Application: Final Project Introduction: Evolution of Cybercrimes

Hire our professional essay experts at Gradehunters.net who are available online 24/7 for an essay paper written to a high standard at an affordable cost.


Order a Similar Paper Order a Different Paper

Application: Final Project Introduction: Evolution of Cybercrimes

The Internet has changed lives in
fundamental and positive ways. It also has opened the door to new types of
cybercrime, which can run the gamut from identity theft to organizing terrorist
plots. As each new type of crime comes to light, usually through a case that
draws national attention, law enforcement and government respond using
increasingly sophisticated surveillance technology. Law enforcement’s use of
technology to prevent and combat cybercrime has prompted even greater
“advances” in criminal activity with the use of encryption,
anonymizers, and proxy servers.

With this assignment, you begin
building your Final Project. To begin, select one of the cybercrimes presented
in this course: cyber-bullying, cyber-stalking, cyber-hate, cyber-predators, or
a type of white-collar crime that utilizes technology. Examine the evolution of
that cybercrime and consider how advances in technology have influenced its
evolution.

The Assignment (2–3 pages)

  • Describe the type of cybercrime you selected.
  • Explain the evolution of the cybercrime, including when it gained
    national attention and any circumstances or case that might have prompted
    the national attention.
  • Explain how advances in technology have influenced the evolution
    of that cybercrime.


Two or three pages with
at least three references….


It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the readings.


To get maximum points you need to follow the requirements listed for
this assignments 1) look at the page limits 2) review and follow APA rules
3) create SUBHEADINGS to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.


Readings

  • Course Text: Taylor,
    R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and
    digital terrorism
    . (3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 8, “Sex
      Crimes, Victimization, and Obscenity on the World Wide Web” (review)
  • Article: Basu, S.,
    & Jones, R. (2007). Regulating cyberstalking. Journal of
    Information, Law and Technology
    , (2).
        
  • Article: Creepy
    crawlies: Cyber-stalking. (2011). The Economist, 399(8730), 63–64.
        
  • Article: Franken,
    Blumenthal introduce mobile privacy legislation. (2011). Telecommunications
    Reports, 77
    (13), 12–13.
        
  • Article: Reyns, B. W.
    (2010). A situational crime prevention approach to cyberstalking
    victimization: Preventive tactics for Internet users and online place
    managers. Crime Prevention and Community Safety, 12(2), 99–118.
        
  • Article: Roberts, L.
    (2008). Jurisdictional and definitional concerns with computer-mediated
    interpersonal crimes: An analysis on cyber stalking. International
    Journal of Cyber Criminology, 2
    (1), 271–285.
        

Web Resource

Writerbay.net

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!

Get a 15% discount for your first order


Order a Similar Paper Order a Different Paper