100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Cyberpsychology $4.07   Add to cart

Summary

Summary Cyberpsychology

2 reviews
 157 views  11 purchases
  • Course
  • Institution
  • Book

All the chapters/powerpoints/articles that need to be studied for the course Cyberpsychology in the Minor Media Psychology (HU)

Preview 3 out of 27  pages

  • No
  • H8, h9, h11
  • March 23, 2019
  • 27
  • 2018/2019
  • Summary

2  reviews

review-writer-avatar

By: priscillabrakels • 4 year ago

review-writer-avatar

By: evaschouten • 5 year ago

avatar-seller
Cyberpsychology exam

Chapter 8 – Cybercrime and Deviance
+ Slides week 1
Deviance
Is being used to refer to a behaviour that may not be illegal, though outside of the formal and
informal norms or beliefs of a prevailing culture.
 Deviance and societal norms – texting and using mobile phones while watching a movie in
a cinema, this is technically not illegal but it is disruptive and discouraged

Cyberdeviance
Any deviance that is enabled by the internet and cyberspace, via mobile devices for example.
 An example of this involves the use and creation of pornographic content, or erotic, sexual
materials.

 Once an activity violates established legal statutes, it changes from being a deviant act to a
form of crime.

 Cybercrime refers to crimes ‘in which the perpetrator uses special knowledge of cyberspace’
while computer crimes occur because ‘the perpetrator uses special knowledge about
computer technology’.



Lower risk
Ease of Spam Technological
of
access proficiency
detection




1

,Proxy services – can be used to hide a person’s actual location in physical space while online,
such as Tor.

Spam – Unsolicited emails, commonly used to send fraud schemes of all types.

How are victims harmed?
- Lack of universal policing
- Lack of awareness of cybercrime
- Lack of acknowledgement, too embarrassed to contact police
- Lack of trust in ability of help offered

Wall’s typology of cybercrime
- Cyber-trespass
Involves acts where individuals cross boundaries of ownership in online environments. This
is also called computer hacking. Malicious hackers are doing bad stuff; they disrupt network
traffic or capture passwords for example. They create viruses etc. too. There are different
types of malicious hackers:

 Cyber criminals
Are mainly motivated by big financial gain, they are using malware and exploits to
steal money.



 Spammers and adware spreaders
Illegal advertising, either getting paid by a legitimate company for pushing business
their way or by selling their own products. Cheap Viagra, anyone? “Aggressive
marketers.”

 Advanced persistent threat (APT) agents
Intruders engaging in APT-style attacks represent well-organized, well-funded
groups — often located in a “safe harbour” country — Purpose to steal a company’s
intellectual property. Essentially duplicate their victim’s best ideas and products in
their own homeland, or to sell the information to the highest bidder.

 Corporate spies
Significantly easier to do, thanks to today’s pervasive Internet connectivity.
Interested in intellectual property or competitive information. They differ from APT
agents in that they don’t have to be located in a safe-harbour country. Corporate
espionage groups aren’t usually as organized as APT groups, more focused on
short- to midterm financial gains.

 Hacktivists
Motivated by political, religious, environmental, or other personal beliefs. Content
with embarrassing their opponents or defacing their websites, although they can slip
into corporate-espionage mode if it means they can weaken the opponent.
 WikiLeaks.

 Cyber warriors
Cyber warfare is a city-state against city-state exploitation. Endgame objective of
disabling an opponent’s military capability. Participants may operate as APT or
corporate spies at times, but everything they learn is geared toward a specific
military objective.  The Stuxnet worm

2

,  Rogue hackers
Prove their skills, brag to friends, thrilled to engage in unauthorized activities.
Crimeware isn’t their only objective and motivation. They’re a nuisance, but they
aren’t about to disrupt the Internet and business as we know it.

- Cyber-deception and theft
Can extend from hacking and other forms of cyber-trespass. Deception is readily enabled
by technology on the basis of the ease with which individuals can manipulate email and
other forms of communication.

 Phishing
Criminals send messages in which they claim that the recipient’s financial institution
has detected fraudulent charges on their account that needs to be validated. Etc.

 Spear-phishing
This is a tool used by attackers to penetrate a company’s network to facilitate a
targeted attack through malicious emails. It is also the most commonly used method,
95% of all successful targeted attack were made via spear phishing.

 Digital piracy
The illegal copying of digital media such as computer software, sound and video
recordings without the explicit permission of the copyright holder.  The Pirate Bay

- Cyber-porn and obscenity
This represents the range of sexually expressive content online. Rise of online subcultures
focused on deviant sexual activities: prostitutes, escorts and paedophiles.

- Cyber-violence
All forms of accessing and distributing injurious, hurtful or dangerous materials online. May
be designed to cause emotional, psychological or physical harm. Most common is online
bullying and harassment.

Theories:

 Routine Activity Theory
Developed by Marcus Felson and Lawrence
E. Cohen. In routine activities theory, crime
is likely to occur when three essential
elements of crime converge in space and
time: a motivated offender, an attractive
target, and the absence of capable
guardianship. The premise of routine activity
theory is that crime is relatively unaffected
by social causes such as poverty, inequality,
and unemployment.

For instance, after World War II, the
economy of Western countries was booming
and the Welfare states were expanding. Despite this, crime rose significantly during this
time. According to Felson and Cohen, the reason for the increase is that the prosperity of
contemporary society offers more opportunities for crime to occur; there is much more to
steal.


3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller marjoleincharlotte. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $4.07. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64438 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$4.07  11x  sold
  • (2)
  Add to cart