Talk:International cybercrime

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Untitled[edit]

Hi Qi, I like you work so far and will have more detailed comments and edits directly in your sandbox. One suggestion that I would like to make is to put a summary paragraph at the beginning of the entry. --JMBauer (talk) 03:09, 25 April 2011 (UTC)[reply]

More feedback on your entry[edit]

Hi Qi,
Here is some more feedback on your entry:

  1. In the "Typology" section, you mention "common offences" at the end of each type. In my opinion, these often are attack strategies, not offences. E.g. a botnet may be used to get illegal access and spoofing is a technique to fool computers. Perhaps do not even mention these types of attacks here; you focus on types of cybercrime and the attack strategies are very flexible and change quickly, so even speaking of common types of attack strategies may be too ambitious.
  2. You mention four content-related offences, some of which are hard to call cybercrime (e.g., religious offences might hurt somebody's believes and feelings but could be protected by free speech and hence would not be cybercrime).
  3. The section "International Trends" lists developments that happen at national and international levels. Maybe just call it "Current Developments"? Also, I am not sure how cloud computing fits in here, because it is not a trend in cybercrime but rather a trend in computing, which may increase certain risks.
  4. The Council of Europe must not be confused with the European Union and its institutions (see http://www.coe.int/aboutcoe/index.asp?page=quisommesnous&l=en). It is an organization of 47 European nations and focuses on the development of common democratic principles throughout Europe.
  5. I like your list of international initiatives! Very thorough!
  6. There are still many typos in the text; I may just get in and edit some.--JMBauer (talk) 03:19, 26 April 2011 (UTC)[reply]

More modifications[edit]

Thank you ,Professor Bauer! These are all very helpful suggestions. I made some modifications according to your feedback. Such as adding summary sentences in "Overview", typology modifications and deleting cloud computing in trends section.Realqiao (talk)qiaoqi 16:36, 26 April 2011 (UTC)[reply]

Review From Shan[edit]

It is a nice wiki entry. The entry provides rich information and broad perspective to inspire the readers. The classification for cybercrime is clear and so are the public policies, which are published to fight against cybercrime. However, I still found some places that can be enhanced. For reader who search for information about cybercrime on wiki, the most valuable clues may be the evolvement of the activity and how to solve this international problem. Nevertheless, I didn’t find enough information relating to this aspect. Likewise, in the session of “International Response”, readers received a lot of reactions from international organizations, but most of measures were taken place before 2000. Thus it would be better if the entry can be updated with latest modifications and changes in the field of cybercrime. At last, it is a very nice and helpful work. —Preceding unsigned comment added by Suisse514 (talkcontribs) 06:22, 3 May 2011 (UTC)[reply]

resource for somewhere ...[edit]

Hackers-for-Hire Are Easy to Find 2012 January 23 Wall Street Journal by Cassell Bryan-Low; excerpt ...

Sitting in his Los Angeles home, Kuwaiti billionaire Bassam Alghanim received an alarming call from a business associate: Hundreds of his personal emails were posted online for anyone to see. Mr. Alghanim discovered the person who had allegedly commissioned the hackers was his own brother, with whom he is fighting over how to divide up billions of dollars of joint assets. Mr. Alghanim's lawyers allege in court filings that the brother hired investigators to illegally access his email with the help of Chinese hackers. Cost to hire the hackers: about $400. ... One such site, hiretohack.net, advertises online services including being able to "crack" passwords for major email services in less than 48 hours. It says it charges a minimum of $150, depending on the email provider, the password's complexity and the urgency of the job.

See Alghanim Industries, Mikko Hyppönen, Mischel Kwon, US-CERT, organized crime, Cyberwarfare in the People's Republic of China, U.S. Chamber of Commerce, Électricité de France & Greenpeace, News of the World phone hacking affair, Office of the National Counterintelligence Executive, Intellectual property, Cyberespionage, Gulf Bank of Kuwait,

99.190.86.184 (talk) 05:47, 24 January 2012 (UTC)[reply]

Comments from a WP copyeditor[edit]

Since this article seems to have started as an academic course exercise, while correcting some typos today, I noticed some errant footnote marks (plaintext "[5]", "[9]", "[15]") and other odd typographical anomalies that would suggest some cut-&-paste actions were done, either from students' draft copies (with their own citation note marks left-in) or copied direct from sources complete with footnote marks left-in.

There are a lot of cites that need re-formatting to WP standards, as well. So, if someone wishes to check the cites, the article can also be checked for any copyvio issues. — DennisDallas (talk) 00:16, 21 March 2012 (UTC)[reply]

taka niye bagche caf[edit]

taka niye bagche caf 203.202.248.220 (talk) 05:43, 11 September 2022 (UTC)[reply]

Wikipedia Ambassador Program course assignment[edit]

This article is the subject of an educational assignment at Michigan State University supported by WikiProject United States Public Policy and the Wikipedia Ambassador Program during the 2011 Spring term. Further details are available on the course page.

The above message was substituted from {{WAP assignment}} by PrimeBOT (talk) on 16:39, 2 January 2023 (UTC)[reply]