Unit4LawandorderReadingThefightagainstcybercrimeStep1:Lead-inNowadaysinourdailylife,weoftenhearthatsomeone’sQQnumberhasbeenstolen.Haveyoueverfoundthatyoucan’tlogonyourQQsuddenly?Doyouknowwhathashappenedtoit?Whatcanitbeusedtodobysomeonewhohasstolenit?(ThepersonwhohasstolenitcanknowtheinformationofyourfriendsandthentrytorobthemactingasyouThisisakindofcybercrime.)Todaywearegoingtoreadapassageconcerningcybercrime.Beforewereadthepassage,pleasesurftheInternettofindasmuchinformationaboutcybercrimeaspossible,suchascategoriesofit,theextentandalsothesolutiontoit.Step2:FastreadingforgeneralideasGothroughthepassageasquicklyaspossibleandtrytofindanswerstothethreequestionsinpartAonPage50.Payattentiontothemostimportantinformation.Answers:1.Therearefourtypesofcybercrime.2.503companiesandgovernmentdepartmentsweresurveyed.3.Theonlysolutionisinternationalcooperation.Step3:DetailedreadingforimportantinformationReadthepassageasecondtimeandcompletePartsC1andC2.Answers:C11.Cybercrimeisarelativelynewtermthatreferstoanycomputer-relatedcriminaloffence.2.Hacking,spreadingcomputerviruses,fraud,websiteswithoffensivecontentorwebsitesthatencouragehatredandviolence,andbreakingintellectualpropertyandcopyrightlaws.3.Fraudisacrimewheremoneyisstolenbycheatingothers.4.AllInternetusersareaffectedbycybercrimeeitherdirectlyorindirectly.5.Becausemostcompanieswanttoavoidthelossofcustomers,whomaythinkthatthecompanycannotprotecttheirmoney.6.Lawsagainstcybercrimehavenotbeenpassedinmanycountries,andtherearemanyholesintheirlegalsystems.Mostcountriesdonothavearrangementsfordealingwithcitizensofothercountrieswhocommitcybercrimes.Also,thesecriminalscanbeanywhereandcanmovequickly,soitisoftenalmostimpossibletocatchthem.7.Governmentsneedtocombinetheirtechnologicalresourcestokeepupwiththecriminalswhohavethebesttechnicalskills.Itisalsoimportanttoupgradelawsandcreateinternationalstandardsfortheselaws.Thiswillallowstatestofollowcriminalsacrossborders.C21b2d3a4cStep4:Practice:1.CompletePartD.Youmayrefertothereadingpassageonpages50and51forsomehelp.Answers:D1d2g3e4f5b6a7c2.CompletePartE.E(1)cybercrime(2)tight(3)computers(4)security(5)viruses(6)hacked(7)content(8)violence(9)offence(10)privateStep5:Post-readingactivities1.Firstrole-playthedialogueinPartFandthenformsgroupsoffourtodiscussthethreequestionsthatfollow.2.Youwillbedividedintogroupsoffour.Eachgroupchoosestoreportoneaspectfromthefollowingitems:thedefinitionanddifferenttypesofcybercrime;theextentoftheproblem;thelegalsituationregardingcybercrimeandthesolutiontotheproblem.Step5:Languagepoints:vocabularywordsorder,term,offence,hatred,identify,ripe,furthermore,accuracy,annually,regarding,pass,tightusefulexpressionsclassify…into…,relatedto,relatingto,intheend,beunwillingtodosth.,thesolutiontothisproblem,keepup,besimilarto,takesteps,actas,askforpermission,demandsth.fromsb.,sentencepatterns1.Theproblemhasbecomesoseverethat…2.Consideringhowbadthesituationwithcybercrimeagainst…3.Themainreasonisthat…Step6:Homework1.Readthetextagainandagain.Trytomemorizethelanguagepoints.2.PartsA1andA2onpage122inWorkbook.