CCJ 4614 Final Exam With
Complete Solution
Cyber crime - ANSWER any illegal act that involves a computer system,
computer intrusion, unauthorized access to computers (hacking, virus
generation), theft of communications
Financial - ANSWER crimes which disrupt business' ability to conduct
'e-commerce' (or electronic commerce), viruses, cyber-attacks, e-forgery
Piracy - ANSWER the act of copying, counterfeiting and distributing
copyrighted material. Online theft is defined as any type of 'piracy' that
involves the use of the Internet to market or distribute creative works
protected by copyright.
hacking - ANSWER the act of gaining unauthorized access to a computer
system or network and in some cases making unauthorized use of this access.
Hacking is also the act by which other forms of cyber-crime (e.g., fraud,
terrorism, etc.) are committed.
cyber-terrorism - ANSWER the effect of acts of hacking designed to cause
terror. Like conventional terrorism, `e-terrorism' is classified as such if the
result of hacking is to cause violence against persons or property, or at least
cause enough harm to generate fear.
online pornography - ANSWER laws against possessing or distributing child
pornography. Distributing pornography of any form to a minor is illegal, A
new medium for this `old' crime.
,in schools - ANSWER educational resource, Cyber stalking, privacy invasions,
aggressive marketing targeted to youth.
psychological characteristics of cybercriminals - ANSWER Significant
computer technical skills, Techniques of neutralization,
Crimes of intimidation
stalking - ANSWER definitions vary by state
(cali first to enact antistalking legislation 1990), 2006 3.4 people 18+ victims
of stalking
categories of stalking - ANSWER Simple obsession
Love obsession
Erotomania
Vengeance
Cyberstalking - ANSWER Using the Internet or other forms of electronic
communications to threaten or engage in unwanted advances toward
another
Cyberharrassment - ANSWER Threatening or harassing email messages,
instant messages, blog entries, or websites dedicated solely to tormenting an
individual
categories of cyberbullies - ANSWER Vengeful angel
power-hungry
revenge of the nerds
mean girls
, inadvertent cyberbully
vengeful angel - ANSWER Don't see self as bully, Righting wrongs, protecting
self, Retaliation, warranted revenge
power-hungry - ANSWER Similar to offline/schoolyard bullies, Power and
control, Like an audience, so may bully offline, brag, or group email/text or
use social media
revenge of the nerds - ANSWER Often victim of offline bullying, Physically
smaller, not popular, Good technical skills, Intention to embarrass or
frighten, Act tough online, but not in real life, Empowered by anonymity of
Internet
mean girls - ANSWER Most immature, Bored, looking for entertainment,
Usually female bullying females, Ego-driven, Fed by admiration of others,
Planned and executed in a group, Audience
inadvertent cyberbully - ANSWER Don't consider selves bullies, Pretending to
be tough, role playing or reacting to hateful or provocative messages, Don't
lash out intentionally, Respond in anger or frustration and don't think of
consequences
consequences of cyber crime - ANSWER Similar to punishment for offenses if
they were offline, Computer specific offenses (eg: hacking): Depends on
amount of financial damage
episode of catfish we watched in class - ANSWER Falesha Spako being
impersonated online by a profile known as "Jaqueline" created by Tracey
Armah who says she enjoys cyberbully people and says however it effected
people its not her fault
Complete Solution
Cyber crime - ANSWER any illegal act that involves a computer system,
computer intrusion, unauthorized access to computers (hacking, virus
generation), theft of communications
Financial - ANSWER crimes which disrupt business' ability to conduct
'e-commerce' (or electronic commerce), viruses, cyber-attacks, e-forgery
Piracy - ANSWER the act of copying, counterfeiting and distributing
copyrighted material. Online theft is defined as any type of 'piracy' that
involves the use of the Internet to market or distribute creative works
protected by copyright.
hacking - ANSWER the act of gaining unauthorized access to a computer
system or network and in some cases making unauthorized use of this access.
Hacking is also the act by which other forms of cyber-crime (e.g., fraud,
terrorism, etc.) are committed.
cyber-terrorism - ANSWER the effect of acts of hacking designed to cause
terror. Like conventional terrorism, `e-terrorism' is classified as such if the
result of hacking is to cause violence against persons or property, or at least
cause enough harm to generate fear.
online pornography - ANSWER laws against possessing or distributing child
pornography. Distributing pornography of any form to a minor is illegal, A
new medium for this `old' crime.
,in schools - ANSWER educational resource, Cyber stalking, privacy invasions,
aggressive marketing targeted to youth.
psychological characteristics of cybercriminals - ANSWER Significant
computer technical skills, Techniques of neutralization,
Crimes of intimidation
stalking - ANSWER definitions vary by state
(cali first to enact antistalking legislation 1990), 2006 3.4 people 18+ victims
of stalking
categories of stalking - ANSWER Simple obsession
Love obsession
Erotomania
Vengeance
Cyberstalking - ANSWER Using the Internet or other forms of electronic
communications to threaten or engage in unwanted advances toward
another
Cyberharrassment - ANSWER Threatening or harassing email messages,
instant messages, blog entries, or websites dedicated solely to tormenting an
individual
categories of cyberbullies - ANSWER Vengeful angel
power-hungry
revenge of the nerds
mean girls
, inadvertent cyberbully
vengeful angel - ANSWER Don't see self as bully, Righting wrongs, protecting
self, Retaliation, warranted revenge
power-hungry - ANSWER Similar to offline/schoolyard bullies, Power and
control, Like an audience, so may bully offline, brag, or group email/text or
use social media
revenge of the nerds - ANSWER Often victim of offline bullying, Physically
smaller, not popular, Good technical skills, Intention to embarrass or
frighten, Act tough online, but not in real life, Empowered by anonymity of
Internet
mean girls - ANSWER Most immature, Bored, looking for entertainment,
Usually female bullying females, Ego-driven, Fed by admiration of others,
Planned and executed in a group, Audience
inadvertent cyberbully - ANSWER Don't consider selves bullies, Pretending to
be tough, role playing or reacting to hateful or provocative messages, Don't
lash out intentionally, Respond in anger or frustration and don't think of
consequences
consequences of cyber crime - ANSWER Similar to punishment for offenses if
they were offline, Computer specific offenses (eg: hacking): Depends on
amount of financial damage
episode of catfish we watched in class - ANSWER Falesha Spako being
impersonated online by a profile known as "Jaqueline" created by Tracey
Armah who says she enjoys cyberbully people and says however it effected
people its not her fault