Application: Final Project Introduction: Evolution of Cybercrimes
Hire our professional essay experts at Gradehunters.net who are available online 24/7 for an essay paper written to a high standard at an affordable cost.
Order a Similar Paper Order a Different Paper
Application: Final Project Introduction: Evolution of Cybercrimes
The Internet has changed lives in
fundamental and positive ways. It also has opened the door to new types of
cybercrime, which can run the gamut from identity theft to organizing terrorist
plots. As each new type of crime comes to light, usually through a case that
draws national attention, law enforcement and government respond using
increasingly sophisticated surveillance technology. Law enforcement’s use of
technology to prevent and combat cybercrime has prompted even greater
“advances” in criminal activity with the use of encryption,
anonymizers, and proxy servers.
With this assignment, you begin
building your Final Project. To begin, select one of the cybercrimes presented
in this course: cyber-bullying, cyber-stalking, cyber-hate, cyber-predators, or
a type of white-collar crime that utilizes technology. Examine the evolution of
that cybercrime and consider how advances in technology have influenced its
evolution.
The Assignment (2–3 pages)
- Describe the type of cybercrime you selected.
- Explain the evolution of the cybercrime, including when it gained
national attention and any circumstances or case that might have prompted
the national attention. - Explain how advances in technology have influenced the evolution
of that cybercrime.
Two or three pages with
at least three references….
It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the readings.
To get maximum points you need to follow the requirements listed for
this assignments 1) look at the page limits 2) review and follow APA rules
3) create SUBHEADINGS to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.
Readings
- Course Text: Taylor,
R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and
digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson. - Chapter 8, “Sex
Crimes, Victimization, and Obscenity on the World Wide Web” (review) - Article: Basu, S.,
& Jones, R. (2007). Regulating cyberstalking. Journal of
Information, Law and Technology, (2).
- Article: Creepy
crawlies: Cyber-stalking. (2011). The Economist, 399(8730), 63–64.
- Article: Franken,
Blumenthal introduce mobile privacy legislation. (2011). Telecommunications
Reports, 77(13), 12–13.
- Article: Reyns, B. W.
(2010). A situational crime prevention approach to cyberstalking
victimization: Preventive tactics for Internet users and online place
managers. Crime Prevention and Community Safety, 12(2), 99–118.
- Article: Roberts, L.
(2008). Jurisdictional and definitional concerns with computer-mediated
interpersonal crimes: An analysis on cyber stalking. International
Journal of Cyber Criminology, 2(1), 271–285.
Web Resource
- Article: Working to
Halt Online Abuse (WHOA). (2016) Cyberstalking-related federal and state
laws. Retrieved from http://www.haltabuse.org/resources/laws

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!
Get a 15% discount for your first order
Order a Similar Paper Order a Different Paper