Difference between revisions of "Illegal activities on the Internet"
Renegrecco (talk | contribs) |
|||
(13 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
== | yIJ40F <a href="http://kasjorvvzoqf.com/">kasjorvvzoqf</a>, [url=http://rmdjrrbvcjso.com/]rmdjrrbvcjso[/url], [link=http://lnyhcrfuvibr.com/]lnyhcrfuvibr[/link], http://ovmxnqeejefx.com/ | ||
==Enablers:== | |||
1. Annonimity on the Internet | |||
2. Different laws in different countries | |||
3. Laws are not addapted to cybercrimes | |||
4. New technology makes it easier to take part in illegal activities | |||
5. Lack of technical knowledge while dealing with these crimes | |||
6. Userbase is spread through out the world | |||
7. Easy way (and for many an appealing way) of earning money through the Internet | |||
==Inhibitors:== | |||
1. Laws are getting adapted to cybercrimes | |||
2. People are gaining more knowledge on possibilities | |||
3. Cybercrimes are being taken more seriously | |||
== | ==Paradigms:== | ||
1. | 1. The Internet is getting out of hand and should be controlled better. Users should not be anonymous so that they can be better protected. Different countries should work together and exchange more information in an effort to prevent these activities from happening. | ||
2. Cybercrimes should be treated as normal crimes. Laws should be adapted so that they can apply to these offences. There should be no changes to the way the Internet is but in the way these offences are handled. | |||
==Experts:== | ==Experts:== | ||
Prof. Susan W. Brenner | |||
http://cybercrimes.net/ba.html | |||
The Univerity of Dayton - School of Law | |||
==Timing:== | ==Timing:== | ||
1969: Creation of ARPANET, the predecessor of the internet | |||
1985: One of first known cases of cybercrime | |||
1990: Cybercrime Act 2001 (Commonwealth) | |||
1999: Release of Napster, first peer-to-peer program to share MP3's | |||
2004: First lawsuit against spyware | |||
==Web Resources:== | ==Web Resources:== | ||
1. | 1. http://www.cybercrime.gov/ | ||
2. http://www.fbi.gov/cyberinvest/cyberhome.htm | |||
3. http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html | |||
4. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=20/12/01&CL=ENG | |||
5. http://www.criminallawyergroup.com/criminal-defense/the-evolution-of-cybercrime-from-past-to-the-present.php |
Latest revision as of 01:57, 2 June 2010
yIJ40F <a href="http://kasjorvvzoqf.com/">kasjorvvzoqf</a>, [url=http://rmdjrrbvcjso.com/]rmdjrrbvcjso[/url], [link=http://lnyhcrfuvibr.com/]lnyhcrfuvibr[/link], http://ovmxnqeejefx.com/
Enablers:
1. Annonimity on the Internet
2. Different laws in different countries
3. Laws are not addapted to cybercrimes
4. New technology makes it easier to take part in illegal activities
5. Lack of technical knowledge while dealing with these crimes
6. Userbase is spread through out the world
7. Easy way (and for many an appealing way) of earning money through the Internet
Inhibitors:
1. Laws are getting adapted to cybercrimes
2. People are gaining more knowledge on possibilities
3. Cybercrimes are being taken more seriously
Paradigms:
1. The Internet is getting out of hand and should be controlled better. Users should not be anonymous so that they can be better protected. Different countries should work together and exchange more information in an effort to prevent these activities from happening.
2. Cybercrimes should be treated as normal crimes. Laws should be adapted so that they can apply to these offences. There should be no changes to the way the Internet is but in the way these offences are handled.
Experts:
Prof. Susan W. Brenner
http://cybercrimes.net/ba.html
The Univerity of Dayton - School of Law
Timing:
1969: Creation of ARPANET, the predecessor of the internet
1985: One of first known cases of cybercrime
1990: Cybercrime Act 2001 (Commonwealth)
1999: Release of Napster, first peer-to-peer program to share MP3's
2004: First lawsuit against spyware
Web Resources:
2. http://www.fbi.gov/cyberinvest/cyberhome.htm
3. http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html
4. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=20/12/01&CL=ENG