Week 3: Criminal Activity in the Digital Society Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Ransomware

A

= when the machine is taken over through ransom and can be resetted through payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cybercrime?

A

= computer is the object of the crime (eg. catfishin) or as a tool (sale of illegal substance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

John Clough’s classification of cybercrimes

A

Cyber-dependent Crime
Can only be committed using a form of ICT

Cyber-enabled
Traditional crimes increased by using various forms of ICT i.e. hacking

Computer supported crimes
- Use of ICT is an incidental aspct to the crime and may afford evidence
- eg. CCTV or cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ease of access

A

= the knowledge of how to carry out activities that were previously limited to more knowledgable experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenges of regulating cybercrime

A
  1. Technology moves fast and changes often
  2. Is the crime still the same if it occurs in the cyberspace
    - Old wine in new bottles: Brenner 2004
    –> Behaviour is defintive factor
    –> Nulla poena sine lege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Different approaches to cyber / computer crime

A
  • Applying existing law to new activities
  • Introducing new laws to address new activities

these can be national, regional and/or international level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Covention of Cybercrime

Council of Europe

A
  • Obligations on states to establish criminal offenses
  • Obligations to create powers to investigate
  • Obligations to create jurisdition
  • Obligation regarding international cooperation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enforcing and managing law

A

Traditionally: law enforcement
Now: Intermediaries (eg. META)

Service Providers
- use automation/technical tools
- compares actual data of a picture to scan all pictures
- problem: right to privacy w/ encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly