{"id":1001,"date":"2025-01-11T20:04:34","date_gmt":"2025-01-12T01:04:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=1001"},"modified":"2025-04-26T21:47:02","modified_gmt":"2025-04-27T01:47:02","slug":"categories-of-cybercrime","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/categories-of-cybercrime\/","title":{"rendered":"Cybercrime Group Projects"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<p>This page features a series of PowerPoint projects completed during <strong>CRJS 310: Cybercrime Foundations<\/strong>. The course introduced major types of cybercrime and how digital evidence is used in investigations. I participated in group projects that explored cybercrime categories, case studies, and theoretical perspectives. These collaborative presentations strengthened my skills in research, analysis, and teamwork while deepening my understanding of real-world cybercrime challenges.<\/p>\n\n\n\n<p>Below are the group projects I contributed to during the course:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Categories of Cybercrime<\/h3>\n\n\n\n<p>This presentation explored the different types of cybercrime, including hacking, identity theft, cyberbullying, and financial fraud, and discussed how they are classified in criminological research.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Categories-of-Cybercrime_-The-Uniqueness-of-Cyberviolence.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Categories-of-Cybercrime_-The-Uniqueness-of-Cyberviolence<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">What do Social Scientists Know about Cybercrime<\/h3>\n\n\n\n<p>This project examined how social science disciplines study cybercrime, highlighting theories and research findings on offender behavior and victimization trends.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/What-Do-Social-Scientists-Know-About.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">What-Do-Social-Scientists-Know-About<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Cybercrime Case Study: Blackcat<\/h3>\n\n\n\n<p>This presentation provided a detailed case study on the Blackcat ransomware group, analyzing their methods, targets, and impact within the broader cybercrime landscape.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Cybercrime-Case-Study_-BLACKCAT-compressed.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybercrime-Case-Study_-BLACKCAT-compressed<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Why Cybercrime?<\/h3>\n\n\n\n<p>This project explored the motivations behind committing cybercrime, including financial gain, ideology, revenge, and social pressures, linking theories to real-world examples.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Why-Cybercrime-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Why-Cybercrime-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Why-Cybercrime-A-Written-Reflection-2024-11-08-15_32_24-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Why-Cybercrime-A-Written-Reflection-2024-11-08-15_32_24-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Cybercrime as a Social Problem<\/h3>\n\n\n\n<p>This presentation discussed how cybercrime affects society on a larger scale, including issues like public trust, economic impacts, and challenges in law enforcement and policy making.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Cybercrime-as-a-social-problem-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybercrime-as-a-social-problem-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Cybercrime-as-a-Social-Problem-Reflection.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybercrime-as-a-Social-Problem-Reflection<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page features a series of PowerPoint projects completed during CRJS 310: Cybercrime Foundations. The course introduced major types of cybercrime and how digital evidence is used in investigations. I participated in group projects that explored cybercrime categories, case studies,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/categories-of-cybercrime\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1001"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=1001"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1001\/revisions"}],"predecessor-version":[{"id":1280,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1001\/revisions\/1280"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=1001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}