Cyber crime encompasses any criminal act
dealing with computers
and networks (called hacking). Additionally, cyber
crime also includes traditional crimes conducted
through the Internet. For example; hate crimes,
telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to
be cyber crimes when the illegal activities are
committed through the use of a computer and
The process to attempting to gain or
succesfully gaining, unauthorized access
to computer resources.
WHO IS A HACKER?
In the computer security context,a hacker
is someone who seeks and exploits
weaknesses in a computer system or a
The term hacker is reclaimed by computer
programmers who argue that someone
breaking into computers is better called a
Identity theft happens when someone
steals your personal information and uses
it without your permission. It’s a serious
crime that can wreak havoc with your
finances, credit history, and reputation and
can take time, money, and patience to
SPECIFIC TYPES OF IDENTITY
Tax-Related Identity Theft
Child Identity Theft
Medical Identity Theft
Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual,
a group, or an organization.
It may include:
false accusations, defamation, slander and libel.
It may also include monitoring, identity theft,
threats, vandalism, solicitation for sex,
or gathering information that may be used to
threaten or harass.
AND CYBERHARASSMENT LAWS
States have enacted "cyberstalking" or
"cyberharassment" laws or have laws that
explicitly include electronic forms of
communication within more traditional stalking or
harassment laws. This chart identifies state laws
that include specific references to electronic
theft is the taking of another
person's property without that person's
permission or consent with the intent to
deprive the rightful owner of it. The word is
also used as an informal shorthand term
for some crimes against property.
A few years ago people saw the huge potential of
the internet for commiting dishonest acts as child
abuse and soliciting.
Child abuse is the physical, sexual or emotional
maltreatment or neglect of a child or children
Online predators are people who commit child
sexual abuse that begins or takes place on
Child abuse and soliciting
Internet-initiated sex crimes against minors involve deceit
and violence, and begin with adult strangers known as
internet predators communicating with children and
young teenagers over the Internet and sometimes then
meeting face to face.
Online predators use chat rooms, instant
messaging, Internet forums, social networking sites, cell
phones, and even video game consoles
Most online sex offenders are young adults who target
teens and seduce victims into sexual relationships. They
take time to develop the trust and confidence of teens, so
the teens see these relationships as romances or sexual
How does it work? (I)
Online predators are a very important source of
A longitudinal study of 341 convicted child
molesters in America found that pornography's
use correlated significantly with their rate of
sexually re-offending. The study says that
watching child pornography can increase
recidivism risk for all groups of child molesters.
How does it work? (II)
In order to prevent child abuse you should:
Explain your children the safety rules of the
Keep your home computer out in the open.
Set up an internet protection program on the
computers your children use.
Tell your children not to give out passwords,
even to a good friend.
How to prevent online child
abuse and soliciting?