User:Vtaylor/Computers and Society/4. Crime


 * With the assistance of technology, there are many new ways to commit crimes. However, there are also new ways to detect and prevent crime, as well. We look at both sides - good and evil.

Learning outcomes
 * understand issues associated with computer crime
 * find web resources appropriate to the topic
 * facilitate student discussion
 * learn to work collaboratively online

Keywords
 * hacking, identity theft, fraud, scams, civil liberties, law enforcement

Study notes


 * What are some new forms of criminal behavior that did not exist before the internet? What crimes are easier with the aid of computers and technology?


 * Worms and virus - have you been attacked or infected? What "cost" to you in time, effort or money? Should the creators be punished for spreading these? What is suitable punishment?


 * Is any hacking harmless?


 * Should the age of the hacker be taken into consideration when judging these crimes? Why or why not?


 * Who is ultimately responsible for the security of computer assets? To what extent can the owner expect that others will abide the laws and not harm the information?


 * Does hacking improve security?


 * Have you received email or visited sites that you thought were engaged in fraud or some criminal activity?


 * Is spam really a kind of theft? How big a problem is spam? What steps do you take to avoid spam?


 * Do you understand identity theft? What steps do you take to prevent your identity being stolen? Are you personally concerned about having your identity stolen?

== ==


 * FBI Cyber Crimes investigate high-tech crimes, including cyber-based terrorism, computer intrusions, online sexual exploitation, and major cyber frauds. To stay in front of emerging trends, we gather and share information and intelligence with public and private sector partners worldwide.


 * Common internet fraud schemes


 * Cybercrime
 * Risks Forum


 * Future of Technology (Apr 7, 2009)


 * How to know if your computer is infected


 * Cracking Open Encryption Standards (podcast) - Recent revelations about the extent of NSA surveillance have put even the standards by which encryption systems are designed into question. Encryption experts Matthew Green, Phillip Zimmermann, and Martin Hellman discuss what makes a code secure and the limits of privacy in the modern age.

== Assignments==


 * 1) Before you start the reading and the assignments, take a few minutes to think about what you already know about the topic - Computers and Crime. Write a sentence or two about this in the I know... discussion.


 * 1) Read the Study notes for an overview for the topics that will be covered.


 * 1) Read the article Introduction to Cyber Crime  http://cybercrime.planetindia.net/intro.htm


 * 1) Read a few items in the current issue of the Risks Forum http://catless.ncl.ac.uk/Risks and post a brief 1-2 sentence summary of one item to Risks Forum discussion. Include a link to the item you select.


 * 1) Search the web for sites that talk about computers and crime. Find a site that you think is particularly interesting. Write 2-3 sentences about the social issues discussed. Post your Search web site and description to the Computers and Crime discussion. This week, to encourage more discussion, include a question in your posting. Is there another side to the story? Is there information that you need to understand the site you found? Be sure to ask a question that will get the discussion going about the topic.

Follow links provided by other students and read through the page or articles. Reply to 2-3 other postings. Respond to the question of the message. End your reply with your own questions. You are not limited to the number of posts - the objective is to get some discussion going here.


 * 1) As new web-based services are provided and people share information, social bookmarking has evolved. Social bookmarking is a way to discover and share content from anywhere on the web. Pinterest , Diigo  and del.icio.us , Reddit  are examples social bookmarking web services. Pick a topic and explore the sites that are bookmarked. Post a description of your experience with social bookmarking in the discussion Social Bookmarking.

http://www.sonicwall.com/furl/phishing/
 * 1) Do you think you know an email scam when you see one? Take this quiz and see if you can tell the real corporate emails to customers from the phishing scams. I got 7 out of 10 right. I missed 1 scam but I would have ignored two real requests from companies I do business with.

All communities, on or off the web, adhere to basic principles in order to thrive. The 12 Principles function as a hierarchy. The chief principle, Purpose, is supported by the other 11 principles. Read the guidelines for Collaboration and Group Projects http://wikieducator.org/User:Vtaylor/Collaborative_Projects_-_Collaboration_and_Group_Projects. Then complete the quiz Collaboration and Group Projects
 * 1) Read The 12 Principles of Collaboration. This is an archived version - there does not appear to be a current version. http://web.archive.org/web/20060427022829/http://www.mongoosetech.com/realcommunities/12prin.html


 * 1) Reflection - How long did you work on the assignments for this week? Is this about the same as it usually takes to complete the work each week? Is the pace of work for this class about right? What would you like changed in the course? What would help you learn more about Computers and Society? Please comment. This should be one or two paragraphs submitted as I wonder... assignment.

2013.09.23 - page accessed 1,323 times