Computer crimes
1 / 22

Computer Crimes - PowerPoint PPT Presentation

  • Uploaded on

Computer Crimes . Wikipedia. World-wide data base of information that can be edited by anyone Uses programs to monitor malicious behavior Effective? Ex: 2008 Presidential Election. What Is Crime?. It is define: instance of negligence injurious to the public welfare or morals

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Computer Crimes' - havyn

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript


  • World-wide data base of information that can be edited by anyone

  • Uses programs to monitor malicious behavior

    • Effective?

  • Ex: 2008 Presidential Election

What is crime
What Is Crime?

  • It is define:

    • instance of negligence

    • injurious to the public welfare or morals

    • Ex: Murder, Stealing, Breaking and Entering

What would you do
What Would You Do?

  • Example: You are sitting in your classroom when…

    • You see a man outside mugging an old lady


    • You see a random person in the corner smugly typing on his computer

Who would you go to first and why?

How does crime interact with technology
How Does Crime Interact with Technology?

  • Also called “Cyber Crimes”

  • Defined as:

    • the use of information technology for illegal purposes

    • unauthorized access of a computer system

    • damage, delete or alter the data present in the computer.

Genres of computer crimes
Genres of Computer Crimes

1.) New Versions of old crimes

ex: Theft, Fraud, Stalking, Libel, and Defamation

2.)Crimes that couldn’t exist without computers or are directed at computers

ex: Virus, Denial-of-Service Attack, and Inappropriate Pinging

Which is worse
Which Is Worse?

  • Example: Child Pornography v. Rape

    • Pornography is one of the most frequent computer crime to date

      • Every second - 28,258 Internet users are viewing pornography

    • 3% of college women nationally have experienced rape or attempted rape during the academic year.

      • Ex: A campus with 6,000 coeds will have an average of one rape per day during the school year.


  • In olden days, considered to be computer enthusiasts who found new things to do with technology

  • Now, refers to those who use computers for illegal actions such as unauthorized access to computer systems and stealing proprietary software.

Examples of hacking
Examples of Hacking

Robert T. Morris Jr.- Created the most invasive computer worm that spread across the internet. Attempted to show security flaws, but had its own flaw which enabled people from stopping it. Charged with violating Federal Computer Fraud and Abuse Act and suspended from Cornell.

Is hacking ever good
Is Hacking Ever Good?

  • Ex: Wikileaks

  • “The founder of whistleblowing website Wikileaks has defended the release of almost 400,000 classified US documents about the war in Iraq.” (BBC News)

  • Video:

Hacker defense
Hacker Defense

Discussion Topics:

1.) All Information Should be Free

Give me an example of information should not be available

2.) Benificial because it illustrates security problems that can be fixed

Does hacking for the purpose of government security violate either act or rule utilitarianism?

Hacker defense cont
Hacker Defense cont.

3.)Gaining unauthorized access does no harm as long as hackers don’t change anything

Do you believe this is true? Why?

4.)Help keep Big Brother at bay

Sextortion example
Sextortion Example

  • Ex:

    • People send naked pictures in

    • Posted to site with personal information

    • $250 fee to get the info and picture down

    • What would you do if you found your picture on this website?

Sextortion and pornography
Sextortion and Pornography

  • Sexortion is:

    • Sexual exploitation

    • Non-physical forms of coercion sexual favors

  • Pornography is:

    • Explicit portrayal of sexual encounters

    • Although some is legal, most frequented porn is not

Facebook and pornography
Facebook and Pornography

  • Facebook had almost 1 billion users

  • 435 children were trafficked last year in Indonesia alone

  • 40,000-70,000 children were involved in Trafficking. Pornography, and/or Prostitution

  • Is Facebook a computer crime?

What about the children
What About the Children?

  • How do we protect children from something they don’t know about?

  • New research suggest that the young and the old are the most vulnerable and used targets for computer criminals


China and technology
China and Technology

  • Limited use of internet

  • Google and Facebook are banned

    • Considered a crime if used without authorization

  • Are computer crimes a moral or objective and why?

How is this ethical
How is This Ethical?

  • Who is hurt by computer crimes?

    • Fraud, viruses, extortions, identity theft, even Facebook?

  • Ethical Relativism- Does this change dependent on where you are?

Current events
Current Events

  • Ours:

  • Hackers in China and the Times

  • Financial Cyber Attacks

  • SnapChat

  • Yours:

Punishing computer crimes
Punishing Computer Crimes

  • Should someone who steal someone’s identity have the same penalty as someone who goes in and steals from a bank?

  • Is one worse than the other? Why?

Solution to problem
Solution to Problem

Is There A solution?

  • New Laws- what type?

  • Website coverage and instigation- how would we do this?

  • Actually downloading songs from Itunes

  • Buying the movie or renting it- How would that affect your recreational life?