Talk:Cybercrime

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Stub or not[edit]

I'm not quite sure whether to call this a stub or not. Most of what could be added is already covered in the articles it links to. There's not a lot of consistency in these, which is no suprise, there are lots of opinions in this area. But I think overall the coverage of the topic is pretty good already. Always room for improvement of course. Andrewa 21:06, 15 Oct 2003 (UTC)

Who was the first person to ever start Computer Forensics?[edit]

I just was wondering if anyone knew who was the first to start that. I have to write a paper about it, but i cant seem to find it anywhere. Please Help. mrswayzee thomas trevenoi he did it all —Preceding unsigned comment added by 206.77.200.87 (talk) 19:38, 8 October 2009 (UTC)

Getting lottery emails and fund transfer emails regularly[edit]

hello I am getting such type of emails regularly. They asks processing charges to transfer the winning amount. All from Sweden, Netherland.

From Nigeria fund transfer email comes. They have 10 million US Dollors to transfer, they offer 30% to me. Rest to them. What Profit they gets by this transfer, God only knows. But the thing which I know is these all are crimes.

Manoj Sinha

Nigerian Letter, Lottery Scams, etc. fit under the category of Advance fee fraud. They profit by falsely promising money in return for a relatively small advance fee, paid by the victim. Check out the Wikipedia article for more info. 206.174.154.125 05:30, 1 September 2006 (UTC)

Grammar?[edit]

"...except where a non-commercial distribution has a not-insignificant effect on the copyright owner's business."

Shouldn't it be "significant effect"? Or are double negatives cool when you do law?

All I do is copy it down as parliament wrote it. Sadly, I did not make this up which would have been a not-unamusing thing to have done. David91 05:30, 1 February 2006 (UTC)


many kids find ways to hack on to the computer and do the wrong things . this should be stopped and men should have respect and leave kids alone. internet crime is to much. to many kids are being abused and raped from the wrong people.

as a student :gina

I'd like to see you find a way to stop computer crime. Especially when the combined governments of the world can't. And, this talk page is a discussion about the article, NOT a debate about the morality of computer crime. Also learn some English and basic sentence structure/grammar. 203.13.41.4 06:33, 6 April 2006 (UTC)

Child Porn?[edit]

The article says " Child pornography is illegal in most states." Are there States in America where child pornography IS legal??!! 203.13.41.4 01:51, 31 March 2006 (UTC)

I am sorry. Was it the use of the word "state" that made you think I was talking about America? Sadly, your assumption is completely unjustified. Most states in the world. . . When I write material relevant only to the U.S., I use U.S. state. David91 02:50, 31 March 2006 (UTC)
Fair enough. Thanks for clarifying that. 203.13.41.4 06:31, 6 April 2006 (UTC)

What about US law[edit]

Would be useful if this article covered US computer crime laws, as well as British ones. Despite being British myself, I actually came here to find out about the US equivalents. Perhaps there's somewhere we could request help on this one? JulesH 17:31, 3 July 2006 (UTC)

hacking[edit]

hacking is used as a crime term this is incorect hacking can refer to more things then just internet crime please use a better term for this

Fraud[edit]

The fruad section breaks my margins

Dustin 19:43, 25 September 2006 (UTC)

Merge[edit]

It has been suggested that the article Cybercrime be merged into Computer crime. I would be against that, but would be in favour of a merge the other way as this is topic covered by an international treaty Convention on Cybercrime. The scope of the Cybercrime Convention can be used to defines the core scope of the merged article.

Stealing memory from a computer or stealing laptops is a computer crime as it is a crime that involves computers, but it is not cybercrime which is what this article seems to be about. --Philip Baird Shearer (talk) 22:24, 26 April 2008 (UTC)

My solution would be to move the article Cybercrime to an archive talk page and move this article over the redirect created by that move so preserving the history of this article. If there is a consensus to do this and there is no friendly administrator to hand then leave a message on my talk page (as I do not watch this talk page) and as such a move is limited to an administrator making it. --Philip Baird Shearer (talk) 22:38, 26 April 2008 (UTC)

I have also proposed internet crime be also merged, it's a poorly written article with alot of overlap with both this article and cybercrime. --neon white talk 17:02, 21 June 2008 (UTC)


Due to lack of discussion i think this needs vbold action. Below is a list of references from the cybercrime article to be merged here. There were no inlines so if anyone can sort them out it would be appreciated. --neon white talk 13:30, 13 October 2008 (UTC)
  1. Adamski A. (1998) Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
  2. Jaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol 1 Issue 1 January 2007.Retrieved on March 15 2007, from http://www40.brinkster.com/ccjournal/editorial.htm
  3. Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar, Sage Publications. Retrieved on December 15 2006, from http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351
  4. Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to pornography on the internet’, Library and Information Research, 27(86), 8–18.
  5. McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households using the Routine Activity Approach. A thesis submitted to the University of Melbourne, February, 2000. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/childsafety/index.html
  6. Mann, David and Sutton, Mike, (1999). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, vol. 38, no. 2, Spring 1998.
  7. Thomas, D. and Loader, B. (2000) ‘Introduction – cyber crime: law enforcement, security and surveillance in the information age’, in: D. Thomas and B. Loader (Eds.), Cyber crime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge.
  8. Wall, D.S. (2007) Cybercrime: The transformation of crime in the information age, Cambridge: Polity
  9. Yar, M. (2005) The Novelty of ‘Cyber crime’: An Assessment in Light of Routine Activity Theory European Journal of Criminology, Volume 2 (4): 407–427:

Cleanup[edit]

I personally believe the article needs a complete rewrite, some of it is so poorly written that it makes little sense, then there is the issue of sources or lack of them in this case. This is how i think the article should be structured. :-

  • Lead section/intro/definitions - sourced of course
  • Types of crime with sub sections if enough info is available. Most have seperate artcles so we only need to be brief
  • section on law
  • documented cases
  • links
  • references

--neon white talk 13:41, 13 October 2008 (UTC)

I think that is a good format. I'll start implementing the structure. LH (talk) 22:20, 2 January 2009 (UTC)
I've done some cleanup work. I hope this is what other editors have in mind. These issues need to be addressed:
  • Tight, but comprehensive list of Specific Crimes, with links to the main page on the specific crime. Also, references inline/footnote to the specific jurisdiction's laws.
  • Cleanup the list of laws. Extortion, for instance, should not be listed here (yes it could be done with a computer, but it is unhelpful to call it a specific "computer crime")
  • Better general explanations. Should have media section, a history section, and perhaps a discussion about white-hat, grey-hat, black-hat crime, including links to specific incidents.
  • The list of incidents needs to have some objective inclusion criteria. I would suggest whether or not the incident was notable enough to have its own WP article. If it does, then it can be included. If the list balloons too much it should be split off to its own article.
I look forward to feedback from everyone else.

LH (talk) 22:57, 2 January 2009 (UTC)

Added to Cyberterrorism[edit]

I added a definition to cyberextortion, a type of cyberterrorism and extended it to link to a page for cyberextortionists.

leeaaro4 15:05, 17 February 2011 (UTC)

I think the part talking about cyber extortion should be re-written;
  • it's poorly written
  • cyber extortion isn't a form of cyber terrorism, it's just that in the cases given cyber terrorism is used as a means to do cyber extortion
  • uses cyberextortion and cyberterrorism instead of cyber extortion and cyber terrorism
Aisteco (talk) 21:16, 9 September 2012 (UTC)

Potential rewrite?[edit]

It seems that the poor organization of the the article could be improved upon. It seems like this is more of a list of types of computer crime at the top, possible reasons/effects/uses and then famous documented cases at the bottom. It could be more beneficial to have a more fleshed out design, one that more on each of the uses of computer crime and then categorizes each of the cases into related topics instead of being one large paragraph. — Preceding unsigned comment added by Andersme (talkcontribs) 20:22, 14 October 2011 (UTC)

External links modified[edit]

Hello fellow Wikipedians,

I have just added archive links to one external link on Computer crime. Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

You may set the |checked=, on this template, to true or failed to let other editors know you reviewed the change. If you find any errors, please use the tools below to fix them or call an editor by setting |needhelp= to your help request.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

If you are unable to use these tools, you may set |needhelp=<your help request> on this template to request help from an experienced user. Please include details about your problem, to help other editors.

Cheers. —cyberbot IITalk to my owner:Online 10:33, 18 October 2015 (UTC)

Requested move 2 November 2015[edit]

The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review. No further edits should be made to this section.

The result of the move request was: moved. A history swap was also required in order to preserve the history of the target page for attribution purposes. Jenks24 (talk) 04:59, 10 November 2015 (UTC)



Computer crimeCybercrime – I have merged all of Category:Computer crime into Category:Cybercrime and now I am ready to change the primary topic accordingly. Cybercrime is also the broader term, encompassing crime that happens in cyberspace which may not require advanced technical skilled typically associated with hacking under a traditional computer crime definitions. E.g. Cyberbulling, Internet fraud, Internet troll and so on. Deku-shrub (talk) 14:18, 2 November 2015 (UTC)

  • Support not all computer crime involves networks or the internet, this article is only about those crime that involve such, and therefore this is not a computer crime article per se, rather it is the more narrow cybercrime. -- 70.51.44.60 (talk) 15:53, 2 November 2015 (UTC)
  • So are you saying that if I steal files that are in the computer, it's not cybercrime? All jokes aside, I support this move. -- Notecardforfree (talk) 20:49, 3 November 2015 (UTC)
  • Support per reasons above. Film Fan 12:25, 4 November 2015 (UTC)

The above discussion is preserved as an archive of a requested move. Please do not modify it. Subsequent comments should be made in a new section on this talk page or in a move review. No further edits should be made to this section.

External links modified[edit]

Hello fellow Wikipedians,

I have just modified one external link on Cybercrime. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}).

You may set the |checked=, on this template, to true or failed to let other editors know you reviewed the change. If you find any errors, please use the tools below to fix them or call an editor by setting |needhelp= to your help request.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

If you are unable to use these tools, you may set |needhelp=<your help request> on this template to request help from an experienced user. Please include details about your problem, to help other editors.

Cheers.—InternetArchiveBot (Report bug) 22:10, 3 December 2016 (UTC)