Cybercrime Flashcards
What does computer crime involve? Moore 2005
Computer crime involves commission or targeting of crime through computers or networks (Moore, 2005)
What is the essay about? What academics are you focusing on?
Essay is about challenges created by cybercrime through use of criminological theories and academics such as Matthew Williams, David wall, and David Lyon in order to apply RAT to determine how the challenges have become apparent
What did halder and jashankbar 2011 define cybercrime as?
Halder and jasqhankbar 2011 define it as offences committed with motivations of harm or loss directly or indirectly using modern technology
What does cybercrime encompass? What 4 categories did wall 2001 put it into?
Cybercrime encompasses a broad range of activities. Wall 2001 divided it into 4 categories; cyber trespass (hacking/viruses), cyber theft (phishing/fraud), cyber porn and cyber violence (hate speech/stalking).
What is an example of cybercrime? (Yar 2006)
An example of cybercrime is Gary McKinnon who has been charged for various crimes for hacking unto nasa and us military computers (yar,2006)
Prior to the digital revolution, what were the two other revolutions? What is the digital revolution? (Newburn, 2007)
Prior to digital revolution, industrial and information revolutions occurred, with digital revolution being change from mechanical to digital technology (newburn 2007
Currently a report estimate what about damage caused by cybercrime? What did the Microsoft report suggest about it? (Microsoft 2011)
Currently a report estimated that annual damage caused is 45 billion, however Microsoft report suggested that such survey based estimations are potentially flawed (microsoft, 2011)
Within criminology what is cybercrime? What does Lyons 2001 state about the new realm created by cyberspace and traditional crimes?
Cybercrime is the most prolific issue within criminology. Cyberspace has created a new realm where new crimes can be committed. Traditional crimes have declined while cybercrime increases, due to the porous nature of cyberspace (Lyons 2001)
What does Lyons 2001 regard about physically burgling a home compared to online phishing?
Lyons regards that it is less strenuous to phish or ha k rather than physically burgle a home.
What types of crime will the essay focus on?
Essay will focus on crimes that can be committed in traditional way or adapted for online such as phishing or online identity theft
What has the routine activity theory RAT been used to explain? What did hindleberg et al (1978) argue about differences in risks of victimisations and what they are associated with?
RAT has been used to explain differences in rate of victimisation. Hindleberg et al 1978 argued that differences in risks of victimisation are associated with differences in lifestyle, routine activities people have and the more routine they are the easier it is for criminals to plan criminal activity.
What have academics compared cyberspace to in order to claim increases in cybercrime ? What is this characterised as? (Wall and Williams 2014)
Academics have compared cyberspace to a frontier town in order to explain the rise in cybrcrime, characterised by criminal opportunities and self regulation (wall and williams 2014)
The effectiveness of self regulation has been explored by what?
Effectiveness of self regulation has been explored via RAT (williams 2015)
What do several empirical applications point to? (Choi, 2008)
Several empirical applications point to significant facts of frequent or varied routine online activity and lack of capable guardians has on cybercrime (choi 2008)
What is phishing the most common technique in what? How can credentials also be obtained (williams 2015)
Phishing is the most common technique in online identity theft, credentials can also be obtained via malware installed without user knowledge (williams 2015)