CRI205H1 Chapter Notes - Chapter 14: Transnational Organized Crime, Ponzi Scheme, Securities Fraud
Document Summary
Information technology > the use of computer networked and communication for education and commerce. Cyber war > the use of computer technology for communications to disrupt networks of foreign governments. Need to exhibit their technical prowess and superiority. A desire to highlight the vulnerability of computer security systems. A need to soy on other peoples private nancial and personal information. The desire to assert a philosophy of open access to all systems and programs. Internet securities fraud: there are three major types of internet securities fraud: Market manipulation > this is when an individual tries to control the price of stock by interfering with the natural forces of supply and demand. Fraudulent offerings of securities > some cybercriminals create websites speci cally designed to fraudulently sell securities. They either in ate the assets, overstate returns or understate the risks > refer to ch.