Four types of computer crime

While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: CASE 1: My first case is a classic example of a salami attack (Samaha, 2008). A salami attack according to Samaha (2008) is when a...

Cyberstalking

I was recently asked this question: “Do you think it’s necessary to create new terms for “ordinary” crimes committed with more advanced tools? Is cyberstalking simply stalking using the internet?” To adequately answer a seemingly simple yet...

Societal Perceptions of Cyber Criminals

I was asked this interesting question in a recent cybercrime course: “What do you think society’s perception of cyber-criminals is?” If I were to sum up what I believe society’s perception of cybercriminals has become, I would surmise it in saying “the...

Software Counterfeiting

This essay was written for a Fall 2010 cybercrime course and outlines some of the problems faced as a result of software counterfeiting. Software Counterfeiting When the founding fathers created the Constitution, they made an odd inclusion; they included a provision...

Cybercrime Amendment

This was an extra credit assignment I completed for a cybercrime course in the fall of 2010, the question was: “Write a new amendment to the Constitution which covers criminal cases involving computers that are forefathers would have written had they been alive today....