Cyber Crime (26)

Use of digital resources to support criminal acts and/or terrorism

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • The Guardian
  • 2022
image description
Opinion- Cyber security the next generation of technology. Talent is vital

This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.

  • The Guardian
  • 2022
  • Deloitte
  • 2022
image description
Nigeria Cybersecurity Outlook 2022

This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.

  • Deloitte
  • 2022
  • Carnegie Endowment for International Peace
  • 2022
image description
Cybersecurity in Nigeria’s Financial Industry: Enhancing Consumer Trust and Security

This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.

  • Carnegie Endowment for International Peace
  • 2022
  • 30 min
  • UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
  • 1982
image description
Cyberspace and Internet Imaginations: “Burning Chrome” by William Gibson

Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.

  • UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
  • 1982
  • 5 min
  • Kinolab
  • 1993
image description
Systems Errors in Entertainment Areas

Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.

  • Kinolab
  • 1993
  • 11 min
  • Kinolab
  • 2017
image description
Technological Tortures and Traps

Museum curator Rolo shows off the exhibition of Clayton, a former death row inmate whose consciousness became digital during one of Rolo’s experiments. Despite evidence of his innocence, Clayton was put to death, and his digitally immortal consciousness was subjected to torture inside Rolo’s museum, with guests being able to simulate the electric chair shock on the holographic Clayton and eventually putting him in a conscious but vegetative state. Clayton’s daughter Nish shows up to settle the score, trapping Rolo in an eternal state of torture in a small digital device.

  • Kinolab
  • 2017
Load more