Exams are coming!
Get ready with premium notes and study guides!

Textbook Notes for CRMN 3021U at UOIT (UOIT)

UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 4: Phishing

OC8229331 Page
0
Berghel, h. (2006) phishing mongers and posers; unmasking deceptive schemes that range from clever to clumsy. The author of this article speaks to the
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 8: United States Presidential Election, 2016, Voting Machine, Phishing

OC8229331 Page
0
Berghel, h. (2017) oh, what a tangled web: russian hacking, fake news, and the 2016. The author of this article examines the conspiracy theory that rus
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 3: Revenge Porn, Cybercrime

OC8229331 Page
0
Holt, j. h. , bossler, a. m. (2014) an assessment of the current state of cybercrime. The authors of this article explore the four classifications of c
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 2.5: Cybercrime

OC8229331 Page
0
Wall, d. (2007) cybercrime: the transformation of crime in the information age. The author of this article looks at how technology has furthered victim
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 3.5: Cybercrime, Keystroke Logging, Cyberstalking

OC8229331 Page
0
Gordon, s. , ford, r. (2006) on the definition and classification of cybercrime. The authors of this article explore the term cybercrime and what falls
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter 5: Week 5

OC8229331 Page
0
Condry, i. (2004) cultures of music piracy; an ethnographic comparison of the us and. Ian condry uses the international journal of cultural studies to
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 4.5: Phishing, Email Spoofing, Online Identity

OC8229332 Page
0
Banu, n. , banu, m. (2013) a comprehensive study of phishing attacks. Banu and banu (2013) explore phishing attacks and what exactly a phishing attack
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter 10.5: Week 10.5

OC8229331 Page
0
The author of this article explores whether or not violent video games impact the aggressive nature of its players. The article touches upon the belief
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter 6.5: Week 6.5

OC8229331 Page
0
Smith, p. , mahdavi, j. , carvalho, m. (2006) an investigation into cyberbullying,its forms, Awareness and impact, and the relationship between age and
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter 5.5: Week 5.5

OC8229331 Page
0
The authors of this article speak to the pressing danger towards the music industry, music piracy. The beginning of the article analyzes quantitative r
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 11: Cybercrime

OC8229331 Page
0
Jones, b. (2007) comment: virtual neighborhood watch: open source software and. This article sets out to describe cybercrime and what it entails. The a
View Document
UOITCRMN 3021USteven DowningSpring

CRMN 3021U Chapter Notes - Chapter 7: Dark Web, Backpage

OC8229331 Page
0
Rhodes, l. m. (2017) human trafficking as cybercrime, 23-29. The author of this article explores the concept of human trafficking and how it incorporat
View Document
Showing 1 — 12 of 18 result
View all professors (1+)

Textbook Notes (270,000)
CA (160,000)
UOIT (400)
CRMN (20)
CRMN 3021U (10)