4. Crime

From WikiEducator
Jump to: navigation, search

With the assistance of technology, there are many new ways to commit crimes. However, there are also new ways to detect and prevent crime, as well. We look at both sides - good and evil.

Learning outcomes

  • understand issues associated with computer crime
  • find web resources appropriate to the topic
  • facilitate student discussion
  • learn to work collaboratively online


  • hacking, identity theft, fraud, scams, civil liberties, law enforcement

Study notes

  • What are some new forms of criminal behavior that did not exist before the internet? What crimes are easier with the aid of computers and technology?
  • Worms and virus - have you been attacked or infected? What was the "cost" to you in time, effort or money? Should the creators be punished for spreading these? What is suitable punishment?
  • Is any hacking harmless?
  • Should the age of the hacker be taken into consideration when judging these crimes? Why or why not?
  • Who is ultimately responsible for the security of computer assets? To what extent can the owner expect that others will abide the laws and not harm the information?
  • Does hacking improve security?
  • Have you received email or visited sites that you thought were engaged in fraud or some criminal activity?
  • Is spam really a kind of theft? How big a problem is spam? What steps do you take to avoid spam?
  • Do you understand identity theft? What steps do you take to prevent your identity being stolen? Are you personally concerned about having your identity stolen?

Icon multimedia.gif



How To Hacker-Proof Your Life [Infographic]
stay up to date with security risks and how to prevent and hacker-proof your stuff, or even to just make it harder for someone to gain access to it. This infographic called Where You’ll Get Hacke...
Top Five Computer Crimes & How to Protect From Them
most common types of internet crime. As these crimes are more common than people really think about, the resource talks about things that you can do to help protect again becoming a victim of tech...
SKorea: Alleged hacking attack hits Internet users
reach that online criminal actions can have on a global scale. These crime are important to know about in hopes that users will keep their safety in mind while utilizing their computers.
Cybersecurity fears are making U.S. sailors learn to navigate by the stars again | The Salt Lake Tribune
with our growing reliance on a digital infrastructure, we should have a backup plan that relies on analog devices and human intuition. This article discusses the Navy’s decision to revert back to...
Cyberbullying | StopBullying.gov
great resource for parents, teachers, and children to help identify cyberbullying, preventative actions that should be taken to limit threats of cyberbullying, and the steps that should be taken wh...
FBI - Internet Fraud
Internet Fraud Listed below are tips to protect yourself and your family from various forms of Internet fraud. Tips for Avoiding Internet Auction Fraud: Understand as much as possible about how t...
How to Protect Your Computer from Hackers, Spyware and Viruses
Steps to Avoid Viruses & Malware 1. Install Anti-Virus Software - This should not even have to be listed because if you don't have any anti-virus software installed, you're asking for t...


The lazy person's guide to saving the world - United Nations Sustainable Development
"Change starts with you. Seriously. Every human on earth—even the most indifferent, laziest person among us—is part of the solution. Fortunately, there are some super easy things we can ad...
Flipboard on Flipboard
"stretch their limitations and boundaries.The purpose of the question isn’t necessarily to have you truly reach your ten year goal in six months, but it will force you to think beyond your c...
A Brain Teaser for each Cognitive Ability | SharpBrains
"main brain functions involved in cognition. You will also find brain teasers that will help you exercise the cognitive abilities described."
<p class="diigo-tags&quot...
Rubik's Cube: A question, waiting to be answered - YouTube
"Rubik's cube is more than a puzzle- it's a question waiting to be answered. And when the right person finds the right question, it can set them on a journey to change the world. We sa...
Global opportunity explorer
"The Global Opportunity Explorer is a platform which offers direct access to the most innovative solutions and market opportunities Rooted in over five years of research involving 18,000 busin...
Google Reveals Its 9 Principles of Innovation
"what Google’s chief social evangelist, Gopi Kallayil, calls the nine core principles of innovation. Kallayil shared his insights. Here are the nine rules that any enterprise, large or small...
5 websites where you can learn in-demand skills for free - Business Insider
"From Mandarin language classes to computer programming bootcamps and digital marketing workshops, there’s a course for almost anything. Plus, many classes are offered for free online. It’...
Memocamp – this is how it works
"The goal of memocamp is to make you familiar with the different memory techniques allowing you to increase the potential of your brain. Train and test yourself in different disciplines and se...


  1. Before you start the reading and the assignments, take a few minutes to think about what you already know about the topic - Computers and Crime. Write a sentence or two about this in the I know... discussion.

  2. Read the Study notes for an overview for the topics that will be covered.

  3. Read the article Introduction to Cyber Crime http://cybercrime.planetindia.net/intro.htm

  4. Read a few items in the current issue of the Risks Forum http://catless.ncl.ac.uk/Risks and post a brief 1-2 sentence summary of one item to Risks Forum discussion. Include a link to the item you select.

  5. Search the web for sites that talk about computers and crime. Find a site that you think is particularly interesting. Write 2-3 sentences about the social issues discussed. Post a link to the web site and description to the Computers and Crime discussion. To encourage more discussion, include a question in your posting. Is there another side to the story? Is there information that you need to understand the site you found? Be sure to ask a question that will get the discussion going about the topic.

    Follow links provided by other students and read through the page or articles. Reply to 2-3 other postings. Respond to the question. End your reply with your own questions. You are not limited to the number of posts - the objective is to get some discussion going here.

  6. Now what? - If you or someone you know has had their identity stolen or their computer hacked, what should they do? Find a resources with advice to help people recover from this situation. Post your link and a brief description of who could benefit from this resource to Hacked - now what? discussion.

  7. As new web-based services are provided and people share information, social bookmarking has evolved. Social bookmarking is a way to discover and share content from anywhere on the web. Pinterest <http://pinterest.com/>, Diigo <http://www.diigo.com/> and del.icio.us <http://del.icio.us>, Reddit <http://www.reddit.com/> are examples social bookmarking web services. Note: You are not required to create an account to complete this activity. It is ok if you just look. Pick a topic and explore the sites that are bookmarked. Post a description of your experience with social bookmarking in the discussion Social Bookmarking.

  8. Learning Literacies - Solve it - There are many tools available on the web to help with problem solving skills development and practice. Critical Thinking, Problem Solving and Decision Making are the primary focus of the articles provided. Review 2-3 articles in the Solve it media selections. Recommend one from the list or find one on the web that is particularly helpful. Post a link and a brief summary to the Learning Literacies - Solve it discussion. Review 2 others.

  9. Do you think you know an email scam when you see one? Take this quiz and see if you can tell the real corporate emails to customers from the phishing scams. I got 7 out of 10 right. I missed 1 scam but I would have ignored two real requests from companies I do business with.

  10. Read The 12 Principles of Collaboration. This is an archived version - there does not appear to be a current version. http://web.archive.org/web/20060427022829/http://www.mongoosetech.com/realcommunities/12prin.html
    All communities, on or off the web, adhere to basic principles in order to thrive. The 12 Principles function as a hierarchy. The chief principle, Purpose, is supported by the other 11 principles.
    Read the guidelines for Collaboration and Group Projects
    http://wikieducator.org/User:Vtaylor/Collaborative_Projects_-_Collaboration_and_Group_Projects. Then complete the quiz Collaboration and Group Projects

  11. Reflection - How long did you work on the assignments for this week? Is this about the same as it usually takes to complete the work each week? Is the pace of work for this class about right? What would you like changed in the course? What would help you learn more about Computers and Society? Please comment. This should be 3-4 sentences submitted as I think... assignment.

2013.09 1323. 2015.6 2056. 2016.6 3198