Instructor: Baxter
NT1110
Unit 11 Lab: Research Project
Cyber Crime
In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher’s computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). Computers and the internet have become intertwined into our daily lives.
One reason why individuals use the internet is because they can gather and share information with other individuals no matter where on the globe they are located. This advancement …show more content…
Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal …show more content…
(2004). U.S. cybercrime law: Defining offenses. Information Systems
Frontiers, 6(2), 115-132.
Buzzell, T., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture, 13(2), 96-116. Retrieved December 27, 2011, from http://www.albany.edu/scj/jcjpc/vol13is2/Buzzell.pdf
Choi, K.(2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333.
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. In F. Cullen & R. Agnew (Eds.), Criminological Theory Past to
Present: Essential Readings (pp. 427-442). New York, NY: Oxford University
Press.
Cullen, F., & Agnew, R. (2006). Criminological theory: past to present essential readings. (3rd ed., pp. 5-8). New York, NY: Oxford University Press.
Deng, X., & Zhang, L. (1998). Correlates of self-control: An empirical test of self-control theory. Journal of Crime and Justice, 21(2), 89-110.
Federal Bureau of Investigation, Cyber Crime Division. Computer intrusions. Retrieved November 28, 2011from