Times • Financial Cyber Attacks • SnapChat • Yours:

  21. Punishing Computer Crimes • Should someone who steal someone’s identity have the same penalty as someone who goes in and steals from a bank? • Is one worse than the other? Why?

  22. Solution to Problem Is There A solution? • New Laws- what type? • Website coverage and instigation- how would we do this? • Actually downloading songs from Itunes • Buying the movie or renting it- How would that affect your recreational life?

More Related