Use of digital resources to support criminal acts and/or terrorism
Cyber Crime (26)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- The Guardian
- 2022
This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.
- The Guardian
- 2022
-
- The Guardian
- 2022
Opinion- Cyber security the next generation of technology. Talent is vital
This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.
What are the benefits of increasing cybersecurity education and diversifying the backgrounds those who choose to major in cybersecurity? How does the quality of post-secondary CS education impact the growth of the technology sector and those who are general users of the technology ecosystem? Who is responsible for ensuring there are enough technology professionals educated in cybersecurity?
- Deloitte
- 2022
This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.
- Deloitte
- 2022
- Deloitte
- 2022
Nigeria Cybersecurity Outlook 2022
This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.
Who is impacted by digital activism and what are its benefits and harms? What are the benefits and harms of using AI to prevent AI cybersecurity attacks? Are there stakeholders impacted by Nigerian cybercrime outside of Nigeria, if so who? What are some ways to repair a global reputation and demonstrate safe and secure cybersystems? Whose responsibility is it to develop a culture of accountability and trust?
-
- Carnegie Endowment for International Peace
- 2022
This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.
- Carnegie Endowment for International Peace
- 2022
Cybersecurity in Nigeria’s Financial Industry: Enhancing Consumer Trust and Security
This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.
Who should be responsible for protecting fintech customers’ cybersecurity? Who is impacted by fintech cybercrime? What are the harms, specific to fintech industries, of weak cybersecurity systems and how does this hurt tech sector business growth?
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Cyberspace and Internet Imaginations: “Burning Chrome” by William Gibson
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
How can malware be used for good, and when should it be used for good? How do imaginations of the internet influence how people perceive this mysterious yet pervasive network? In what ways would making aspects of the internet into tangible images help people understand it better? How should the most powerful stakeholders in a given digital architecture be challenged? How might immersion into cyberspace give people more agency?
-
- 5 min
- Kinolab
- 1993
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
- Kinolab
- 1993
Systems Errors in Entertainment Areas
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
How can workplaces be protected against hacks from someone who works within said workplace? Should safety systems be under the control of a small number of people or computers? Should volatile environments, such as nuclear power plants or dinosaur parks, be trusted with a security system involving a hackable internet of things? What are the alternatives? Is convenience worth the cost in this case?
-
- 11 min
- Kinolab
- 2017
Museum curator Rolo shows off the exhibition of Clayton, a former death row inmate whose consciousness became digital during one of Rolo’s experiments. Despite evidence of his innocence, Clayton was put to death, and his digitally immortal consciousness was subjected to torture inside Rolo’s museum, with guests being able to simulate the electric chair shock on the holographic Clayton and eventually putting him in a conscious but vegetative state. Clayton’s daughter Nish shows up to settle the score, trapping Rolo in an eternal state of torture in a small digital device.
- Kinolab
- 2017
Technological Tortures and Traps
Museum curator Rolo shows off the exhibition of Clayton, a former death row inmate whose consciousness became digital during one of Rolo’s experiments. Despite evidence of his innocence, Clayton was put to death, and his digitally immortal consciousness was subjected to torture inside Rolo’s museum, with guests being able to simulate the electric chair shock on the holographic Clayton and eventually putting him in a conscious but vegetative state. Clayton’s daughter Nish shows up to settle the score, trapping Rolo in an eternal state of torture in a small digital device.
How can one protect their digital consciousness after they pass away? Can anyone ever be fully trusted to handle codes or programs that represent someone else’s existence or consciousness? How does the existence of racial bias and violence make the concept of eternal digital consciousnesses far more harrowing?