Microsoft Word - Document1 Writing Guidelines 1. Type your submission, double-spaced, in a standard print font, size 12. Use a standard document format with 1-inch margins. (Do not use any fancy or...

1 answer below »
Cyber Security


Microsoft Word - Document1 Writing Guidelines 1. Type your submission, double-spaced, in a standard print font, size 12. Use a standard document format with 1-inch margins. (Do not use any fancy or cursive fonts.) 2. Include the following information at the top of your paper: 3. Name and complete mailing address 4. Student number 5. Course title and number (Computer-Based Crime, T06V) 6. Research project name 7. Read the assignment carefully and answer each question. Use proper citation in either APA or MLA style. 8. Be specific. Limit your submission to the questions asked and issues mentioned. 9. Include a reference page. On this page, list websites, journals, and all other references used in preparing the submission. 10. Proofread your work carefully. Check for correct spelling, grammar, punctuation, and capitalization. Some law firms have a policy that no document may leave the firm until at least two people have reviewed it. Even an excellent writer will occasionally make mistakes. If you can, get someone else to look over your work. At a minimum, you should put your work aside for a day or more and then look at it again. You’ll be surprised what problems you notice on a cold reading. Always proofread and edit from a paper copy. Never try to proofread or edit solely from the computer screen. Be sure that your submission contains the following information:  Your name  Your student ID number  The exam name  Your email address Your Project It’s time to apply what you’ve learned about digital forensics and cybercrime. This graded project is divided into three sections. Read each question thoroughly, consult the appropriate chapters in your textbook, and use resources available on the internet to identify examples. Part 1 (20 points) 1. Discuss two ways technology has changed human behavior in the past 20 years. Use specific examples. (10 points) 2. Explain what subcultures are and how the growth of the internet has affected how members of subcultures communicate. (10 points) Part 2 (45 points) Look at online news articles to find three recent (2015 or later) examples of cybercrimes. For each example: 1. Explain what happened and identify what kind of cybercrime it is (15 points) 2. Identify the digital evidence used in the investigation (15 points) 3. Apply a criminological theory to explain why the crime may have been committed (15 points) Part 3 (35 points) The FBI suspects that the motor vehicle registration records in three states have been hacked and that the data is being used to create false identities for a variety of thefts and fraud. The FBI has identified a suspect to be investigated. The suspect has both home and office computers as well as a cell phone and an unspecified number of USB drives. 1. What federal laws should be relied upon to investigate this crime? (5 points) 2. Explain the process for obtaining warrants that will be needed to conduct a search and the evidence these warrants might need to seize. (10 points) 3. Describe the process of extracting and processing evidence from the seized materials. (10 points) 4. Identify and explain a court case whose findings might apply to this investigation and the prosecution of the offender. (10 points) Lesson 1 - Cybercrime An Introduction - 75/Chapter 1.pdf Chapter 1 Technology and Cybercrime Chapter goals  • Explain how technology has affected human behavior.  • Identify the difference between digital natives and digital immigrants.  • Discuss the three ways in which technology can be abused by individuals.  • Recognize a subculture and their role in offending behaviors.  • Identify the differences between cyberdeviance, cybercrime, and cyberterror.  • Understand how computers and technology produce digital evidence and its value in criminal investigation .  • Explain the factors that make cybercrimes attractive to certain people.  • Explore the various forms of cybercrime that occur across the world. Introduction The Internet, computers, and mobile technologies have dramatically reshaped modern society. Although it is difficult to comprehend, less than two decades ago most individuals did not own a cell phone and personal computers were still somewhat expensive pieces of equipment. Individuals could not text and email was uncommon. Internet connectivity was possible through dial-up modems or Ethernet cabling and people paid by the hour for access to the Web. Video game systems used 16-bit graphics and did not connect to other devices. Global Positioning Systems (GPS) were largely used in military applications only. Today, most of the world now depends on computers, the Internet, and cellular technology. Individuals now own laptops that are connected via Wi-Fi, cell phones that may also connect to the Internet, and one or more video game systems that may be networked. In addition, people have multiple email accounts for personal and business use, as well as social networking profiles in multiple platforms. Cell phones have become a preferred method of communication for most people, especially text messages. In fact, individuals under the age of 20 regularly send more texts than any other age group, and prefer to send texts rather than make phone calls (Zickuhr, 2011). Individuals also frequently purchase goods online and are increasingly using e-readers for books and newspapers rather than traditional print media. It is amazing to consider that the world and human behavior have changed so quickly through the use of technology. In fact, there are now 3.4 billion Internet users worldwide, comprising 46.1 percent of the world’s population (Internet Live Stats, 2016). China and India have the largest population of Internet users, though only 55 percent and 34 percent of their total populations have access (Internet Live Stats, 2016). The USA, Brazil, and Japan have the next largest populations, though a much greater proportion of their populations have access (88.5%, 66.4%, and 91.1% respectively: Internet Live Stats, 2016). The proliferation of technology has led to distinct changes in how individuals engage with the world around them. People now shop, communicate, and share information in digital formats, which was previously impossible. Additional changes in behavior are likely to continue in the face of technological innovations as they are developed and implemented. In fact, the sociologist Howard Odum referred to this process as technicways, recognizing the ways in which behavior patterns change in response to, or as consequence of, technological innovations (Odum, 1937; Parker, 1943; Vance, 1972). From Odum’s perspective, technic- ways replace existing behavior patterns and force institutional changes in society (Vance, 1972). For instance, if an individual 30 years ago wanted to communicate with other people, he/she might call them, see them in person if possible, or more likely send a letter through postal mail. Now, however, that person would send a text, write an email, instant message, or poke them through Facebook rather than write a letter through “snail mail.” The impacts of technicways are evident across all demographic groups in modern society. For instance, 77 percent of Americans owned a smart phone as of 2016, with substantial access among younger populations: 92 percent of 18- to 29- year-olds have one (Smith, 2017). In addition, there are over 1 billion mobile phone subscribers each in China and India (Rai, 2016). Importantly, China has over 500 million smartphone users, while India has only 125 million. As these rates continue to increase Internet use will change, transforming social and economic interactions in unique ways from country to country (Rai, 2016). This is evident in the fact that many people around the world use social media as a means to connect and engage with others in different ways. For instance, 79 percent of American adults use Facebook, though there has been a substantial increase in the use of Instagram and LinkedIn as a means to communicate (Greenwood, Perrin, and Duggan, 2016). Adults aged 65 and older are joining these sites at the highest rates compared to other age groups. In addition, Americans appear to use the Facebook messenger app more than any other product available (Schwartz, 2016). WhatsApp is much more popular in a global context, and is the number one messaging application across much of South America, Western Europe, Africa, and Asia. Viber, however, is much more popular across Eastern Europe, particularly Belarus, Ukraine, and other nations in the region (Schwartz, 2016). Despite regional variations in use, technology has had a massive impact on youth populations who have never experienced life without the Internet and computer- mediated communications (CMCs) like email and texting. Today, youth in the USA acquire their first cell phones when they are between the ages of 12 and 13 (Lenhart, 2010). Similar use patterns are evident across the globe, with children in the UK receiving a phone by an average age of 11 (Gibbs, 2013), and 12 in a study of Japan, India, Indonesia, Egypt, and Chile (GSM Association, 2012). For more information on statistics of social media and technology use, go online to: 1. www.pewinternet.org/ 2. www.huffingtonpost.com/april-rudin/life-on-a-social-media- is_b_4600429.html Technology has not simply shifted the behaviors of youth, but has actually shaped and molded their behavior and worldview from the start. Most people born in the mid- to late 1980s have never lived without computers, the Internet, or cell phones. As a consequence, they do not know a world without these devices and what life was like without these resources. Thus, Prensky (2001) argued that these youth are digital natives, in that they were brought into a world that was already digital, spend large amounts of time in digital environments, and use technological resources in their day-to-day lives. For instance, individuals between the ages of 18 and 34 are the most heavy Internet users worldwide (Statistica, 2015). Virtually everyone (96%) aged 16 to 24 in the UK accesses the Internet on
Answered 3 days AfterSep 21, 2021

Answer To: Microsoft Word - Document1 Writing Guidelines 1. Type your submission, double-spaced, in a standard...

Deepti answered on Sep 24 2021
151 Votes
Name:
Mailing Address:
Student Number:
Course Title/ Number: Computer-Based Crime, T06V
Part1:
1. Ways in which technologies have changed human behavior
a. Technology has created a digital wall among humans as they no longer interac
t with one another and primarily rely on technology for knowledge like ‘googling’. Social skills have stagnated with less human to human interaction and open ended discussion. This has led to loss of special moments of life and it is required to incorporate technology free moments. However, rapid diffusion of technology in society continues to transform the ICT.
b. Social inclusion through social networking sites has become an important part of human lives. Posting information and pictures about self is good for family and friends located far away but has adverse consequences to self worth. When more time is spent in pleasing others, the actual likes and wishes are forgotten.
2. Subculture is a culture within a culture which may or may not include deviant behavior or inferiority. It includes members that are in some way represented as non-normative and marginal through their particular interests and practices through what they are, do and where they do it. Subculture may be oriented around a market, product, profession or an organization unit. The factors that primarily influence subculture include corporate origin, R & D management behavior, technological change, market changes, etc. Science and technology subcultures are formed on the basis of similarities in educational background and shared conception and language. Individuals tend to socialize in minimum one group in order to improve their social skills and defy fundamentally new conceptions. Disciplines expand and contract as a result, amalgamate and split up which is accompanied by generation changes, breakthroughs of knowledge and interests. The members act in different ways on the level of fundamental elements in a culture like influencing language, values, strengthening ideologies. Communication methods used in the subcultures computer-,ediated communications like text, email and other social media. Technology is used as a way to communicate for different purposes like selling drugs, planning activities or even communicating in dark web.
Part 2
1.
Cybercrime 1: In 2016, a distributed Denial of Service attack caused outages in domain name system...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here