About This Chapter
Impact of Cybercrime on Electronic Communication - Chapter Summary
Top instructors in our entertaining lessons offer a comprehensive overview of the impact of cybercrime on electronic communication. By exploring this self-paced chapter, you can gain greater insight into the basics of Internet communication, how technology has changed crime, computer-mediated communication and much more. This chapter is available 24/7 via any computer or mobile device, making it easy to study whenever and wherever your schedule permits. Short quizzes and a broader exam enable you to gauge your knowledge of key concepts in the lessons. Any questions you have can be submitted to our experts via the Dashboard. Once you've finished this chapter, you will be ready to:
- Define and list types of computer-mediated communication
- Identify and discuss different Internet communication tools
- Discuss ways computers play a role in cybercrime
- Outline the role of email and instant messaging in cybercrime
- Explain how social networks are used for the commission of cybercrime
- List and discuss ways technology has impacted crime
- Describe how cell phones and the cell phone infrastructure serve as a venue for different types of cybercrime
1. Computer-Mediated Communication: Definition, Types & Advantages
In less than a few decades, computer-mediated communications have revolutionized the way that people stay in touch and the way that companies conduct business. To find out more about these changes, take a look at this lesson.
2. Internet Communication: Social Media, Email, Blog, & Chat
This lesson talks about how social media adds business value by building networks that enhance competitive advantage, enable the exchange of information, foster strong relationships and serve as a foundation of building professional and personal relationships irrespective of different geographical spaces and time zones.
3. Computers as a Means for Cybercrime
To launch a cyber attack, an attacker needs to plan the set of steps to be executed for achieving the intended goal. This lesson explains the concept of an attack vector and the role computers play in the execution of cyber attacks.
4. Role of Email in Cybercrime
Email, unfortunately, has gone beyond serving as a way to make weekend plans with friends. Now, it has been turned into a tool for criminal activity by cyber criminals. We'll take a closer look in this lesson.
5. Role of Instant Messaging in Cybercrime
Instant messaging can be used as an entry point for criminal activity, but how can a short message be used as a means to a criminal act? In this lesson, we'll explore the role of instant messaging in cybercrime.
6. How Social Networks are Used in Cybercrime
Social networking's tremendous growth has created a breeding ground for hackers to engage in cybercrime. In this lesson, you'll learn more about how cybercriminals use social networking for illegal purposes.
7. How Technology has Changed Crime
Technology has given us many benefits to our daily lives, but it also brought some negative things with it as well. This lesson will take you through what cybercrime is, examples of it, and how it affects our lives.
8. Cell Phones & Cell Phone Infrastructure in Cybercrime
Cell phones and cell phone usage have created a new environment in which cybercriminals can operate. In this lesson, you'll learn more about the use of cell phones and their infrastructure in cybercrimes.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 110: Introduction to Cybersecurity course
- Introduction to Cybersecurity
- Basics of Cybercrime
- The Role of People in Cybercrime
- Policies & Procedures for Cybersecurity
- Tools & Techniques for Cybersecurity
- Cryptography in Cybersecurity
- Understanding & Preventing Computer Viruses
- Cybercrime & Software Development
- Operating System & Network Security
- Disaster Recovery in Cybersecurity