Cyberterror and information warfare
Terrorist uses of technology
Viruses, trojans, and worms
Types of computer viruses
How many viruses are there?
The damage caused by viruses
Choosing antivirus software
The extent of the problem
Dealing with spyware and adware
Identity theft and the internet
The extent of the problem
Identifying phishing e-mails
Auctions and other forms of fraud
The extent of the problem
Resources for dealing with spam
Intellectual property theft
Online relationships and deviance
The extent of the problem
Who are the cyberstalkers?
New and emerging forms of cyberstalking
Deviant subcultures and addiction