Talk:Information Technology and Ethics/Cyber-Crimes

Editors
The Red Team of the Spring 2016 ITMM 585 course at Illinois Institute of Technology, Chicago added to the existing content for the Information Technology and Ethics on the Cyber-Crime wiki page.

Spring 2016 Red Team members:
 * Magnus Machado  Wiki name: mmachado007
 * Rajashree Das 
 * Rutuja Sunil Inamke 
 * Deepu Kumar 
 * Sherman St. Hill 

The Blue Team of the Spring 2018 ITMM 485/585 course at Illinois Institute of Technology, Chicago, revised and improved this chapter in April 2018. The Blue Team consisted of Ray Trygstad (discuss • contribs) 14:46, 4 May 2018 (UTC)
 * Aneeshwar Botla
 * Antoine Foggs
 * Jose Lopez
 * Nhan Nguyen
 * David Powers
 * Daniel Rybski.

The Green Team of the Spring 2020 ITMM 485/585 course at Illinois Institute of Technology, Chicago revised and added to the existing content for the Information Technology and Ethics on the Cyber-Crime wikipage.

Spring 2020 Green Team members:
 * Ahmad Alattas 
 * Alexander Pinto 
 * Cooper Van Kampen 
 * Karen Miguel 
 * Nihar Patel 
 * Vashti Marin 

Illinois Institute of Technology, Spring 2021 Course ITMM 485/585 Yellow Team Ray Trygstad (discuss • contribs) 19:36, 13 May 2021 (UTC)
 * Mohammed Chisti
 * Mohammad Salehi
 * Paul Haynes
 * Imani Weems
 * Luis F Matos Gonzalez

Illinois Institute of Technology, Spring 2022 Course ITMM 485/585 Copper Team overhauled this chapter
 * Brad Luxenberg
 * Anthony Angeles
 * Abdul Jimoh
 * Aamir Raza
 * Aisha Shahid

Illinois Institute of Technology, Spring 2024 ITMM 485/585 Forest Green Team Chicago revised and added to the existing content for the Information Technology and Ethics on the Cyber-Crime wikipage

 * Abhijeet Pawar
 * Younus Syed Jalal
 * Ngozi Tracy Aleke
 * Kat Stevens
 * Mohamed Trigui
 * Kat Stevens
 * Mohamed Trigui
 * Mohamed Trigui
 * Mohamed Trigui

References


 * 1) Easttom, C. (2022). Digital forensics, investigation, and response (4th ed.). Jones & Bartlett Learning. K
 * 2) Dutt, D., Pandey, S., Arora, S., Tripathi, M., & Gupta, K. K. (n.d.). Need for cyber security tools and knowledge. International Journal of Research in Engineering, Science and Management. https://journal.ijresm.com/index.php/ijresm/article/view/2005
 * 3) Ryan, P. S. (2004). War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for Hacker Ethics. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=585867
 * 4) Computer Fraud and Abuse Act of 1986, Public Law 474, U.S. Statutes at Large 100 (1986): 1213-1216. https://www.govinfo.gov/app/details/STATUTE-100/STATUTE-100-Pg1213.
 * 5) "Identity Theft and Assumption Deterrence Act of 1998" 18 USC 1028 note https://www.ftc.gov/legal-library/browse/rules/identity-theft-assumption-deterrence-act-text
 * 6) Digital Millennium Copyright Act, Pub. L. No. 105-304 (1998), https://www.govinfo.gov/app/details/PLAW-105publ304.
 * 7) ‘Children's Online Privacy Protection Act of 1998, Pub. L. 105–277, div. C, title XIII, §1301, Oct. 21, 1998, 112 Stat. 2681–728 https://www.govinfo.gov/content/pkg/USCODE-2011-title15/html/USCODE-2011-title15-chap91.htm
 * 8) The Budapest Convention (ETS No. 185) and its Protocols, Council of Europe Portal https://www.coe.int/en/web/cybercrime/the-budapest-convention
 * 9) African Union Convention on Cyber Security and Personal Data Protection https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection
 * 10) Secretariat, C. (2003). Model Law on Computer and Computer Related Crime. https://production-new-commonwealth-files.s3.eu-west-2.amazonaws.com/migrated/key_reform_pdfs/P15370_11_ROL_Model_Law_Computer_Related_Crime.pdf
 * 11) Inter-American Portal on Cybercrime https://www.oas.org/en/sla/dlc/cyber-en/homePortal.asp
 * 12) Moule, R. K. (2017, February). Criminal use of technology. In Oxford bibliographies. Oxford University Press. https://doi.org/10.1093/OBO/9780195396607-0211
 * 13) Gřivna, T., & Drápal, J. (2019, December 7). Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. Digital Investigation. https://www.sciencedirect.com/science/article/abs/pii/S1742287618303335
 * 14) Iftikhar, S. (2024, January 15). Cyberterrorism as a global threat: A review on repercussions and countermeasures. PeerJ. Computer science. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10803091/
 * 1) The Budapest Convention (ETS No. 185) and its Protocols, Council of Europe Portal https://www.coe.int/en/web/cybercrime/the-budapest-convention
 * 2) African Union Convention on Cyber Security and Personal Data Protection https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection
 * 3) Secretariat, C. (2003). Model Law on Computer and Computer Related Crime. https://production-new-commonwealth-files.s3.eu-west-2.amazonaws.com/migrated/key_reform_pdfs/P15370_11_ROL_Model_Law_Computer_Related_Crime.pdf
 * 4) Inter-American Portal on Cybercrime https://www.oas.org/en/sla/dlc/cyber-en/homePortal.asp
 * 5) Moule, R. K. (2017, February). Criminal use of technology. In Oxford bibliographies. Oxford University Press. https://doi.org/10.1093/OBO/9780195396607-0211
 * 6) Gřivna, T., & Drápal, J. (2019, December 7). Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. Digital Investigation. https://www.sciencedirect.com/science/article/abs/pii/S1742287618303335
 * 7) Iftikhar, S. (2024, January 15). Cyberterrorism as a global threat: A review on repercussions and countermeasures. PeerJ. Computer science. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10803091/
 * 1) Moule, R. K. (2017, February). Criminal use of technology. In Oxford bibliographies. Oxford University Press. https://doi.org/10.1093/OBO/9780195396607-0211
 * 2) Gřivna, T., & Drápal, J. (2019, December 7). Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. Digital Investigation. https://www.sciencedirect.com/science/article/abs/pii/S1742287618303335
 * 3) Iftikhar, S. (2024, January 15). Cyberterrorism as a global threat: A review on repercussions and countermeasures. PeerJ. Computer science. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10803091/
 * 1) Gřivna, T., & Drápal, J. (2019, December 7). Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. Digital Investigation. https://www.sciencedirect.com/science/article/abs/pii/S1742287618303335
 * 2) Iftikhar, S. (2024, January 15). Cyberterrorism as a global threat: A review on repercussions and countermeasures. PeerJ. Computer science. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10803091/
 * 1) Iftikhar, S. (2024, January 15). Cyberterrorism as a global threat: A review on repercussions and countermeasures. PeerJ. Computer science. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10803091/