l-5 - Howmightthetechnol

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
2/4/10 Policy Considerations and IRC How does the United States regulate the content of IRC channels? - What is criminal and what is not? Do you find this surprising? What are the benefits of this regulatory structure? What are the alternatives? - How does this vary by country? - How might the technology allow filtering? Defining a Cybercrime – What is a Cybercrime? Computer Crimes – Generally Activities vary - From nuisance activities - To computer assisted criminal activity - To computer-initiated criminal activity Three categories of computer crime Computer as a target Computer as an instrument Computer as an incidental Computers as Targets Earliest computer crimes (Britz) - Phreaking and hacking - Software piracy - Data theft - Identity Theft Targets may include: - Individuals - Military or intelligence institutions - Banks and financial organizations - Utility or service companies -
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/19/2011 for the course CJUS 300 taught by Professor Debrota during the Winter '09 term at Indiana.

Page1 / 4

l-5 - Howmightthetechnol

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online