Jack conducted an Internet search for examples of computer crime that resulted in the items listed below. Which type of computer criminal is described in each? Be as specific as possible in your responses.
A. Boris and Natasha coordinated ten people who sent out e-mails asking the recipients to purchase fake lottery tickets.
B. Gil, an IT consultant for DMM Corporation, stole personal information about corporate executives and sold it to tabloid newspapers.
C. Marie, the chief information officer of RBC Corporation, planted a logic bomb in case she ever lost her job.
D. Timothy shut down traffic lights on a major street in his city in an effort to cause serious traffic accidents.
E. Zachary used a computer program he found on the Internet to "kill" characters in an online game.
Correct Answer:
Verified
b...
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q44: PCA Corporation maintains its fixed asset records
Q45: An organization that uses the CoBIT framework
Q47: CoBIT can be used to strengthen internal
Q48: The CoBIT framework can be used to
Q50: The CoBIT framework looks at the issue
Q51: The CoBIT framework identifies seven information criteria;
Q52: The chapter discussed the four elements of
Q53: Information technology controls can be classified as
Q54: The CoBIT framework looks at the issue
Q66: List the elements of Carter's taxonomy of
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents