PLS 780
Week 9
Security and Cybercrime
• Online crime and computer crime
• Cybercrime and law enforcement
The problem
• Cybercrime and cybersecurity as a national concern
Understanding computer
crime: Fraud and ID Theft
• Fraud and identity theft: pharming, spoofing,
phishing, malvertising an...
Understanding computer
crime: Privacy invasions
• Spyware
• Cookies
• Clickstream data analysis
• Deep packet inspection
•...
Understanding computer
crime: Cyberbullying,
Stalking and harassment
• Increasingly illegal
• Societal concerns are clear
...
Understanding computer
crime: Commercial
crimes
• Counterfeit goods
• Intellectual property theft
• Wrongful registration ...
Capital Records v
Thomas-Rasset
• Facts
• Issue
• Holding
• Reasoning
• Rule
Spam
• Crime against computers, computer systems and
users
Jaynes v Commonwealth
• Facts
• Issue
• Holding
• Reasoning
• Rule
Law enforcement and
cybercrime
• Technological challenges
• Legal challenges
US v Wecht
• Facts
• Issue
• Holding
• Reasoning
• Rule
Operational challenges
• Cybercrime involves complex events with
multiplayer conspiracies—difficult to investigate
• Law e...
FTC v Neovi
• Facts
• Issue
• Holding
• Reasoning
• Rule
eBay v Digital Point
Solutions
• Facts
• Issue
• Holding
• Reasoning
• Rule
Upcoming SlideShare
Loading in...5
×

Pls 780 week 9

231

Published on

Published in: Education, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
231
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Pls 780 week 9

  1. 1. PLS 780 Week 9
  2. 2. Security and Cybercrime • Online crime and computer crime • Cybercrime and law enforcement
  3. 3. The problem • Cybercrime and cybersecurity as a national concern
  4. 4. Understanding computer crime: Fraud and ID Theft • Fraud and identity theft: pharming, spoofing, phishing, malvertising and pretexting • The FTC records and advises businesses and consumers who have been victims or near victims
  5. 5. Understanding computer crime: Privacy invasions • Spyware • Cookies • Clickstream data analysis • Deep packet inspection • Web bug
  6. 6. Understanding computer crime: Cyberbullying, Stalking and harassment • Increasingly illegal • Societal concerns are clear • What should laws look like?
  7. 7. Understanding computer crime: Commercial crimes • Counterfeit goods • Intellectual property theft • Wrongful registration of a domain name • Hacking to steal trade secrets
  8. 8. Capital Records v Thomas-Rasset • Facts • Issue • Holding • Reasoning • Rule
  9. 9. Spam • Crime against computers, computer systems and users
  10. 10. Jaynes v Commonwealth • Facts • Issue • Holding • Reasoning • Rule
  11. 11. Law enforcement and cybercrime • Technological challenges • Legal challenges
  12. 12. US v Wecht • Facts • Issue • Holding • Reasoning • Rule
  13. 13. Operational challenges • Cybercrime involves complex events with multiplayer conspiracies—difficult to investigate • Law enforcement is jurisdictionally based • Cybercrime occurs everywhere and nowhere • Different agencies deal with different crimes but mostly falling under the FBI • Especially ecommerce related crimes
  14. 14. FTC v Neovi • Facts • Issue • Holding • Reasoning • Rule
  15. 15. eBay v Digital Point Solutions • Facts • Issue • Holding • Reasoning • Rule
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×