1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Crime
Broad criminal activity targeting or using computers, or using computers as a medium for illegal activities.
Convention on Cybercrime
An international council determining cybercrime what defines a cybercrime
Law enforcement challenges in cybercrime
lack of expertise
expensive resources
jurisdictional issues with foreign countries.
Profiles of cybercriminals
young
tech-savvy
part of large networks.
Why do cybercrime victims not report cybercrimes?
mistrust in law enforcement
concerned about reputation.
Copyright
Protects the expression of an idea but not the idea itself
Patent
Grants sole ownership of an idea
Trademark
An exclusive symbol that distinguishes a product and prevents others from using similar marks.
US Digital Millennium Copyright Act
Criminalizes unauthorized access or copying of online copyrightable work
Privacy
Concerns whether data should be visible to others and how data is managed.
Ethics
Moral principles that guide what is deemed right or wrong
Whistleblowing
Reporting unethical practices,
may harm both the organization and the whistleblower.
Code of Conduct benefits
Is a positive stimulus
Is educational
Provides support
Enhances image
Intellectual Property
Legal rights that protect creations of the mind, including copyrights, patents, and trademarks.
Big Data
The analysis of large datasets, often performed without user permission, raising privacy concerns.
Privacy Technical Approach
Using the technical mechanisms used by the database
Privacy Social Media Approach
limiting who can see what on one’s social media page (eg. through settings or tags)
Privacy Policy approach
employing informed consent for data collection
Privacy governance
management oversignt of data
Privacy ownership + authority
Who owns + is responsible for data