Exam 15: Crimes of the New Millennium: Cybercrime
What is meant by cyberbullying and how do cyberbullies "attack" their victims?
Cyberbullying is defined as willful and repeated harm inflicted through the medium of electronic text. Like their real-world counterparts, cyberbullies are malicious aggressors who seek implicit or explicit pleasure or profit through the mistreatment of other individuals. Although power in traditional bullying might be physical (stature) or social (competency or popularity) in nature, online power may simply stem from Internet proficiency. Cyberbullies are able to navigate the Web and utilize technology in a way that puts them in a position of power relative to their victim. Bullies employ two major portals to harass their victims: (1) a cyberbully can use a computer and send harassing e-mails or instant messages, post obscene, insulting, and slanderous messages to online bulletin boards or social networking sites, or develop websites to promote and disseminate defamatory content; (2) a cyberbully can use a cellphone to send harassing text messages to the victim.
Computer worms are similar to viruses except that they use computer networks or the Internet to:
D
While many wonder how people can be so easily duped, the government's Internet fraud center receives 280,000 complaints yearly, and Internet scams result in over ____ in losses each year.
D
Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions, such as committing fraud using the victim's name, is known as ______________.
To meet the increasing threat of phishing and identity theft, Congress passed the ___________ Act of 1998 (Identity Theft Act) to make these federal crimes.
Someone who collects and transfers money or goods acquired illegally, and then delivers them to a third party, is known as a _____________________.
Cyberspying involves efforts by intelligence agencies to penetrate compute networks of an enemy nation in order to steal important data.
What does research show about the problems with cyberbullying in relation to young adults/adolescents?
Discuss the legal and enforcement efforts that have been implemented to control cybercrime.
Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?
The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.
Forty-five percent of all search engine queries are related to pornography.
A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user enters certain input that sets the slag code in motion.
Commercial cyberspies target upcoming bids, customer lists, product designs, software source code, voice mail messages, and confidential e-mail messages.
Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?
Losses due to phishing and _______ are now in the billions of dollars and rising with the continuing growth of ecommerce. Stealing an individual's credit card number is an example.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)