LESSON 11- INTERNET DEVIANCE

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/92

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:38 AM on 3/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

93 Terms

1
New cards

Identity theft (online)

Stealing personal info (credit card, Social Security) via computer to buy goods charged to victim

2
New cards

Profitability of online theft

Easier and more profitable than traditional theft (store/bank burglaries)

3
New cards

Example: Carlos Salgado

Stole 100,000+ credit card numbers via computer-intrusion program; credit line ~$1B; caught by FBI; sentenced 2.5 years

4
New cards

Hacking commercial databases

Method used by identity thieves to steal mass consumer data

5
New cards

Phishing

Targeted e-mails pretending to be banks/e-commerce sites asking for personal info

6
New cards

Phishing example

Mark Nichols received fake eBay email asking for credit card info; avoided loss by verifying site

7
New cards

Keylogging programs

Software that records keystrokes and sends info to thieves; used to steal usernames, passwords, and bank info

8
New cards

Spyware/Trojans

Monitoring programs secretly planted in websites, emails, or downloads; includes keyloggers

9
New cards

Keylogger uses

Parents monitoring children, partners spying, but mainly thieves stealing cash/accounts

10
New cards

International cybercrime

Keyloggers and Trojans often used across borders; victims worldwide

11
New cards

Example: Joe Lopez

Joe Lopez lost $90,000 via keylogging Trojan; funds transferred to Latvia

12
New cards

Inside jobs in identity theft

Over 50% involve corporate insiders (employees, authorized users)

13
New cards

Example: GM employee

Stole personal info of executives on last day, caught, then repeated at another company

14
New cards

Company security failures

Lack of monitoring insiders; no firewalls; default/easy passwords; accidental data sales

15
New cards

Example: Choice-Point

Information broker sold 145,000 customer records to a fake company due to poor security

16
New cards

Consequences of weak corporate security

Consumer data exposed; increases identity theft risk

17
New cards

Preventive measures

Use firewalls, strong passwords, monitor insider access, verify requests for personal info

18
New cards

Internet gambling legality

Illegal in the U.S.; games requiring more skill than chance (chess, backgammon, eight-ball pool) are legal; games with more luck than skill (sports betting, poker, blackjack, slots) are illegal

19
New cards

Growth of Internet gambling

Players increased; sites grew from 700 (1999) to 2,400 (2006); revenue rose from

20
New cards

Reason U.S. law can't stop it

Global and borderless nature; foreign sites legal; U.S. sites often unenforced due to higher priority issues (terrorism, drugs)

21
New cards

U.S. government action

Continues to treat Internet gambling as illegal; some bills to block bank/credit card payments failed

22
New cards

Reasons for keeping illegal

1) Prevent minors from gambling 2) Protect compulsive gamblers from bankruptcy 3) Reduce fraud 4) Limit organized crime involvement 5) Prevent money laundering

23
New cards

Cost of illegality

Loss of potential tax revenue (~$900M/year); lack of regulation allows underage/compulsive gambling and offshore operators beyond U.S. law

24
New cards

Legalization benefits

Regulate industry, reduce youth/compulsive gambling, fraud, and money laundering

25
New cards

Types of Internet gamblers

Previous land-based casino gamblers more likely to gamble online; online gamblers tend to be younger, more educated, adventurous, financially stable, and bank online

26
New cards

Addictiveness of online gambling

More addictive than offline due to convenience, enjoyment, anonymity, and solitary nature

27
New cards

Financial behavior online vs offline

Online gamblers stop when funds run out; offline gamblers continue gambling beyond affordability; offline gamblers tend to be less educated

28
New cards

Cybersex definition

Use of the computer to find sexual partners, engage in erotic chats, trade pornographic images, masturbate, or have extramarital/real-life sex

29
New cards

How participants find partners

By posting/answering personals online or entering chat rooms

30
New cards

Activities involved

Exchanging erotic emails, trading pornographic pictures, engaging in steamy chat conversations, sometimes meeting offline for real sex

31
New cards

Typical demographics

Mostly white, male, college-educated; about half are married

32
New cards

Reason 1: Anonymity

Allows users to hide true identity, adopt preferred persona, feel confident or attractive, overcome shyness

33
New cards

Reason 2: Ease and convenience

Makes finding partners with similar sexual interests easier, especially for busy individuals

34
New cards

Reason 3: Sharing sexual fantasies

Allows discussion and realization of fantasies socially frowned upon in the real world

35
New cards

Reason 4: Masturbation outlet

Provides an easy outlet for sexual release through online interaction

36
New cards

Reason 5: Potential for real-life sex

Expectation that online sexual interaction may lead to satisfying face-to-face sexual encounters

37
New cards

Cyberporn typical users

Mostly older, married men, white, middle-class

38
New cards

Age demographics

Two-thirds are over 30 years old

39
New cards

Marital and social profile

Mostly married, relatively unhappy in marriage, weak ties to religion

40
New cards

Viewing time

70% of cyberporn traffic occurs during work hours

41
New cards

Teenage users

Less inclined to view cyberporn; exposed to porn from youth, less intrigued

42
New cards

Child porn demographics

Mostly white men in their 30s and 40s; occupations vary widely from unemployed to scientists/engineers

43
New cards

Motivations for child porn use

Used as masturbation aid and for trading pornographic material to satisfy “collective fetish”

44
New cards

Attitudes among child-porn consumers

Vary widely: some see it as wrong, some view it as “innocent” fantasy, some admit to molestation

45
New cards

Online affairs definition

Married people engaging in extramarital sexual activities through emails or chat rooms

46
New cards

Difference from offline affairs

Offline involves physical contact; online involves erotic conversations, sexual fantasies, or masturbation

47
New cards

Common rationalizations

“It’s just a friendship,” “merely flirtation or fun,” “relationship with a computer, not a real person,” “never met in person,” “no physical sex occurs”

48
New cards

Public perception

Most people view online affairs as real and harmful to marriages, similar to offline infidelity

49
New cards

Internet facilitation factors

Anonymity allows cheating without fear of being caught

50
New cards

Internet facilitation factors

Convenience of finding partners worldwide without leaving home or office

51
New cards

Internet facilitation factors

Escapism from real-life stress into a fantasy world

52
New cards

Offline progression

About 30% of married people with online affairs eventually meet partners in person and have sex

53
New cards

Case example

Ted, a 40-year-old married salesman, quickly progressed from first-time to habitual cheater due to anonymity, convenience, and escapism

54
New cards

NSHM definition

“Not so happily married” – individuals seeking casual sex online without wanting a steady partner

55
New cards

Cyberstalking definition

Using the Internet or e-mail to repeatedly harass or threaten another person

56
New cards

Growth factors

Cheaper, more accessible, and easier-to-use computer technology helps conceal the stalker’s identity

57
New cards

Prevalence

About 10% of students at the University of New Hampshire reported repeated harassment via e-mail

58
New cards

Perceived severity

Lack of physical contact may seem benign, but cyberstalking can be more disturbing and dangerous than traditional stalking

59
New cards

Access to victim

Cyberstalkers have greater access to personal data, can disrupt personal/professional life, and harass globally

60
New cards

Potential consequences

Emotional, mental, physical harm; sexual assault; kidnapping; murder

61
New cards

Demographics of perpetrators

Most cyberstalkers are male, victims are female, and perpetrators are often older than victims

62
New cards

Relationship to victim

Most cyberstalkers know their victims, but some target strangers

63
New cards

Example 1

50-year-old ex-security guard in LA harassed a 28-year-old woman online, posting personal info and fantasies; led to multiple attempted sexual assaults; sentenced to six years

64
New cards

Example 2

Recent male graduate in San Diego sent daily threatening e-mails (“e-mail bombing”) to five female students he believed mocked him; victims had never met him

65
New cards

Prejudice-driven cyberstalking

Apparent “normal” students may harass sexual minority strangers online but not friends, showing targeted online deviance

66
New cards

Hacking definition

Breaking into a computer network to plant viruses, steal data, change user names/passwords, manipulate webpages, or explore the system

67
New cards

Computer sabotage

Use of viruses to delete files or disrupt computer function; affects virtually all users

68
New cards

Worms

Malicious programs that replicate themselves without user assistance, potentially crashing systems

69
New cards

Malicious hacking

Includes viruses/worms and breaking into systems to disrupt services or steal info

70
New cards

Innocent hacking

Breaking into systems for challenge and notifying admins to improve security

71
New cards

Mischievous hacking

Illegal but playful hacking, e.g., accessing celebrities’ phones, posting personal info, changing grades

72
New cards

Financial-motivated hacking

Targeting individuals or corporations to steal personal info or money; often involves social engineering

73
New cards

Cybercrime demographics

Foot soldiers often young adults from poorer countries; hacking for profit also occurs within rich countries

74
New cards

Juvenile deviance link

Hacking is predominantly male and juvenile; shares characteristics with juvenile delinquency

75
New cards

Male overrepresentation

Male-to-female ratio among hackers can be as high as 99:1 due to interest in logical problem-solving, machines, and domination

76
New cards

Family background

Hackers often come from dysfunctional families with neglect, conflict, abuse, or parental substance issues

77
New cards

Peer influence

Hackers associate with peers and participate in competitive hacking (“out-hacking”) similar to delinquent group behaviors

78
New cards

Hacktivism

Use of hacking to promote political or social agendas

79
New cards

IC3

Internet Crime Complaint Center collects reports on hacking and cybercrime

80
New cards

Hacking and terrorism

Hacking can facilitate terrorism by disrupting networks or stealing sensitive info

81
New cards

Internet layers

Surface web: publicly accessible sites; deep web: not indexed; dark web: hidden, often illegal content

82
New cards

Global nature of cyberdeviance

Cyberdeviance occurs worldwide and easily crosses national borders, with perpetrators in one country targeting victims in another

83
New cards

Nigerian scam

Classic international fraud cheating Americans out of $5 billion from the early 1980s to 1996; still ongoing

84
New cards

Example of cross-border fraud

Canadian meth addicts stole personal info and sold it online to crime rings in Romania, Austria, and Egypt

85
New cards

Most common cyberdeviance

Online fraud, including identity theft, dominates cyberdeviant activity globally

86
New cards

IC3

Internet Crime Complaint Center; alliance of FBI, National White Collar Center, and Bureau of Justice Assistance

87
New cards

Top countries for cyberdeviance complaints

United States, United Kingdom, Nigeria

88
New cards

Increase in cybercrime

Reports rose from 640 in 1993 to over 1.35 million by 2002

89
New cards

Factors for rise in cyberdeviance

1) Increased use of computers and the Internet 2) Lack of law enforcement globally

90
New cards

Lax enforcement hot spots

Russia, Eastern Europe, and countries with high Internet access but low policing see high cybercrime

91
New cards

Recruitment of young hackers

Organized crime syndicates recruit computer-savvy youth through chat rooms or online contests (e.g., South Korea hacker contest)

92
New cards

International legal gaps

Criminals can evade prosecution due to lack of applicable laws or lack of international cooperation (e.g., "I Love You" virus creator in the Philippines)

93
New cards

Impact of COVID-19 pandemic (inferred)

Increased online activity likely facilitated more cyberdeviance, including scams and fraud

Explore top flashcards

flashcards
Skeletal system II / Joints
175
Updated 410d ago
0.0(0)
flashcards
Business Quiz #1
34
Updated 1104d ago
0.0(0)
flashcards
100 questions.
100
Updated 296d ago
0.0(0)
flashcards
Chapter 8
41
Updated 1029d ago
0.0(0)
flashcards
Hamlet (Acts III-V) 76 words
76
Updated 1236d ago
0.0(0)
flashcards
Year 3 EMIs
309
Updated 383d ago
0.0(0)
flashcards
Skeletal system II / Joints
175
Updated 410d ago
0.0(0)
flashcards
Business Quiz #1
34
Updated 1104d ago
0.0(0)
flashcards
100 questions.
100
Updated 296d ago
0.0(0)
flashcards
Chapter 8
41
Updated 1029d ago
0.0(0)
flashcards
Hamlet (Acts III-V) 76 words
76
Updated 1236d ago
0.0(0)
flashcards
Year 3 EMIs
309
Updated 383d ago
0.0(0)