SlideShare a Scribd company logo
1 of 6
Common Examples of
Online Crimes
• A proven thought leader based in Reston, Virginia, Scott
Cleland is the founder and executive director of the Restore Us
Institute. In this position, Scott Cleland works to protect the
American people from a variety of online harm and Internet
crimes.
• Individuals can find themselves victims of several kinds of
Internet crime. Phishing scams rank among the most commonly
seen online crimes. Phishing scams typically involve criminals
sending out fraudulent e-mails designed to look like they have
been sent by a legitimate business or government agency. In
reality, links contained within the message bring users to a third
party website that can collect a depth of private information.
Individuals must be critical of every e-mail they receive,
particularly if they do not have a relationship with the sender.
• Ransomware is comparable to phishing, the key difference
being that malicious software can be loaded onto a user’s
laptop or personal computer without their knowledge. In addition
to collecting sensitive information, ransomware can also be
designed to crash a victim’s computer or lock away their
personal files and programs until they have met the criminal’s
demands, which typically involves sending a payment.
• Online harassment represents a completely different form of
criminal activity online. A person may be stalked or bullied
through various Internet platforms, ranging from e-mail to social
media. In other cases, entire websites are created with the goal
of harassing an individual or group of people. Cyberstalking can
lead to serious consequences, including jail time, while other
Internet behavior may be classed as slander or libel and judged
accordingly.
• Other forms of crime regularly occurring on the Internet include
identity theft, intellectual property theft, and drug trafficking,
among others.

More Related Content

Similar to Common Examples of Online Crimes.pptx

Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reportsjcgevana
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 

Similar to Common Examples of Online Crimes.pptx (20)

CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Explaining Cybercrime in Nevada
Explaining Cybercrime in NevadaExplaining Cybercrime in Nevada
Explaining Cybercrime in Nevada
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 

More from Scott Cleland

stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...Scott Cleland
 
A Proven Thought Leadership Model
A Proven Thought Leadership ModelA Proven Thought Leadership Model
A Proven Thought Leadership ModelScott Cleland
 
Responsible Internet Measures
Responsible Internet MeasuresResponsible Internet Measures
Responsible Internet MeasuresScott Cleland
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?Scott Cleland
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsScott Cleland
 
A Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesA Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesScott Cleland
 
An Overview of Precursor, LLC
An Overview of Precursor, LLCAn Overview of Precursor, LLC
An Overview of Precursor, LLCScott Cleland
 
Amazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesAmazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesScott Cleland
 
Internetization and Framework Analysis
Internetization and Framework AnalysisInternetization and Framework Analysis
Internetization and Framework AnalysisScott Cleland
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization StrategyScott Cleland
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersScott Cleland
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott ClelandScott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitrageScott Cleland
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsScott Cleland
 

More from Scott Cleland (14)

stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
 
A Proven Thought Leadership Model
A Proven Thought Leadership ModelA Proven Thought Leadership Model
A Proven Thought Leadership Model
 
Responsible Internet Measures
Responsible Internet MeasuresResponsible Internet Measures
Responsible Internet Measures
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional Investors
 
A Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesA Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google Emerges
 
An Overview of Precursor, LLC
An Overview of Precursor, LLCAn Overview of Precursor, LLC
An Overview of Precursor, LLC
 
Amazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesAmazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist Tendencies
 
Internetization and Framework Analysis
Internetization and Framework AnalysisInternetization and Framework Analysis
Internetization and Framework Analysis
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization Strategy
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms Consumers
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal Documents
 

Recently uploaded

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 

Recently uploaded (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 

Common Examples of Online Crimes.pptx

  • 2. • A proven thought leader based in Reston, Virginia, Scott Cleland is the founder and executive director of the Restore Us Institute. In this position, Scott Cleland works to protect the American people from a variety of online harm and Internet crimes.
  • 3. • Individuals can find themselves victims of several kinds of Internet crime. Phishing scams rank among the most commonly seen online crimes. Phishing scams typically involve criminals sending out fraudulent e-mails designed to look like they have been sent by a legitimate business or government agency. In reality, links contained within the message bring users to a third party website that can collect a depth of private information. Individuals must be critical of every e-mail they receive, particularly if they do not have a relationship with the sender.
  • 4. • Ransomware is comparable to phishing, the key difference being that malicious software can be loaded onto a user’s laptop or personal computer without their knowledge. In addition to collecting sensitive information, ransomware can also be designed to crash a victim’s computer or lock away their personal files and programs until they have met the criminal’s demands, which typically involves sending a payment.
  • 5. • Online harassment represents a completely different form of criminal activity online. A person may be stalked or bullied through various Internet platforms, ranging from e-mail to social media. In other cases, entire websites are created with the goal of harassing an individual or group of people. Cyberstalking can lead to serious consequences, including jail time, while other Internet behavior may be classed as slander or libel and judged accordingly.
  • 6. • Other forms of crime regularly occurring on the Internet include identity theft, intellectual property theft, and drug trafficking, among others.