This module is a resource for lecturers

Key issues

Cyber organized crime has been perpetrated on the visible web (a.k.a., clearnet) and the Deep Web (discussed in Cybercrime Module 5 on Cybercrime Investigation), which includes sites that cannot be reached using traditional search engines, such as databases (free or those that can be accessed for a fee; e.g., intranets) and darknet sites (an area of the Deep Web known for the illicit activities that occur within that space). This Module critically explores cyber organized crime, looking in particular at the structure, methods of operation, and tactics used by perpetrators of this crime, the illicit activities considered as cyber organized crime, the ways in which information and communication technology is used to facilitate this type of crime, and the measures used to respond to and prevent cyber organized crime.

Next: Cyber organized crime: What is it?
Back to top

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy