Final Project

Final Project

 

PAPER MUST BE 10- PAGES IN LENGTH (DO NOT GO BY WORD COUNT) USE SUBHEADING BETWEEN SECTIONS. USE 12 POINT FONT DOUBLE SPACED. USING PROPER APA CITATION THROUGHOUT. USE REFERENCES PROVIDED. MUST HAVE 8-10 SCHOLARLY REFERENCES. ATTACHING THE INTRODUCTION THAT IS TALKED ABOUT IN THE INSTRUCTION FROM WEEK 8. (JUST NEEDS A LITTLE WORK ON CONTENT PLEASE) LET ME KNOW IF YOU HAVE ANY QUESTIONS. CYBERBULLYING IS THE TOPIC!!

Final Project

For the Final Project, you provide an in-depth analysis of a cybercrime. You select a cybercrime to use for the Final Project in Week 8, where you review how this type of crime evolved, how it gained national attention, and how it was influenced by technology. As you continue your analysis of the cybercrime, you examine legislation, penalties, and how law enforcement might prevent and address the cybercrime.

FINAL PROJECT

10-12 pages: Not including title page and references

Your Final Project must include the following elements:

Introduction:

You submitted a first version of this Introduction in Week 8. Incorporate Instructor feedback before resubmitting the Introduction as part of your Final Project.

  • Describe the type of cybercrime you selected.
  • Explain the evolution of the cybercrime, including when the cybercrime gained national attention and any circumstances or cases that might have prompted the national attention.
  • Explain how technology has influenced the evolution of the cybercrime.

Body:

  • Describe legislation related to the cybercrime.
  • Explain limitations and/or gaps related to the legislation.
  • Explain penalties in your state or country of residence for engaging in the cybercrime.
  • Explain the degree to which the penalties you identified are adequate for penalizing the offender.
  • Explain challenges law enforcement might face in the efforts to prevent and address the cybercrime.

Conclusion:

  • Explain how law enforcement might utilize technological solutions to prevent and address the cybercrime.
  • Explain how law enforcement might utilize technology to benefit society and effect social change.

Although the Final Project (10–12 pages) is not to be submitted until Day 7 of Week 11, you should become familiar with the project requirements and have them in mind as you proceed through the course. Many of the Discussions and Application Assignments relate to and can be of use to your Final Project.

 

JOURNAL ARTICLES, ONLINE ARTICLES, AND BOOK EXCERPTS

  • Alison, L., Goodwill, A., Almond, L., van den Heuvel, C., & Winter, J. (2010). Pragmatic solutions to offender profiling and behavioural investigative advice. Legal and Criminological Psychology, 15, 115–132.
  • Anderson, K. B., Durbin, E., & Salinger, M. A. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171–192.
  • Audal, J., Lu, Q., & Roman, P. (2008). Computer crimes. American Criminal Law Review, 45(2), 233–274.
  • Bailey, J. (2004). Private regulation and public policy: Toward effective restriction of Internet hate propaganda. McGill Law Journal, 49(1), 59–103.
  • Barkacs, L. L., & Barkacs, C. B. (2010). Do you think I’m sexty? Minors and sexting: Teenage fad or child pornography? Journal of Legal, Ethical and Regulatory Issues, 13(2), 23–31.
  • Barnett, C. (n.d.). The measurement of white-collar crime using Uniform Crime Reporting (UCR) data. Retrieved December 15, 2011, from U.S. Department of Justice, Federal Bureau of Investigation website: http://www.fbi.gov/about-us/cjis/ucr/nibrs/nibrs_wcc.pdf
  • Basu, S., & Jones, R. (2007). Regulating cyberstalking. Journal of Information, Law and Technology, (2).
  • Bichler, G., & Balchak, S. (2007). Address matching bias: Ignorance is not bliss. Policing: An International Journal of Police Strategies & Management, 30(1), 32–60.
  • Bloss, W. P. (2009). Transforming US police surveillance in a new privacy paradigm. Police Practice and Research, 10(3), 225–238.
  • Carucci, D., Overhuls, D., & Soares, N. (2011). Computer crimes. American Criminal Law Review, 48(2), 375–419.
  • Chainey, S., Tompson, L., & Uhlig, S. (2008). The utility of hotspot mapping for predicting spatial patterns of crime. Security Journal, 21(1–2), 4–28.
  • Coakley, M. (2009). Privacy protection, safety and security: A state law enforcement perspective. The Computer & Internet Lawyer, 26(4), 1–11.
  • Coenen, R. D., Greenberg, J. H., & Reisinger, P. K. (2011). Intellectual property crimes. American Criminal Law Review, 48(2), 849–903.
  • Cooley, A. H. (2011). Guarding against a radical redefinition of liability for Internet misrepresentation: The United States v. Drew prosecution and the Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1, 15–28.
  • Creepy crawlies: Cyber-stalking. (2011). The Economist, 399(8730), 63–64.
  • Croall, H. (2009). White collar crime, consumers and victimization. Crime, Law and Social Change, 51(1), 127–146.
  • Cullen, F. T., Hartman, J. L., & Jonson, C. L. (2009). Bad guys: Why the public supports punishing white-collar offenders. Crime, Law and Social Change, 51(1), 31–44.
  • Diffie, W., & Landau, S. (2009). Communications surveillance: Privacy and security at risk. Communications of the ACM, 52(11), 42–47.
  • Drogin, E. Y., & Young, K. (2008). Forensic mental health aspects of adolescent “cyber bullying”: A jurisprudent science perspective. Journal of Psychiatry & Law, 36(4), 679–690.
  • Ebenger, T. (2007). The USA PATRIOT Act: Implications for private e-mail. Journal of Information Technology & Politics, 4(4), 47–64.
  • Foderaro, L. W. (2010, September 29). Private moment made public, then a fatal jump. The New York Times. Retrieved from http://www.nytimes.com/2010/09/30/nyregion/30suicide.html?_r=0
  • Foley, J. (2007). Are Google searches private? An originalist interpretation of the Fourth Amendment in online communication cases. Berkeley Technology Law Journal, 22(1), 447–475.
  • Franken, Blumenthal introduce mobile privacy legislation. (2011). Telecommunications Reports, 77(13), 12–13.
  • Gillespie, A. A. (2006). Cyber-bullying and harassment of teenagers: The legal response. Journal of Social Welfare & Family Law, 28(2), 123–136.
  • Gilman, N. (2009). Hacking goes pro. Engineering & Technology, 4(3), 26–29.
  • Gottschalk, P., & Solli-Saether, H. (2010). Computer information systems in financial crime investigations. Journal of Computer Information Systems, 50(3), 41–49.
  • Green, B. (2010). Thinking about white-collar crime and punishment. Criminal Justice, 25(3), 1–5.
  • Guichard, A. (2009). Hate crime in cyberspace: The challenges of substantive criminal law. Information & Communications Technology Law, 18(2), 201–234.
  • Haney, M. (2010). Triptech: Is it safe to surf? Condé Nast’s Traveler, 45(4), 50.
  • Henson, B., Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253–268.
  • Hu, W. (2010, October 2). Legal debate swirls over charges in a student’s suicide. The New York Times, p. A15.
  • Hunter, A. (2010, October 13). Dying girl Kathleen Edward cyberbullied by 33-year-old neighbor: Why? CBS News. Retrieved from http://www.cbsnews.com/news/dying-girl-kathleen-edward-cyberbullied-by-33-year-old-neighbor-why/
  • Is it legal?: Privacy. (2011). Newsletter on Intellectual Freedom, 60(2), 68, 81–82.
  • Kahn, S. (2010). “Apps.Gov”: Assessing privacy in the cloud computing era. North Carolina Journal of Law & Technology Online Edition, 11, 259–289. Retrieved from http://ncjolt.org/wp-content/uploads/2012/11/V11_On_Khan.pdf
  • Kanable, R. (2009). The face of identity theft. Law Enforcement Technology, 36(4), 28–33.
  • King, A. V. (2010). Constitutionality of cyberbullying laws: Keeping the online playground safe for both teens and free speech. Vanderbilt Law Review, 63(3), 845–884.
  • Kirchheimer, S. (2011). “They stole my name!” The Saturday Evening Post, 283(1), 32–35.
  • Kumar, A., & Kumar, P. (2010). Managing privacy of user generated information in a Web 2.0 world. Journal of Information Privacy & Security, 6(2), 3–16.
  • Levi, M. (2008). White-collar, organised and cyber crimes in the media: Some contrasts and similarities. Crime, Law and Social Change, 49(5), 365–377.
  • Lorentz, D. (2011). The effectiveness of litigation under the CAN-SPAM Act. The Review of Litigation, 30(3), 559–605.
  • Martin, J. A., Caramanica, M. R., & Fargo, A. L. (2011). Anonymous speakers and confidential sources: Using shield laws when they overlap online. Communication Law and Policy, 16(1), 89–125.
  • McCarthy, T., & Michels, S. (2009, July 2). Lori Drew MySpace suicide hoax conviction thrown out. ABC News. Retrieved from http://abcnews.go.com/TheLaw/story?id=7977226&page=1
  • McCuistion, J. G. (2011). Culpable discord: Defining the limitations of contributory liability in Internet-based file sharing. The University of Memphis Law Review, 41(3), 597–635.
  • McPhee, M., Schabner, D., & Battiste, N. (2010, August 15). ‘Craigslist Killer’ Philip Markoff commits suicide. ABC News. Retrieved from http://abcnews.go.com/US/craigslist-killer-phillip-markoff-commits-suicide/story?id=11405484
  • Meredith, J. P. (2010). Combating cyberbullying: Emphasizing education over criminalization. Federal Communications Law Journal, 63(1), 311–340.
  • Perry, B., & Olsson, P. (2009). Cyberhate: The globalization of hate. Information & Communications Technology Law, 18(2), 185–199.
  • Pilcher, J. (2010). Growing use of Twitter raises customer security concerns. ABA Banking Journal, 102(1), 27–28.
  • Rees, A. (2006). Cybercrime laws of the United States. Computer Crime and Intellectual Property Section, U.S. Department of Justice. Retrieved from http://www.oas.org/juridico/spanish/us_cyb_laws.pdf
  • Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99–118.
  • Roberts, L. (2008). Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An analysis on cyber stalking. International Journal of Cyber Criminology, 2(1), 271–285.
  • Rogers, D. (2006). Map quest. Law Enforcement Technology, 33(1), 60–64, 67–69.
  • Shamsi, H., & Abdo, A. (2011). Privacy and surveillance post-9/11. Human Rights, 38(1), 5–9.
  • Shekhter, S. (2011). Every step you take, they’ll be watching you: The legal and practical implications of lifetime GPS monitoring of sex offenders. Hastings Constitutional Law Quarterly, 38(4), 1085–1111.
  • Smith-Mason, J. (2011). Privacy rights…versus public safety after 9/11. Phi Kappa Phi Forum, 91(3), 14–15.
  • Stansky, L. (2009). Internet law and cybercrime: The future is here. Student Lawyer, 37(6), 8–10.
  • Sullivan, B. (2011, May 24). That famous space shuttle photo: When is sharing stealing? [Web log post]. The Red Tape Chronicles on msnbc.com. Retrieved from http://redtape.nbcnews.com/_news/2011/05/24/6703177-that-famous-space-shuttle-photo-when-is-sharing-stealing
  • U.S. Department of Justice, Federal Bureau of Investigation. (2011). Uniform Crime Report: Crime in the United States, 2010: About the Uniform Crime Reporting (UCR) Program. Retrieved from http://www.fbi.gov/about-us/cjis/ucr/crime-in-the-u.s/2010/crime-in-the-u.s.-2010/aboutucrmain
  • Wallace, A. (2009). Mapping city crime and the new aesthetic of danger. Journal of Visual Culture, 8(1), 5–24.
  • Yeh, B. T. (2008). Intellectual property rights violations: Federal civil remedies and criminal penalties related to copyrights, trademarks, and patents (CRS Report for Congress RL34109). Retrieved from http://www.fas.org/sgp/crs/misc/RL34109.pdf
  • Young, M. D. (2011). Electronic surveillance in an era of modern technology and evolving threats to national security. Stanford Law & Policy Review, 22(1), 11–39.
  • Yu, P. K. (2011). Digital copyright and confuzzling rhetoric. Vanderbilt Journal of Entertainment and Technology Law, 13(4), 881–939.

REQUIREMENTS

detailed  thorough

 

Answer Preview…………….

  According to Kids Health (2018), cyber-bullying is one of the most prevalent cybercrimes in the contemporary society. Social networking has generally taken bullying to the next level. Before the emergence of sophisticated technology, bullying was mainly done physically in schools. The situation is seemingly deferent today, as bullies have turned to the use of social technologies. These bullies are known as cyber bullies………………………

APA 4005 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?