0% found this document useful (0 votes)
43 views29 pages

Cyber Crime

The document discusses different types of cybercrimes including those that use computers as weapons, accessories to crimes, or targets of crimes. It also defines and provides examples of specific cybercrimes like cyber bullying, child pornography, libel, cyber stalking, cyber sex, and plagiarism. The 3 types of cybercrimes are those that use computers as weapons, accessories, or targets of the crime.

Uploaded by

Sharnelle Noto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views29 pages

Cyber Crime

The document discusses different types of cybercrimes including those that use computers as weapons, accessories to crimes, or targets of crimes. It also defines and provides examples of specific cybercrimes like cyber bullying, child pornography, libel, cyber stalking, cyber sex, and plagiarism. The 3 types of cybercrimes are those that use computers as weapons, accessories, or targets of the crime.

Uploaded by

Sharnelle Noto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CYBER-

CRIME
WHAT IS
CYBERCRIME?
CYBERCRIME
• These are criminal acts
using the computer or
Internet or any gadgets
Why does
Cybercrime
happens?
Because of..….

JUVENILE DELINQUENCY
• Children often test the limits and
boundaries set by their parents.
Among adolescents, some
rebelliousness and experimentation
is common.
THE 3 TYPES OF CYBERCRIMES
A. Those who use the computer
as a weapon
B. Those who use the computer as an
accessory to the crime.
C. Those who make the computer a
target of a crime.
A. Those who use the
Computer as a Weapon
• Thinking that the computer will be
your way to destroy someone.
• The whole crime is done on the
computer or through the use of
the computer
Example 1:
Jayson uses the computer to
blackmail his girlfriend who is
about to break up with him by
explicit/ sensitive pictures of her.
Example 2:
Miguel hacked the account of his
best friend whom he got argued,
he used his account to post
unacceptable words.
 The crime happened in
the computer itself.
B. Those who use the
Computer as an Accessory
to the Crime.
• There is a part of the crime using a computer.
• The whole crime is not done using the computer,
the computer is only an accessory or one way in
doing the crime.
Example 1:

Kaisser is planning to kill her brother because of jealousy,


he tried to threaten him using the computer or cellphone
(chat), through that chat, his brother feels threaten and
wanted to kill himself. After days of threats, Kaisser
decided to kills his brother
• In that situation, The real motive of
Kaisser is to kill his brother, not just
to threaten him, the crime didn’t
happen on the computer, he only used
the computer as an accessory to
threaten and kill his brother.
C. Those who make the
Computer a target of a
crime.
• In this situation , the computer itself is
the target of the crime.
EXAMPLE 1:

Hannah wants to destroy the computer of


Missy, so she inserted a malware flash drive
with her purpose to copy movies, but the real
motive is to infect the computer of Missy.
What are the
3 types of
CYBERCRIME?
DIFFERENT
KIND OF
CYBERCRIME
Cyber
LIBEL
Bullying
Cyber
Stalking
Cyber
Child
Pornogra- Sex
phy
Cyber Bullying

• Bullying that takes place using


electronic technology such as
cellphones, computers etc.
EXAMPLES:

• Uploading humiliating posts


against someone.
• Uploading embarrassing pictures or
videos of someone.
• Threatening someone using
different accounts.
RESULTS:
 Depression
 Afraid to go to school
 Can’t eat properly
 Wants to be alone
 Can’t focus on studies
Can even lead to death / suicide
CHILD PORNOGRAPHY
Involving
minors in any
sexual
activities
especially in
social medias.
Examples:
• Sending pictures of a child
undressed.

• Video chatting with a child showing


sensitive parts of her/his body.
Libel
Spreading news and
making statements
through any written
works ( documents,
posts, written letters)
Examples:

• Posting rumors about someone


• Writing something about someone and
disseminate it in public
• Print out statements that can ruin the life of
someone
• *WRITTEN CHISMIS*
Cyber Stalking
 Checking or often
visiting the
timeline, account ,
profile, pictures
and information
about someone.
Cyber Sex
• Just like Child Pornography it has
something to do with any sexual
activities online, but in this kind, it is
not just children who are involve but
anyone, regardless of age.
Plagiarism
• an act or instance of using or closely
imitating the language and thoughts of
another author without authorization;
the representation of that author's
work as one's own, as by not crediting
the original author

You might also like