100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Summary Cyberpsychology €3,74   In winkelwagen

Samenvatting

Summary Cyberpsychology

2 beoordelingen
 157 keer bekeken  11 keer verkocht

All the chapters/powerpoints/articles that need to be studied for the course Cyberpsychology in the Minor Media Psychology (HU)

Voorbeeld 3 van de 27  pagina's

  • Nee
  • H8, h9, h11
  • 23 maart 2019
  • 27
  • 2018/2019
  • Samenvatting
book image

Titel boek:

Auteur(s):

  • Uitgave:
  • ISBN:
  • Druk:
Alle documenten voor dit vak (1)

2  beoordelingen

review-writer-avatar

Door: priscillabrakels • 4 jaar geleden

review-writer-avatar

Door: evaschouten • 5 jaar geleden

avatar-seller
marjoleincharlotte
Cyberpsychology exam

Chapter 8 – Cybercrime and Deviance
+ Slides week 1
Deviance
Is being used to refer to a behaviour that may not be illegal, though outside of the formal and
informal norms or beliefs of a prevailing culture.
 Deviance and societal norms – texting and using mobile phones while watching a movie in
a cinema, this is technically not illegal but it is disruptive and discouraged

Cyberdeviance
Any deviance that is enabled by the internet and cyberspace, via mobile devices for example.
 An example of this involves the use and creation of pornographic content, or erotic, sexual
materials.

 Once an activity violates established legal statutes, it changes from being a deviant act to a
form of crime.

 Cybercrime refers to crimes ‘in which the perpetrator uses special knowledge of cyberspace’
while computer crimes occur because ‘the perpetrator uses special knowledge about
computer technology’.



Lower risk
Ease of Spam Technological
of
access proficiency
detection




1

,Proxy services – can be used to hide a person’s actual location in physical space while online,
such as Tor.

Spam – Unsolicited emails, commonly used to send fraud schemes of all types.

How are victims harmed?
- Lack of universal policing
- Lack of awareness of cybercrime
- Lack of acknowledgement, too embarrassed to contact police
- Lack of trust in ability of help offered

Wall’s typology of cybercrime
- Cyber-trespass
Involves acts where individuals cross boundaries of ownership in online environments. This
is also called computer hacking. Malicious hackers are doing bad stuff; they disrupt network
traffic or capture passwords for example. They create viruses etc. too. There are different
types of malicious hackers:

 Cyber criminals
Are mainly motivated by big financial gain, they are using malware and exploits to
steal money.



 Spammers and adware spreaders
Illegal advertising, either getting paid by a legitimate company for pushing business
their way or by selling their own products. Cheap Viagra, anyone? “Aggressive
marketers.”

 Advanced persistent threat (APT) agents
Intruders engaging in APT-style attacks represent well-organized, well-funded
groups — often located in a “safe harbour” country — Purpose to steal a company’s
intellectual property. Essentially duplicate their victim’s best ideas and products in
their own homeland, or to sell the information to the highest bidder.

 Corporate spies
Significantly easier to do, thanks to today’s pervasive Internet connectivity.
Interested in intellectual property or competitive information. They differ from APT
agents in that they don’t have to be located in a safe-harbour country. Corporate
espionage groups aren’t usually as organized as APT groups, more focused on
short- to midterm financial gains.

 Hacktivists
Motivated by political, religious, environmental, or other personal beliefs. Content
with embarrassing their opponents or defacing their websites, although they can slip
into corporate-espionage mode if it means they can weaken the opponent.
 WikiLeaks.

 Cyber warriors
Cyber warfare is a city-state against city-state exploitation. Endgame objective of
disabling an opponent’s military capability. Participants may operate as APT or
corporate spies at times, but everything they learn is geared toward a specific
military objective.  The Stuxnet worm

2

,  Rogue hackers
Prove their skills, brag to friends, thrilled to engage in unauthorized activities.
Crimeware isn’t their only objective and motivation. They’re a nuisance, but they
aren’t about to disrupt the Internet and business as we know it.

- Cyber-deception and theft
Can extend from hacking and other forms of cyber-trespass. Deception is readily enabled
by technology on the basis of the ease with which individuals can manipulate email and
other forms of communication.

 Phishing
Criminals send messages in which they claim that the recipient’s financial institution
has detected fraudulent charges on their account that needs to be validated. Etc.

 Spear-phishing
This is a tool used by attackers to penetrate a company’s network to facilitate a
targeted attack through malicious emails. It is also the most commonly used method,
95% of all successful targeted attack were made via spear phishing.

 Digital piracy
The illegal copying of digital media such as computer software, sound and video
recordings without the explicit permission of the copyright holder.  The Pirate Bay

- Cyber-porn and obscenity
This represents the range of sexually expressive content online. Rise of online subcultures
focused on deviant sexual activities: prostitutes, escorts and paedophiles.

- Cyber-violence
All forms of accessing and distributing injurious, hurtful or dangerous materials online. May
be designed to cause emotional, psychological or physical harm. Most common is online
bullying and harassment.

Theories:

 Routine Activity Theory
Developed by Marcus Felson and Lawrence
E. Cohen. In routine activities theory, crime
is likely to occur when three essential
elements of crime converge in space and
time: a motivated offender, an attractive
target, and the absence of capable
guardianship. The premise of routine activity
theory is that crime is relatively unaffected
by social causes such as poverty, inequality,
and unemployment.

For instance, after World War II, the
economy of Western countries was booming
and the Welfare states were expanding. Despite this, crime rose significantly during this
time. According to Felson and Cohen, the reason for the increase is that the prosperity of
contemporary society offers more opportunities for crime to occur; there is much more to
steal.


3

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper marjoleincharlotte. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €3,74. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 64438 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€3,74  11x  verkocht
  • (2)
  Kopen