Difference between revisions of "Illegal activities on the Internet"

From ScenarioThinking
Jump to navigation Jump to search
 
 
(23 intermediate revisions by one other user not shown)
Line 1: Line 1:
Back? [[Extensions to our physical path... but what about mental power?]]
yIJ40F  <a href="http://kasjorvvzoqf.com/">kasjorvvzoqf</a>, [url=http://rmdjrrbvcjso.com/]rmdjrrbvcjso[/url], [link=http://lnyhcrfuvibr.com/]lnyhcrfuvibr[/link], http://ovmxnqeejefx.com/


==Description:==
==Enablers:==


[[Image:NEURON.jpg|thumb|Picture of a neuron]]
1. Annonimity on the Internet
Artificial Neural Networks (ANNs) are information processing models that are inspired by the way biological nervous systems, such as the brain, process information. The models are composed of a large number of highly interconnected processing elements (neurones) working together to solve specific problems. ANNs, like people, learn by example. Contrary to conventional computers -that can only solve problems if the set of instructions or algorithms are known- ANNs are very flexible, powerfull and trainable. Conventional computers and neural networks are complementary: a large number of tasks require the combination of a learning approach and a set of instructions. Mostly, the conventional computer is used to supervise the neural network.


For more information: http://en.wikipedia.org/wiki/Neural_network 
2. Different laws in different countries


3. Laws are not addapted to cybercrimes
 
==Enablers:==


1. Research & Development: Mathimaticians, Psychologists, Neurosurgeons,...
4. New technology makes it easier to take part in illegal activities


2. Applications using artificial neural networks (e.g. sales forecasting, data validation, etc from NeuroDimension) [http://www.nd.com].
5. Lack of technical knowledge while dealing with these crimes


3. Funding from international institutes ( e.g. IST).
6. Userbase is spread through out the world


4. New technologies that enable profound research of the human brain activity.
7. Easy way (and for many an appealing way) of earning money through the Internet


==Inhibitors:==
==Inhibitors:==


1. Outcome ethical issues: Is there a danger developing technologies that might perform similar (thinking) functions as the human brain?
1. Laws are getting adapted to cybercrimes


2. Research ethical issues: Is it ethical to perform research and do experiments on the human brain and its functions?
2. People are gaining more knowledge on possibilities


3. Lack of scope and focus: this new technology might create the next information society revolution, thus interest is high and widely spread over several industries. 
3. Cybercrimes are being taken more seriously


==Paradigms:==
==Paradigms:==


1. Simple tasks can already be learned today by artificial neural networks. Further investigation, in the power of those systems as well as in the power of the combination with conventional computer systems, will increase the power of a connected world or the internet.  
1. The Internet is getting out of hand and should be controlled better. Users should not be anonymous so that they can be better protected. Different countries should work together and exchange more information in an effort to prevent these activities from happening.


2. ANNs will disappear as black boxes into our daily lives, supporting us with simple decision making where making a mistake is allowed (children's level). To increase the learning effect and for control purposes, these boxes will be interconnected via the internet.
2. Cybercrimes should be treated as normal crimes. Laws should be adapted so that they can apply to these offences. There should be no changes to the way the Internet is but in the way these offences are handled.


 
==Experts:==
==Experts:==


Prof. Dr. Hugo de GARIS,
Prof. Susan W. Brenner
 
Associate Professor,
 
Head, Brain Builder Group,
 
Computer Science Dept.,
 
Utah State University, USU,
 
Old Main 423, Logan,
 
Utah, UT 84322-4205, USA.
 
tel: + 1 435 797 0959
 
fax: + 1 435 797 3265
 
cell: +1 435 512 1826
 
degaris@cs.usu.edu
 
http://www.cs.usu.edu/~degaris


http://cybercrimes.net/ba.html


The Univerity of Dayton - School of Law


==Timing:==
==Timing:==


1933: psychologist Edward Thorndike suggests that human learning consists in the strengthening of some (then unknown) property of neurons.
1969: Creation of ARPANET, the predecessor of the internet
 
1943: first artificial neuron is produced (neurophysiologist Warren McCulloch & logician Walter Pits).
 
1949: psychologist Donald Hebb suggests that a strengthening of the connections between neurons in the brain accounts for learning.
 
1954: first computer simulations of small neural networks at MIT (Belmont Farley and Wesley Clark).


1958: Rosenblatt designs and develops the Perceptron, the first neuron with three layers.
1985: One of first known cases of cybercrime


1969: Minsky and Papert generalises the limitations of single layer Perceptrons to multilayered systems (e.g. the XOR function is not possible with a 2-layer Perceptron)  
1990: Cybercrime Act 2001 (Commonwealth)


1972: A. Henry Klopf develops a basis for learning in artificial neurons based on a biological principle for neuronal learning called heterostasis.
1999: Release of Napster, first peer-to-peer program to share MP3's


1974: Paul Werbos develops the back-propagation learning method, the most well known and widely applied of the neural networks today.
2004: First lawsuit against spyware
 
1975: Fukushima (F. Kunihiko) develops a step wise trained multilayered neural network for interpretation of handwritten characters (Cognitron).
 
1986: David Rumelhart & James McClelland train a network of 920 artificial neurons to form the past tenses of English verbs (University of California at San Diego).


==Web Resources:==
==Web Resources:==


1. http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html
1. http://www.cybercrime.gov/
 
2. http://www.inns.org/
 
3. http://www.nd.com/


4. http://www.dacs.dtic.mil/techs/neural/neural_ToC.html
2. http://www.fbi.gov/cyberinvest/cyberhome.htm


5. http://www.ieee-nns.org/
3. http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html


6. http://www.economist.com/opinion/PrinterFriendly.cfm?Story_ID=1143317: The mind's eye
4. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=20/12/01&CL=ENG


7. http://www.hirnforschung.net/cneuro/
5. http://www.criminallawyergroup.com/criminal-defense/the-evolution-of-cybercrime-from-past-to-the-present.php

Latest revision as of 01:57, 2 June 2010

yIJ40F <a href="http://kasjorvvzoqf.com/">kasjorvvzoqf</a>, [url=http://rmdjrrbvcjso.com/]rmdjrrbvcjso[/url], [link=http://lnyhcrfuvibr.com/]lnyhcrfuvibr[/link], http://ovmxnqeejefx.com/

Enablers:

1. Annonimity on the Internet

2. Different laws in different countries

3. Laws are not addapted to cybercrimes

4. New technology makes it easier to take part in illegal activities

5. Lack of technical knowledge while dealing with these crimes

6. Userbase is spread through out the world

7. Easy way (and for many an appealing way) of earning money through the Internet

Inhibitors:

1. Laws are getting adapted to cybercrimes

2. People are gaining more knowledge on possibilities

3. Cybercrimes are being taken more seriously

Paradigms:

1. The Internet is getting out of hand and should be controlled better. Users should not be anonymous so that they can be better protected. Different countries should work together and exchange more information in an effort to prevent these activities from happening.

2. Cybercrimes should be treated as normal crimes. Laws should be adapted so that they can apply to these offences. There should be no changes to the way the Internet is but in the way these offences are handled.

Experts:

Prof. Susan W. Brenner

http://cybercrimes.net/ba.html

The Univerity of Dayton - School of Law

Timing:

1969: Creation of ARPANET, the predecessor of the internet

1985: One of first known cases of cybercrime

1990: Cybercrime Act 2001 (Commonwealth)

1999: Release of Napster, first peer-to-peer program to share MP3's

2004: First lawsuit against spyware

Web Resources:

1. http://www.cybercrime.gov/

2. http://www.fbi.gov/cyberinvest/cyberhome.htm

3. http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html

4. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=20/12/01&CL=ENG

5. http://www.criminallawyergroup.com/criminal-defense/the-evolution-of-cybercrime-from-past-to-the-present.php