15.1 Discuss the various types of cybercrime.
15.2 List some examples of attacks on computer systems.
15.3 Discuss some operations of online predators.
15.4 Identify some examples of cyberterrorism.
15.5 Summarize the implications technology has for social change.
15.6 Describe the methods criminologists use to explore the future of crime.
15.7 Assess how criminological theories apply to cybercrime.