1 / 3

Counterfeiting and Cybercrime: Stakes and Challenges.

Counterfeiting and Cybercrime: Stakes and Challenges. *Summary

medea
Download Presentation

Counterfeiting and Cybercrime: Stakes and Challenges.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Counterfeiting and Cybercrime: Stakes and Challenges. *Summary This article shows that while cybercrime and counterfeiting are related phenomena, they do not necessarily form a single global hybrid system; each network retains its own characteristics. By juxtaposing our current conceptual understandings of cybercrime and counterfeiting, we destabilize both concepts and rethink the fundamentals. We also offer some analytical tools that can enable more focused and effective countermeasures. *Reaction I agree with what the authors said because when you look at it in different perspectives counterfeiting is a vast word and it is not just used in the cyber world but also in cases of money and many aspects of real life situations. Yes, I consider them to be related because there is also counterfeiting in the cyber world Guarnieri, F., Przyswa, E., Retrieved from http://web.ebscohost.com/ehost/detail?vid=4&sid=070c07aa-d08e-4f4b-a577-494d5487a0fc%40sessionmgr13&hid=25&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=lxh&AN=89026217

  2. Cyberterrorism, computer crime, and reality. *Summary The purpose of this article is to demonstrate that cyberterrorism is real and does pose a threat. This article also proposes the use of a model of computer security to understand and defend against cyberterrorism. Furthermore, it examines the reasons for these disparate viewpoints and reviews the theoretical. The term cyberterrorism is being used with increasing frequency today. However, there is no widely agreed-upon definition. In fact, the term has been used to describe actions as varied as stealing data and hacking, planning terrorist attacks, causing violence, or attacking information systems. Cyberterrorism "is the premeditated, politically motivated attack against information, computer systems, and data which result in violence against noncombatant targets by subnational groups and clandestine agents. Distinguishing between vandalism and terrorism is becoming increasingly difficult. he intentions and motivation of the person launching the attack should be considered. *Reaction Yes, I agree that cyberterrorism does pose a threat in today’s society, for example the Philippines were visciously attacked by the Republic of China in the cyberspace and instilled unstableness in the hearts of the Philippine citizens. Folt, B., Retrieved from http://web.ebscohost.com/ehost/detail?vid=5&sid=070c07aa-d08e-4f4b-a577-494d5487a0fc%40sessionmgr13&hid=25&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=lxh&AN=14245083

  3. ONLINE HARASSMENT AMONG COLLEGE STUDENTS. *Summary Increased time spent online in combination with current Internet trends such as social networking have led to new risks for online harassment. This problem has been given much attention for adolescents, but little has been done to describe the risks of online harassment experienced by young adults, even though they exhibit Internet behavior comparable to adolescents. This study is in part a replication of a previous study that surveyed online harassment within a college population (Finn 2004). Three questions are addressed: (1) What is the prevalence of online harassment among undergraduate students at a large southwestern university? (2) What is the relationship between the senders and receivers of harassing communications? (3) What are the demographic and computer use variables associated with increased risk of online harassment? A cross-sectional survey was administered to a convenience sample of 420 undergraduates, and the final response rate was 81.4 percent (n = 342). Survey questions included items from the Finn (2004) study, and new questions about technological trends. The Finn study reported a 16.2 percent rate of online harassment compared to 43.3 percent in the current study. Computer use variables were significant in predicting the likelihood of being harassed online, e.g. time on social networking sites, owning an Internet connected phone, and having ever sent a sext message; overall demographic variables were not significant. Online harassment is an issue deserving attention from researchers, lawmakers, parents, and university communities. Further research should investigate how students are coping with harassment, including reporting practices. Evidence-based interventions targeting this emerging issue are greatly needed. *Reaction Today online harrasment is very rampant in SNS vulgar and foul words are easily said, images that depicts criticism are easily seen and college students are one of these individuals doing these

More Related