Subculture of Cyber Crime
Prior to beginning work on this Interactive Assignment, read the Choo (2008) and Koops (2010) articles.
As the newly elected sheriff of the Village of Dibley, you have been assigned to head the National Cybersecurity Squad. Your team is responsible for developing a report on the typology of a computer hacker. You have recently stumbled across the 1983 motion picture Wargames and were surprised to learn that it is widely considered to be one of the most significant factors responsible for increasing public interest in technology, most notably computer hacking. After watching the movie, you have gained an interest in the world of cyber crime and have started lurking in various hacking fan sites, news groups, Facebook groups, and bulletin board networks in an attempt to learn as much as possible about the culture of cyber criminals and computer hackers. You want to ensure that you bring as much relevant information to your team as possible.
For your initial post, you must create a workable typology of a computer hacker to present to your team. Your report must be in the form of a PowerPoint presentation comprised of at least six content slides. Your PowerPoint presentation must be clear and provide your audience with an understanding of the purpose and meaning of the report.
Include the following elements in your presentation:
Analyze what makes computer hacking and cyber crime attractive for some people.
Briefly examine the history of computer hacking and hackers.
Identify the defining characteristics of a hacker.
Describe the beneficial aspects of computer hacking.
Examine how hackers utilize cyberspace to communicate and form communities.
Evaluate the computer hacking aspects of cyber crime that thwart efforts by the law enforcement community to detect and combat such activity.
For each one of your content slides, provide speakers notes that include what you would say about the content of each slide if you were to present it formally. Include visual enhancements in your presentation. These may include: appropriate images, appropriate animations, and transitions from content piece-to-content piece and slide-to-slide. (Images should be cited in APA format as outlined by the Writing Center (Links to an external site.). Students may wish to use the Where to Get Free Images guide for assistance with accessing freely available public domain and/or Creative Commons licensed images.) It is recommended that you access Garr Reynolds’ Top Ten Slide Tips (https://www.garrreynolds.com/preso-tips/design/), which provides useful assistance with creating successful PowerPoint presentations.
Choo, K. R. (2008). Organised crime groups in cyberspace: A typology (Links to an external site.). Trends in Organised Crime, 11, 270-295. http://dx.doi.org/10.1007/s12117-008-9038-9
The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. The author of this article examines three categories of organized criminal groups operating exclusively within cyberspace. It will assist you in the development of this week’s discussion posts and the interactive assignment.
Koops, B.-J. (2010). The internet and its opportunities for cybercrime (Links to an external site.). In M. Herzog-Evans (Ed.), Transnational Criminology Manual: Volume 1. Introductive part: What is criminology? (pp. 735 -754). http://dx.doi.org/10.2139/ssrn.1738223
This article provides a typology of cybercrime and cyber criminals. It will assist you in the development of this week’s discussion posts and the interactive assignment.