Cybercrime Flashcards

1
Q

What is the darker side of the internet?

A
Illegitimate use of networks
global criminal economy
facilitate traditional criminal activity
creation of new crimes
empowers otherwise law abiding citizens
empowerd small agents (Pease 2001)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What crimes have been met with legal rationalisation?

A

Hacking, obscene electronic materials and online stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What crimes have not met legal rationalisation?

A

esoteric online behaviours such as bomb talk and some forms of online violence (virtual rape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define cybercrime

A

Distanciated
lack of social, politcal and legal recognition
offender most likely to be soscio economically privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 categories of cybercrime?

A

Faciliataes exisiting criminal activity
new crimes recognised by exisiting laws
new harms unrecgnised by laws
Wall 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to wall typology what constitutes as cyber trespass?

A

Hacking, planting of viruses, mainpulation of data, espionage, terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to wall typology what constitutes as cyber obscenity

A

Distinction between child pornogrpahy and mainstream pornogrphay
cultural, moral and legal varation
main reglatory focus on paedophilia networks
Porn industry we now have safe transactions so use money from that to help prevent child porn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to wall typology what constitutes as cyber theft?

A

appropration of intellectual property
online fraud
technology keeps changing to get round new laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Online fraud

A

Identity theft
duplication of digital information or hijacking of online accounts
phishing
spear phishing
pharming (bypasses social engineering software to automatically redirect webpages
smishing
keystroke loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How much does the national fraud authority estimate that identity theft costs the UK taxpayer per year?

A

up to £1.2 billion per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How much did global phishing attacks rise by between 2012 and 2013?

A

87% 37 million attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do phishing attmepts target?

A

Email and search (30%)
Social media (20%)
Banks (12%)
Payment services (6%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what constitutes as cyber violence?

A

flaming/trolling
hate speech
stalking
virtual rape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What percentage of people are worried about credit card fraud?

A

75%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What percentage of people are victims of virus attacks?

A

18%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many people are victims of hacking?

A

2%

17
Q

How many people are victims of email harassment?

A

12%

18
Q

How many are victims of obscenity related crimes?

A

21%

19
Q

What increases your risk of victimisation?

A
selling on auction sites
using university computers
using public computers
younger
poorer
countries with lower internet penetration
20
Q

What percentage of males and females admitted to online copyright theft?

A

20% males 9% females

21
Q

What are pscyhological harms?

A

anxiety, sleeplessness, concentration problems, avoidance, relationship breakdown

22
Q

What are physical harms?

A

online grooming, cyber staling, hate crimes, other related violence

23
Q

Hwo much does cabinet office spend on cybercrime?

A

£27 billion annually

24
Q

What are the anticipatory costs?

A

defensive (virus and snooping software, international security standards)
Precautionary (avoiding unsecure websites/services)

25
Q

What are the reactive costs?

A

Criminal justice costs

civil costs

26
Q

What are transfer costs?

A

driect losses from fraud
from victim to fraudster
from legal to illegal economy

27
Q

What theories explain cyber crime?

A

Control theory
routine activites theory
seduction of crime
deindividuation

28
Q

control theory Hirschi 1969

A

crime in online communities - attachment, commitment involvment and belief

29
Q

ROutine activities Cohen and Felson 1979

A

suitable traget, lack of suitable guardian, motivated offender

30
Q

Seduction of crime katz 1988

A

criminals make crime enticing

31
Q

Deinividuation Festinger 1952

A

anonymity, lack of public self awareness, disinhibition