AGENDA Finish doing drugs Cyber-stuff. Drug Legalization? Pro? Reduce crime by eliminating “drug-defined crimes” Reduce Prison Costs Reduce violence generated.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

How to protect yourself, your computer, and others on the internet
Today: Good Stuff from Chapters Thursday: Drugs
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Chapter 14 Crime and Justice in the New Millennium
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Drugs and Cybercrime “Cyberdrugcrime?”. Illicit Drug Issues History and “Drug Panics” Current Use / Trends Relationship Between Drug use and Crime Drug.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Drugs. Illicit Drug Issues  History and “Drug Panics”  Current Use / Trends  Relationship Between Drug use and Crime  Drug Control Strategy  The.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
2010 FLORIDA YOUTH SUBSTANCE ABUSE SURVEY Seminole County.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 4, Crime and Violence The Global Context: International Crime and Violence Sources of Crime Statistics Sociological Theories of Crime and Violence.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Drugs. Illicit Drug Issues  History and “Drug Panics”  Current Use / Trends  Relationship Between Drug use and Crime  Drug Control Strategy  The.
Chapter 7 Crime and Deviance.
THE POWER OF DEVELOPMENTAL ASSETS Search Institute studies consistently show a strong correlation between young people’s levels of assets and diverse outcomes.
Finish Doing Drugs Cyber-Crime Terrorism Crimes of the Powerful
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 6 Crime and Violence. Crime Crime – violation of the criminal laws enacted by federal, state, or local governments –Misdemeanor – a less serious.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Freedom of Speech Computers in the World.
Susan B. Barnes Rochester Institute of Technology.
Cybercrime What is it, what does it cost, & how is it regulated?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
INTRODUCTION & QUESTIONS.
Identity Theft One of America's fastest growing crimes.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
May 3, Over the last few decades has the crime rate been going up, going down, or holding steady?
TEEN HEALTH ISSUES.  Adolescents (ages 10 to 19) and young adults (ages 20 to 24) make up 21 percent of the population of the United States.  The behavioral.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Identity Theft It’s a crime!
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
When you get caught for Identity Theft
Presentation transcript:

AGENDA Finish doing drugs Cyber-stuff

Drug Legalization? Pro? Reduce crime by eliminating “drug-defined crimes” Reduce Prison Costs Reduce violence generated by black market Reduce police corruption (?) Con? Increased drug use and social costs Moral costs Practical Problems with Legalization Which drugs? Who sells? Minors?

Drug Treatment As with criminal rehabilitation programs, cognitive behavioral programs have a track record of success Cognitive = skill and restructuring The effect of Alcoholics Anonymous and Narcotics Anonymous is largely unknown Very resistant to academic research

Drug Courts Started in 1989 in Dade County Florida as a reaction to crowded jails/court dockets Spread like wildfire thereafter Key ingredients Team approach Judicial involvement in supervision (court reviews) Strong treatment component Quick processing

Drug Court II Most research has been favorable Reductions in drug use and other criminal activity South St. Louis County (Duluth) MN drug court Reviewed by one of the best bow hunting criminologists in the country Significant reductions in felony offending vs. a comparison group of people arrested for drug felonies prior to the existence of drug court

Theories of Drug Use? Most theories of crime can also explain drug use social learning, social control, strain, developmental…

UMD: Percent Reporting Nonmedical Drug Use, by Type of Drug, Past 12 Months

Predicting Use Variable D.V.: Stimulant Use, Past 12 Months b SE Odds Ratio Low self-control.044* Deviant peers Moral beliefs -.069* Typical offending School attachment Grade point average -.584* Involvement in co-curricular activities Importance of academic work.375 † Racial and/or ethnic minority Male years or older Binge drinking: 1-2 times †† 1.326** Binge drinking: 3-5 times †† 1.609*** Binge drinking: 6+ times †† 1.881*** Constant *** p <.001; ** p <.01; * p <.05; † p <.10; †† Reference category for this variable is “none”

Regression Results Independent Variable Dependent Variable Prescription Stimulants b (SE) [Odds Ratio] Marijuana b (SE) [Odds Ratio] Other Prescription Drugs b (SE) [Odds Ratio] Other Illicit Drugs b (SE) [Odds Ratio] Low self-control.044** (.018) [1.045].043*** (.016) [1.044].056*** (.019) [1.058] Moral beliefs -.069** (.028) [.933] -.089*** (.027) [.915] -.105*** (.036) [.901] Deviant Peers.049* (.028) [1.051] Grade point average -.584** (.241).558] -.471** (.222).[625] Importance of academic work.375* (.204) [1.455] *** p <.01; ** p <.05; * p <.10

Cyber-Crime Crime that occurs over the internet using a computer Cyber markets Fraud Hacking Sexual predators + police response Development of criminal communities

Cyber-Markets I Piracy Software, Music, Movies, Television Broadcasts, Books… Requires minimal skill, but does entail some risks (viruses, lawsuits, etc.) Estimates vary, but roughly 1/3 of Americans report pirating Higher estimates among youth, especially COLLEGE KIDS! UMD STUDENTS = 62% pirated in past year, 20% did so “frequently” File Sharing: Napster  Bit Torrents  Latest? Music and video piracy appears to be declining. Why?

Cyber Markets II Beyond pirating Use of legitimate internet sites (eBay, Craig's list) to engage in crime Fraud, Sell Stolen Goods Violent Crime, Illicit Sex/Drug Markets Use of illegitimate sites to engage in crime “Silk Road,” Bit Coins, and so forth

Cyber pornography market Defining “pornography” has always been problematic Especially problematic in the internet age Other major issues Access by Minors Unwanted solicitation Child pornography Federal legislation has had limited success… Communications Decency act of 1996 Child Online Protection Act (COPA) of 1998 Children’s Internet Protection Act (CIPA) of 2000

Cyber Fraud Traditional Fraud Scams A friend from Nigeria wished to transfer a million dollars into your account Phishing and Pharming scams Your Ebay account has been compromised! Hacking Major concern with many of these techniques is identity theft Use your information to take out loans, get credit cards, etc.

Identity Theft The unlawful use of another person’s identifying information Use of name, DOB, social security number, credit card number…to commit fraud or other crimes Examples? Internet and information age has made this much easier

Combating Identity Theft State Legislation “Freeze laws” – stops access to credit reports Laws to redact fraudulent transactions from credit reports Disclosure laws—if your info has been compromised New emphasis on information privacy Risk minimization Guard SS# and other private info, look at credit reports, shred sensitive paper, don’t open suspicious …

Cybercrime Communities Anonymity of cyberspace Deviant Subcultures have anonymous/safe arena to share information and engage in crime Child Pornography Drug Distribution

Police use of Internet Stings/Proactive Policing for Sexual Predators How often do youngsters get propositioned? How savvy are youngsters? Ethical/Legal Issues New Yorker Article (Moodle) Are these individuals who would have committed crimes without police involvement? Many already did (child pornography, etc.) What sort of sanctions are warranted for these crimes?

Hacking Motivations Vary Fun/thrill/rep/challenge “Hacktivism” WikiLeaks, anonymous, etc Fraud Scams Political “cyber attacks” Methods Accessing files/records “Denial of Service” attacks “Man in the Middle” diversion