• Entry
  • Reader's guide
  • Entries A-Z
  • Subject index

Broadly speaking, one can classify cybercrimes in two categories. First, there are crimes that require a computer and cannot be committed in any other way or against any other type of victim. These also include crimes where the computer is the target of the offense, for example, unauthorized access to systems, tampering with programs and data, and planting viruses. Second, there are familiar or conventional crimes that are facilitated by computers and information and communication technologies (ICTs), such as “cyber” versions of identity theft, stalking, pedophile activities, or trading counterfeit goods. In some cases, criminal activities may encompass both categories. For example, acts of terrorism can involve qualitatively new offenses enabled by computer technologies or, alternatively, may integrate cyberspace into more traditional activities, such as ...

    • Loading...
    locked icon

    Sign in to access this content

    Get a 30 day FREE TRIAL

    • Watch videos from a variety of sources bringing classroom topics to life
    • Read modern, diverse business cases
    • Explore hundreds of books and reference titles