Cyber Stacking:- Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.
In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications. Pedophiles:- Also there are persons who intentionally prey upon children.
Identity theft is a vehicle for perpetrating other types of fraud schemes. Data diddling:- Data diddling involves changing data prior or during input into a computer.
Others like police, medical, fire and rescue systems etc. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.
Cyberterrorism is an attractive option for modern terrorists for several reasons. Merchandise or services that were purchased or contracted by individuals online are never delivered.
Pornography:- The literal mining of the term 'Pornography' is “describing or showing sexual acts in order to cause sexual excitement through books, films, etc.” This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.
Adult entertainment is largest industry on internet.
Some of the common, but false messages sent by sexualized culture.
Sex with anyone, under any circumstances, any way it is desired, is beneficial and does not have negative consequences.
The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.
Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits. Sale of illegal articles:- This would include trade of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication.
Also impersonate another person is considered forgery. IPR Violations:- These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. Cyber Squatting- Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also under trademark laws. Use of stolen card information or fake credit/debit cards are common.
Cyber Squatters registers domain name identical to popular service provider’s domain so as to attract their users and get benefit from it. Cyber Terrorism:- Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Cyberterrorism is more anonymous than traditional terrorist methods. Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami. E-commerce/ Investment Frauds:- Sales and Investment frauds.
Everyone is involved in promiscuous sexual activity, infidelity and premarital sex. Victor Cline, an expert on Sexual Addiction, found that there is a four-step progression among many who consume pornography. Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect, followed by sexual release, most often through masturbation. Escalation: Over time addicts require more explicit and deviant material to meet their sexual "needs." 3.