Leadership: Texas Hold 'Em Style
Andrew J. Harvey  More Info


Hi Tech and Cyber Crime

Home | Basic and Theory | Strategic Information Systems | Tactical Information Systems | Technology Management | Case Studies | Student Resources | Technology Articles | Police Technology Consultant | Contact Us | Site Map

Learning Objectives
Key Terms with Hyperlinks to Defintions

Learning Objectives

  • The student will understand the differences among computer crime, computer-related crime, and technology crime and why all three of these broad categories fall under the umbrella of hi-tech crime.
  • The student will understand some of the possible reasons that hitech crime is underreported and the potential effects of underreporting.
  • The student will understand how the Internet has facilitated traditional crimes and created new types of crimes.
  • The student will understand the different forms of a system attack and its potential effects.
  • The student will explore how computers and the Internet have facilitated, theft of services, software piracy, and counterfeiting and theft of hardware.
  • The student will explore some basic information on searching and seizing computerized records such as the Independent Component Doctrine.

The hyperlinks provided for the Key Terms may take you to a simple definition, or an article wherein the term is described:

Computer-Related Crime


Denial of Service Attack


Hi-Tech Crime

System Attack

Technology Crime

Theft of Services




Independent Component



Money Laundering

Pump and Dump

Software Piracy

© 2012 High Priority Targeting, Inc.