Computer Crimes: Computers as Targets
Search and review a case of cyberstalking using ITT Tech Virtual Library and do the following:
-Identify different types of other crimes involved in the selected cyberstalking crime.
-Classify the motivation and possible outcomes of each identified crime.