Typology of Cyber Crime
Typology of Cyber Crime
Typology of Cyber Crime
2. computer-related offenses;
3. content-related offenses;
4. copyright-related offenses
CLASSIFICATION OF COMPUTER CRIMES
Ex: Maria has not had any of these happen to her, so her
stalker is using surveillance stalking and cyberstalking.
TYPES OF STALKERS
Rejected Stalker- This type of stalker becomes upset when
the friendship or romantic relationship has ended. The
rejected stalker is not only self-centered and jealous but
also over-dependent and persistent.
Resentful Stalker – The resentful stalker feels
humiliated that the relationship has ended and seeks
revenge upon the victim. Resentful stalkers are often
irrationally paranoid and are known to verbally assault
their victims
Predatory Stalker- The predatory stalker seeks power and
sexual gratification. They will not make physical contact
but will use surveillance to track the victim.
Intimacy Seeker– The intimacy-seeking stalker seeks an
intimate and romantic relationship with the victim. When
the stalker is rejected by the victim, he or she will
continually phone the victim, write the victim letters, and
can become jealous and violent if the victim enters into a
relationship with someone else.
Incompetent Suitor- The incompetent suitor stalker usually
has inadequate social skills. They want a relationship with
the victim but do not have the ability to realize he or she is
not meant to be with the victim.
Erotomania and Morbidly Infatuated- This type of stalker
feels that the victim loves them even though they may not
have had any contact with the victim. The stalker is usually
paranoid, prefers suitors in a higher social class, and will
repeatedly approach the victim.
Cyber stalking
is the use of the Internet or other electronic means to
stalk or harass an individual, group, or organization. It may
include false accusations, defamation, slander and libel. It
may also include monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering information
that may be used to threaten, embarrass or harass.
TYPES OF CYBERCRIME
Financial Crimes
Cyber Pornography
Online Gambling
IP Crimes
Email Spoofing
Cyber Defamation
Cyber Staking
Unauthorized Access
Theft
Email Bombing
Salami Attacks
Virus/Worm
Logic Bombs
Trojan Attacks
Web Jacking
Cyber -Terrorism
CLASSIFICATION OF COMPUTER
CRIMES
FINANCIAL FRAUD CRIMES
INTERNET FRAUD
COMPUTER FRAUD