Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Cyberpsychology

Beoordeling
3.5
(2)
Verkocht
11
Pagina's
27
Geüpload op
23-03-2019
Geschreven in
2018/2019

All the chapters/powerpoints/articles that need to be studied for the course Cyberpsychology in the Minor Media Psychology (HU)

Instelling
Vak

Voorbeeld van de inhoud

Cyberpsychology exam

Chapter 8 – Cybercrime and Deviance
+ Slides week 1
Deviance
Is being used to refer to a behaviour that may not be illegal, though outside of the formal and
informal norms or beliefs of a prevailing culture.
 Deviance and societal norms – texting and using mobile phones while watching a movie in
a cinema, this is technically not illegal but it is disruptive and discouraged

Cyberdeviance
Any deviance that is enabled by the internet and cyberspace, via mobile devices for example.
 An example of this involves the use and creation of pornographic content, or erotic, sexual
materials.

 Once an activity violates established legal statutes, it changes from being a deviant act to a
form of crime.

 Cybercrime refers to crimes ‘in which the perpetrator uses special knowledge of cyberspace’
while computer crimes occur because ‘the perpetrator uses special knowledge about
computer technology’.



Lower risk
Ease of Spam Technological
of
access proficiency
detection




1

,Proxy services – can be used to hide a person’s actual location in physical space while online,
such as Tor.

Spam – Unsolicited emails, commonly used to send fraud schemes of all types.

How are victims harmed?
- Lack of universal policing
- Lack of awareness of cybercrime
- Lack of acknowledgement, too embarrassed to contact police
- Lack of trust in ability of help offered

Wall’s typology of cybercrime
- Cyber-trespass
Involves acts where individuals cross boundaries of ownership in online environments. This
is also called computer hacking. Malicious hackers are doing bad stuff; they disrupt network
traffic or capture passwords for example. They create viruses etc. too. There are different
types of malicious hackers:

 Cyber criminals
Are mainly motivated by big financial gain, they are using malware and exploits to
steal money.



 Spammers and adware spreaders
Illegal advertising, either getting paid by a legitimate company for pushing business
their way or by selling their own products. Cheap Viagra, anyone? “Aggressive
marketers.”

 Advanced persistent threat (APT) agents
Intruders engaging in APT-style attacks represent well-organized, well-funded
groups — often located in a “safe harbour” country — Purpose to steal a company’s
intellectual property. Essentially duplicate their victim’s best ideas and products in
their own homeland, or to sell the information to the highest bidder.

 Corporate spies
Significantly easier to do, thanks to today’s pervasive Internet connectivity.
Interested in intellectual property or competitive information. They differ from APT
agents in that they don’t have to be located in a safe-harbour country. Corporate
espionage groups aren’t usually as organized as APT groups, more focused on
short- to midterm financial gains.

 Hacktivists
Motivated by political, religious, environmental, or other personal beliefs. Content
with embarrassing their opponents or defacing their websites, although they can slip
into corporate-espionage mode if it means they can weaken the opponent.
 WikiLeaks.

 Cyber warriors
Cyber warfare is a city-state against city-state exploitation. Endgame objective of
disabling an opponent’s military capability. Participants may operate as APT or
corporate spies at times, but everything they learn is geared toward a specific
military objective.  The Stuxnet worm

2

,  Rogue hackers
Prove their skills, brag to friends, thrilled to engage in unauthorized activities.
Crimeware isn’t their only objective and motivation. They’re a nuisance, but they
aren’t about to disrupt the Internet and business as we know it.

- Cyber-deception and theft
Can extend from hacking and other forms of cyber-trespass. Deception is readily enabled
by technology on the basis of the ease with which individuals can manipulate email and
other forms of communication.

 Phishing
Criminals send messages in which they claim that the recipient’s financial institution
has detected fraudulent charges on their account that needs to be validated. Etc.

 Spear-phishing
This is a tool used by attackers to penetrate a company’s network to facilitate a
targeted attack through malicious emails. It is also the most commonly used method,
95% of all successful targeted attack were made via spear phishing.

 Digital piracy
The illegal copying of digital media such as computer software, sound and video
recordings without the explicit permission of the copyright holder.  The Pirate Bay

- Cyber-porn and obscenity
This represents the range of sexually expressive content online. Rise of online subcultures
focused on deviant sexual activities: prostitutes, escorts and paedophiles.

- Cyber-violence
All forms of accessing and distributing injurious, hurtful or dangerous materials online. May
be designed to cause emotional, psychological or physical harm. Most common is online
bullying and harassment.

Theories:

 Routine Activity Theory
Developed by Marcus Felson and Lawrence
E. Cohen. In routine activities theory, crime
is likely to occur when three essential
elements of crime converge in space and
time: a motivated offender, an attractive
target, and the absence of capable
guardianship. The premise of routine activity
theory is that crime is relatively unaffected
by social causes such as poverty, inequality,
and unemployment.

For instance, after World War II, the
economy of Western countries was booming
and the Welfare states were expanding. Despite this, crime rose significantly during this
time. According to Felson and Cohen, the reason for the increase is that the prosperity of
contemporary society offers more opportunities for crime to occur; there is much more to
steal.


3

Gekoppeld boek

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Heel boek samengevat?
Nee
Wat is er van het boek samengevat?
H8, h9, h11
Geüpload op
23 maart 2019
Aantal pagina's
27
Geschreven in
2018/2019
Type
SAMENVATTING

Onderwerpen

$5.07
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Beoordelingen van geverifieerde kopers

Alle 2 reviews worden weergegeven
6 jaar geleden

6 jaar geleden

3.5

2 beoordelingen

5
0
4
1
3
1
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
marjoleincharlotte Hogeschool Utrecht
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
26
Lid sinds
10 jaar
Aantal volgers
16
Documenten
3
Laatst verkocht
3 jaar geleden

4.0

5 beoordelingen

5
1
4
3
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen