Evolution of Cyber-Crimes

Evolution of Cyber-Crimes

Evolution of Cyber-Crimes

PLEASE PROVIDE 2-3 PAGES (DO NOT GO BY WORD COUNT) USE PROPER APA CITATION THROUGHOUT PAPER. INCLUDE SUBHEADING BETWEEN SECTIONS. USE DOUBLE SPACE IN 12 POINT FONT. I WOULD LIKE THE PAPER TO BE ON CYBER-BULLYING. ALSO, USE SOME REFERENCES PROVIDED BELOW.

ORDER NOW FOR CUSTOMIZED SOLUTION PAPERS

Application: Final Project Introduction: Evolution of Cybercrimes

The Internet has changed lives in fundamental and positive ways. It also has opened the door to new types of cybercrime, which can run the gamut from identity theft to organizing terrorist plots. As each new type of crime comes to light, usually through a case that draws national attention, law enforcement and government respond using increasingly sophisticated surveillance technology. Law enforcement’s use of technology to prevent and combat cybercrime has prompted even greater “advances” in criminal activity with the use of encryption, anonymizers, and proxy servers.

With this assignment, you begin building your Final Project. To begin, select one of the cybercrimes presented in this course: cyber-bullying, cyber-stalking, cyber-hate, cyber-predators, or a type of white-collar crime that utilizes technology. Examine the evolution of that cybercrime and consider how advances in technology have influenced its evolution.

The Assignment (2–3 pages)

  • Describe the type of cybercrime you selected.
  • Explain the evolution of the cybercrime, including when it gained national attention and any circumstances or case that might have prompted the national attention.
  • Explain how advances in technology have influenced the evolution of that cybercrime.

READINGS

  • Course Text: Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 10, “Digital Laws and Legislation” (review)
  • Article: Bloss, W. P. (2009). Transforming US police surveillance in a new privacy paradigm. Police Practice and Research, 10(3), 225–238.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: Diffie, W., & Landau, S. (2009). Communications surveillance: Privacy and security at risk. Communications of the ACM, 52(11), 42–47.
    Retrieved from the Walden Library using the Business Source Complete database.
  • Article: Ebenger, T. (2007). The USA PATRIOT Act: Implications for private e-mail. Journal of Information Technology & Politics, 4(4), 47–64.
    Retrieved from the Walden Library using the Computers & Applied Sciences database.
  • Article: Shamsi, H., & Abdo, A. (2011). Privacy and surveillance post-9/11. Human Rights, 38(1), 5–9.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: Young, M. D. (2011). Electronic surveillance in an era of modern technology and evolving threats to national security. Stanford Law & Policy Review, 22(1), 11–39.
    Retrieved from the Walden Library using the Academic Search Complete database.