Instructor: Dr. Michael Wilson
Institution: Murdoch University
Email: michael.wilson@murdoch.edu.au
Recognizes the Whadjuk people of the Noongar nation as traditional custodians.
Acknowledges Noongar elders past, present, and emerging.
Focus on the intersection of technology, crime, and justice.
Discussions will cover controversial topics.
Emphasis on creating a safe space for debate and exploration of sensitive issues.
Students are encouraged to seek help if struggling with content.
Influence of technology on deviant behavior.
Change in offender-victim relationships due to technological advancements.
Geographic jurisdiction challenges created by technology.
Digital property ownership in criminal law.
Challenges posed by technology in criminal investigations.
Effects of digital surveillance on privacy rights.
Distribution of technology's costs and benefits.
Realization of the rule of law in cyberspace.
Definition: Development via science and mathematics for practical purposes (Brey, 2017).
Two components:
Hardware: Tools and machines extending human capabilities.
Techniques: Knowledge of means-ends/ cause-effect relationships.
Historical comparisons:
IBM 5100 (1975)
Dell XPS Laptop (2021)
Royal #10 Typewriter (1918)
Printing Press Machine (1819)
Explores the relationship between technology and culture:
Technological Determinism: Technology shapes society and culture.
Social Determinism: Cultural choices influence technological development.
Definition: Technology that evolves beyond human control (Ellul, 1964).
Discussion on the social impacts of technology and technophobia:
Technophobia: Excessive fear or anxiety towards new technologies (Khasawneh, 2018).
Definition: The environment for communication over computer networks.
Differentiates between public and private cyberspace.
Concept of the metaverse as a unified virtual space.
Definition: Devices for data processing and storage.
Programming basics:
Instructions for computers to execute (Brookshear & Brylow, 2020).
Higher-level programming languages for efficiency.
Basics of networking:
Node: Individual computer in a network.
Client: Requests services from a server.
Server: Provides services to clients.
Overview of the Internet:
As a 'network of networks'.
Surface Web, Deep Web, and Dark Web distinctions.
Development timeline from ARPANET to commercialization.
Major milestones:
Web 1.0: Static webpages (1991-2004).
Web 2.0: Social media and user-generated content (2004-present).
Introduction of smartphones and smart devices.
Definition: Illegal behaviors using computer systems or cyberspace (Holt et al., 2018).
Cybercrime has unique characteristics:
Compressed space-time between offenders and victims.
Potential for extensive connectivity.
Dynamic online identities.
Computer-enabled Crime: Incidental use of a computer for traditional crimes.
Computer-dependent Crime: Crimes requiring computer use.
Generational changes in cybercrime:
First Generation: Traditional offences using computers.
Second Generation: Blended cybercrimes in global networks.
Third Generation: High-end cybercrimes mediated by technology.
Cyber-Trespass: Unauthorized digital boundary crossing.
Cyber-Deception and Theft: Illegal acquisition of information or resources.
Cyber-Obscenity: Content deemed obscene within legal jurisdictions.
Cyber-Violence: Online harassment and harmful behavior.
Topic: Regulating Cyberspace
Email: michael.wilson@murdoch.edu.au
Reminder about classroom standards and expectations for virtual interaction.
Examples of Cybercrime Typology:
Computer-enabled Crime:
Example: Someone uses a computer to commit fraud by sending deceptive emails that look like they come from a legitimate bank (phishing).
Computer-dependent Crime:
Example: A hacker breaks into a company’s database to steal sensitive personal information, relying entirely on their computer skills and tools.
Categories of Cybercrime:
Cyber-Trespass:
Example: A user bypasses security measures to access restricted areas of a website without authorization.
Cyber-Deception and Theft:
Example: A scam where an individual impersonates another person online to gain access to their financial resources.
Cyber-Obscenity:
Example: Distribution of illegal pornography that violates local laws on obscenity.
Cyber-Violence:
Example: A person engaging in online bullying or harassment, leading to psychological harm to the victim.
Cybercrime typologies can fit into traditional crime categories as follows:
Crimes Against Person: This includes cyber-violence (e.g., online harassment, bullying), where the victim may suffer psychological harm. Cyber deception that leads to fraud can also impact individuals directly.
Crimes Against Property: Cyber-trespass and computer-dependent crime, such as hacking into systems to steal sensitive information, directly affects the property rights of individuals and organizations. These acts represent violations of ownership and security of data.
Crimes Against Morality: Cyber-obscenity pertains to the dissemination of content that violates societal standards of decency, such as illegal pornography. This typology raises moral and ethical questions about online behavior and its impact on social values.
Overall, these cybercrime typologies represent modern interpretations of traditional crime classifications, adapting to the complexities of digital interactions.