Across
- 3. - legally institutionalized rights to own and control goods.
- 4. - a person illegally obtains data from a computer system by leaking it out in small amounts.
- 5. - the interactional space or environment created by linking computers together into a communication net5work.
- 6. - online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
- 8. - a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- 9. - the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
- 11. stalking - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists
- 15. – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- 17. Access Control System is generally implemented using firewalls, which provide a centralized point from which to permit or allow to access. Firewalls allow only authorized communications between the internal and external network.
- 20. - one computer is used to reprogram another for illicit purposes.
- 24. — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
- 25. - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- 26. terrorism - terrorist activity that targets computer networks and information systems for attack.
- 28. - negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- 31. - to videotape and photograph the scene.
- 34. - rubber bands, tape, boxes, bubble wrap, and if he does not have access to anti-static wrap, paper bags should be used, because they have less static charge than plastic bags.
- 35. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
- 38. - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- 39. - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- 41. - the activity of altering the code organizing a website so as to alter the visible screen content.
- 42. - is the system of hardware, software, facilities and service components that support the delivery of business systems and digital-enabled processes
- 44. - the act of copying digital material posted online into the storage medium on one’s computer.
- 45. - criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
- 46. - Â refers to a set of instructions executed by the computer to achieve intended results.
- 47. - remember that often, latent prints can be taken from disks or other storage media or hardware.
- 48. - Â refers to the modification or change, in form or substance, of an existing computer data or program.
- 49. - Â refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
Down
- 1. - breaching laws on obscenity and decency
- 2. - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- 7. – The access to the whole or any part of a computer system without right.
- 10. - these can be used to store copies of files from the computer for use in his investigation
- 12. - malicious software programs which are infiltrated into computers disguised as benign applications or data.
- 13. - Â refers to a computer or a computer network, the electronic medium in which online communication takes place.
- 14. - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement
- 16. - crossing boundaries into other people’s property and/or causing damage, e.g. hacking, defacement, viruses.
- 18. - occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- 19. - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 21. - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- 22. - the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior
- 23. - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- 26. - doing psychological harm to, or inciting physical harm against others, thereby breaching laws relating to the protection of the person, e.g. hate speech, stalking.
- 27. - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- 29. political activism and social protest that uses hacking tools and techniques
- 30. - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms
- 32. - this crimes occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
- 33. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
- 36. - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- 37. - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- 40. - an offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.
- 43. market economic activity undertaken via the internet or similar electronic communication networks.
