Most Typical Cybercrimes 2 
 
Most Typical Cybercrimes 
  Traditional definitions of cybercrime projected on the use of computers and Internet 
technology in perpetuating illegal activities. With the continued advancement in technology, 
this definition has broadened to incorporate phones and other devices that can successfully 
connect to the Internet. Cybercriminals gain access to private information, communication, 
impersonation, and other illegal activities. The most common forms of cybercrime include 
phishing, identity theft, online harassment, cyberstalking, and the invasion of privacy. 
Phishing defines the mimicry of legitimate websites with false ones in an attempt to 
gather information for malicious courses. In many cases, phishers create websites that are 
similar to email addresses and home pages of community sites. As individuals sign into such 
sites, their private information gets captures and later used by the criminals. This is most 
commonly perpetuated alongside identity theft where criminals gain access to private 
information and impersonate the owners.
 
 Common cases of identity theft include credit card 
fraud and bank account thefts.  
Cyberstalking and the invasion of individual privacy also relate in various ways. In 
cases of invasion of privacy, many trusted individuals abuse such trust and proceed to access 
their victim’s private information. Subsequently, they perpetuate the other forms of 
cybercrime including identity theft and phishing. Such may include the hacking of an 
individual’s personal computer or databases of institutions. When an individual obsessively 
follows someone online with malicious intentions, the activity is referred to as cyberstalking.
 
 Akhgar, Babak, and Ben Brewster. Combatting Cybercrime and Cyberterrorism: 
Challenges, Trends and Priorities. Switzerland: Springer, 2016.