Link to home
Start Free TrialLog in
Avatar of hokw
hokw

asked on

May I know the types of cybercrime?

I'm doing a project on cybercrime.
May I know the types of cybercrime and how do they occur?
Avatar of j2
j2
Flag of Sweden image

That would differ between all countries, and for the US it differs between states.
Avatar of Davy070599
Davy070599

Hi,

Go to support.microsoft.com and read article Q175312.  It explains your problem.

The key that has to be set to 'N' is the following:

HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\EnableRemoteConnect

Byeee...

Sorry, wrong comment!


My comment for you should be: go to www.deja.com and search for cybercrime.  You'll find a lot of information concerning the theme.

ASKER CERTIFIED SOLUTION
Avatar of Moresca
Moresca

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Moresca makes an interesting comment.  It can be incredibly enlightening to go to efnet's #hack and sit for a few evenings.  You won't get a straight answer to any questions you post there, and the signal to noise ration ain't so hot, but if you watch for a while you can learn a lot.
http://www.fbi.gov and click on Search.  You'll find some interesting stuff.
Other examples of cybercrime are,

cyberstalking:- hassling/harrassment of a user via email or other means.

piracy:- up or downloading of copyrighted software

credit card fraud via online purchasing

some sexually oriented activity online may be a crime where the user concerned is resident, a pretty general example is paedophilic activities, but may also be related to homosexuality (in a lot of US states in fact), or even just plain nudity (Arab/moslem countries)

Racism online may also be criminal according to it's form and intent and again based on locality.

Basically anything that can involve an abuse or misuse of information can be regarded as cybercrime.
The FBI does allot of monitoring, from talking to a few of them. Tyey will monitor a person's e-mail activity based on input from various informants.
Avatar of hokw

ASKER

Thanks a lot! I've found what I wanted. My project is
now over.