Professional Documents
Culture Documents
3/27/12
Contents
What is CYBER CRIME? What is COMPUTER CRIME? Profile of CYBER CRIMINAL Victims Introduction to the internet
3/27/12
What is
CYBER CRIME ?
kidnapping
crimes
like
Forgery,
extortion,
Disgruntled employees. Teenagers. Political Hacktivist. Professional Hackers. Business Rival. Ex-Boy Friend. Divorced Husband. etc
3/27/12
Victims
Gullible Desperados and greedy people Unskilled & Inexperienced Unlucky people
3/27/12
information and exciting experiences at your command. With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send flowers to a friend, or purchase your favorite stock etc. Internet increases throughout our nation and the world, the wrongful use of the Internet to commit crime and victimize people also increases.
3/27/12
Leads to Exploitation
sexually exploited, kidnapped, and solicited by individuals using online service. One reason is the anonymous nature of the Internet. using the Internet. Pedophiles will make contact with victims by having children call collect so the pedophile's telephone number will not show up on their parent's telephone bill.
3/27/12
Cont..
Pedophiles will also purchase a prepaid
telephone card and give children a toll free access number enabling children to call from anywhere they choose. Pedophiles will often convince children to send them a photograph. photograph and/or pose as professional photographers to obtain nude, graphic or sexually explicit photographs of children.
3/27/12
Cont.
The following are some examples: Choose an online service that offers parental
control features;
information about themselves on the Internet in a public chat room, on an electronic bulletin 3/27/12 board or in their e-mail messages;
Cont.
Teach children to never let anyone pressure
Internet that charges for services without asking permission from a responsible adult first;
school. Check with the school authorities to ensure your children are properly supervised and monitored by a responsible adult; 3/27/12
Cont
If you become aware of the transmission, use,
or viewing of child pornography while online, report it to the National Center for Missing and Exploited Children; who they seem;
Teach children that people online may not be Teach children online service providers never
ask for passwords and they should never give their password out; the Internet may not be true;
Impact
Shock Disbelief Fear and terror Confusion and frustration Guilt or self blame Humiliation Sorrow
3/27/12
Survival Strategies
Rescuing must rescue others Fighting must remove danger Competing-must obtain scarce essentials Adapting-must surrender goals Asserting-must achieve goals Cooperating-must create scarce essentials.
3/27/12
Thank you
3/27/12