Expert answer:You are required to write a capstone paper for this course. A capstone paper is exactly what it sounds like. It is a paper that will encapsulate all that you have learned as a Criminal Justice major. This paper must be a minimum of 25 pages in length: NO EXCEPTION! Papers can be longer, but if you are approaching the 30-page mark, then you need to narrow the scope of your paper. The paper must be typed, double spaced in 12-point font. A title page with your name on it must be included. An abstract and a full reference page must also be provided in your paper. This paper must adhere to APA format, including citations. An example of this format will be provided to you in class.This is the continuation to the paper you began and just the continuation to a lot more time to finish the paper.from the professor who graded online writing center: Add in-text citations – the most important revisions still needed are including in-text citations in every sentence that uses information/facts from a scholarly source (i.e. article, website or book, etc). Even when paraphrasing information, it is necessary to cite the source with an in-text citation at the end of the sentence. While reading your paper it was not clear if at times you were paraphrasing information and not including in-text citations to explain where you found that information. This website explains how to format APA in-text citations: https://owl.english.purdue.edu/owl/resource/560/02/This video explains how to properly insert APA in-text citations in your essay: https://www.youtube.com/watch?v=fLlLIYxeGlsPage numbers for APA in-text citations – there are relevant and insightful direct quotes integrated throughout your body paragraphs. According to APA guidelines, when using a direct quote it is necessary to include the page number or paragraph number in the in-text citation. Most of your in-text citations did not include this information. See this website to gain further clarity about APA in-text citations: https://owl.english.purdue.edu/owl/resource/560/02/Semicolon & Colon Grammar Rules – often in the paper a semicolon was used, when instead the correct punctuation was a colon. When introducing a list of items or concepts, it is best to use a colon. Watch these videos to understand the grammar rules for colon & semicolon usage. Colon Grammar Rules – https://www.youtube.com/watch?v=f9K0dnA2K4YSemicolon Grammar Rules – https://www.youtube.com/watch?v=5kssP4fWs9UAdd a ‘Summary’ section at the end of your research paper – to conclude the research paper and tie up all loose ends, I suggest adding a summary section at the end. Most research papers include a summary section as the conclusion. In this section you can reiterate the purpose of the paper and assert any closing thoughts for the reader to remember about your research.
updated_assessment_evaluations_crij_4380.docx
cj_4380_capstone_part_i_revised.docx
Unformatted Attachment Preview
ASSESSMENT EVALUATIONS:
Please be mindful that the heart of the study is not on statistics, but the thinking
behind the study. Remember that criminal justice studies focus on what you really
want to find out, how you build arguments about ideas and concepts, and what
supporting evidence you have to persuade people to accept your arguments and/or
position.
Assessment
Capstone
Abstract
and Draft
Week 2
Description
Include any additional work you have completed with
regards to the capstone abstract and draft. This body of
work serves as the baseline from which this course’s
learning is developed. Please clearly identify the research
topic you will work on for the remainder of the term.
Write an Abstract that introduces and establishes the
research topic and context.
1. Draft a clear description of your research topic.
2. Reflect on what could be done with the information
found by researching this topic.
Describe the context of the question, problem, or issue of
the study.
1. Create a statement that reflects the purpose of your
study.
2. Abstract and Draft should be 7-9 double-spaced
pages in length.
3. Follow Capstone Paper Outline and include the
following:
a.
b.
c.
d.
e.
f.
g.
Table of Contents
Chapter 1: Introduction
Problem Statement
Research Questions
Purpose of the Study
Nature of the Problem
Background and Significance of the
Problem
h. Definition of Terms (if applicable)
i. Chapter 2: Review of Literature
j. Develop survey questions (10 minimum)
You must include a title page, abstract, table of
contents, references, and survey/interview questions.
Weight
20%
Capstone
PaperReview of
Literature
Part I
Week 4
In no more than 9-12 double-spaced pages (INCLUDE
WORK FROM WEEK 2), state the topic and the theoretical
and practical importance of studying it, as well as make a
case for how it is a contribution to the discipline.
20%
Establish the importance of the question, problem, or
issue of the study in a specific field by addressing the
following:
1. Review of literature should also identify and review
the major studies that have examined this issue in
the past.
2. What are their methodological strengths and
weaknesses?
3. State the major hypotheses (2-3) that your study will
test (if applicable).
4. Identify the major independent and dependent
variables and the unit of analysis, as part of your
front end (if applicable).
5. Write several sentences that illustrate the
importance of this study to the criminal justice field.
Identify a problem statement that clearly describes and
documents the issue the study addresses.
1. Write a paragraph that reflect your thoughts about
the overarching rationale for the study.
Develop appropriate research questions, identify the
variables in the study, and articulate a hypothesis (if
applicable).
1. List all research questions.
2. If you conduct a quantitative study, list each
proposed independent variable and dependent
variable, identifying each with a notation of either IV
or DV.
3. Include Chapter 3: Research Design and
Methodology
Capstone
Research
Plan,
Sampling &
You must include a title page, abstract, table of
contents, references, and survey/interview questions.
In no more than 12-15 double-spaced pages (INCLUDE
WORK FROM WEEK 2 and 4), indicate clearly the type of
sampling design you will use, your research design, and
the measures you will use in your proposed research.
20%
Research
Design
Paper- Part
II
Week 6
Explain how the study problem, purpose, research
questions, and design are aligned.
In your sample design section, be sure to include your
rationale for selecting this type of sample. In your
discussion, clearly indicate the population to which your
hypothesis applies and how you will select the sample. Pay
particular attention to practical issues, such as sample size,
potential attrition, and access. Provide a justification for the
decisions you make.
You should also clearly indicate the type of research
design you will use to test your hypothesis. How does this
design allow you to test your hypothesis (i.e., justify your
design and provide a rationale for it)? Don’t be vague in
your design, such as saying you will conduct an experiment
or a survey. Be specific – will your survey be a panel
design? How many data collection points? Why? What will
be the lag or time between surveys/interviews? Why? Will
you survey or interview? Why?
Support the methodological approach for addressing the
question, problem, or issue of the study to respond to the
problem.
1. Describe why you think this method is the best fit for the
problem you wish to research and the required data.
2. List your ideas for gathering data for your study.
Although this proposal may seem rudimentary, the
information provided in each section can be used as the
basis of your proposal. As such, a significant amount of
effort should be given to refining these sections while they
are in their simplest form.
Finally, discuss your measurement plan.
1. What are the key variables you need to measure in
order to test your hypothesis (if applicable)?
2. Indicate precisely how you will measure them and
consider/defend their validity and reliability.
FINAL
Capstone
Paper
You must include a title page, abstract, table of
contents, references, and survey/interview questions.
Submit the final Capstone paper to your professor on the
due date (INCLUDE WORK FROM WEEKS 2, 4, and 6).
This final proposal should address all comments and
suggested revisions provided throughout the term. The
40%
Week 8
proposal should be double-spaced, in 12-point Arial or
Times New Roman, with 1-inch margins and in APA
format.
The final Capstone paper must include:
1.
2.
3.
4.
5.
6.
Chapters 1- 5
A title page
An abstract
Table of contents
References
An appendix for your survey questions or
interview questions.
A 25-page minimum (not including the title page,
abstract, table of contents, references,
survey/interview questions, and appendix(s)) will be
strictly enforced.
Total Grade
100%
Running Head: CYBERCRIME
1
Cybercrime
Effects of Cybercrime to the Society
Haydee M. Perez
Dr. Phan
University of Incarnate Word
October 30, 2017
CYBERCRIME
2
Abstract
In today’s period of online processing, most of the information and data is online and
thus susceptible to cyber threats. Over dependence on businesses, governments, and individuals
in technology results in the growing instances of cybercrime and cyberterrorism. Researchers
and crime scholars argue that in the future, conflicts and wars between countries will occur in
cyberspace as opposed to physical spaces. Cyber wars will be critical equipment in the hands of
the enemies, and the enemies will use them to control superpowers. The first documented
cybercrime occurred in the early-19th century. This fact is not shocking because the earliest form
of computer, abacus, was developed in 3500 B.C. Current computers have come a long way,
with neural computing alleging to transform every element in a glass of water into a computer
with the ability to conduct innumerable activities in a second. Cybercrime has gained popularity
thanks to the increasing reliance on computers in today’s life. This paper discusses and analyzes
extensively the aspect of cybercrime including the strategies and impacts of cybercrimes and its
types. The world depends profoundly on the use of electricity and several electronic devices to
keep all the aspects around the globe running. Irrespective of where a person goes, there is
always some element of technology that has a substantive effect on life. Whether it is in a movie
theatre, the grocery store, the public library, and the gas stations, individuals always experience
some technology, and without it, these places will cease to operate. Therefore, although
technological advancement and innovation has resulted in a number of positive outcomes, it has
also increased instances of cybercrimes. This paper will also examine network security in an allinclusive framework, critically assessing the impact and role of network security in curbing
threats in information systems and networks. Cybercrime essentially refers to a crime perpetrated
using a computer system and the internet to interfere with malevolent program activities, stalk
CYBERCRIME
victims, trade contraband, or steal an individual’s identity. In other words, cybercrime is
basically an umbrella term for several types of crimes performed using the internet.
3
CYBERCRIME
4
Introduction
Problem Statement
This paper sought to examine the effects of cybercrime on society. Cybercriminals utilize
the interconnectedness, secrecy, and anonymity given by the internet, thus violating the very
basis of the modern information society. Typically, cybercrime can entail computer viruses,
botnets, cyberbullying, cyber-pornography, cyber-terrorism, identity theft, and cyber-stalking
among others. Law enforcement agencies and personnel have attempted to keep up-to-date with
cyber-criminals, who cost the United States and the world in general billions of dollars every
year.
Today, when people discuss cybercrime, they fail to acknowledge the scope of these
crimes. Many inquiries occur when the word cybercrime is introduced. Some of the questions
that are brought about are: Do cybercrimes occur only through computers? And, are
cybercrimes only conducted via the internet? In fact, conventional crimes such as fraud and theft
that have been conducted through physical means are today being shifted into digital frameworks
and thus regarded as cybercrimes. The question that many people pose is what exactly is
cybercrime?
Cybercrime attacks form the basis of current, technological environments, bound up as
they are with the speedy flow of computer information steered by the web. At the most primary
level, cybercrime perpetrators usually exploit technologically unsophisticated people who always
find themselves in an environment where the internet plays an integral part in both individual
and societal life. At this level, cybercrime relies on the capacity of those who are more technosavvy to utilize that awareness to manipulate others into surrendering pertinent data, such as
CYBERCRIME
5
Social Security numbers and bank account information. While it is likely in most instances for
the victim of cybercrime to replace stolen bank information and money, the occurrence usually
leaves the victim devastated and profoundly mistrustful of the internet and other accouterments
of the modern world (Sunde, et al 2017).
Research Questions
The following are the research questions that the paper will attempt to answer:
I.
What are the effects of cybercrime attacks to the economy and the society at large?
II.
How are cybercrimes committed?
III.
What are the federal and state regulations and policies regarding cybercrime?
IV.
Who commits cybercrimes and why do they commit them?
V.
How can cybercrimes be prevented and reduced?
VI.
What are the current trends and prevalence of cybercrimes?
Purpose of the Study
The purpose of this paper is to analyze the effects of cybercrimes to the society and
economy of both developed and developing nations. Furthermore, this study attempts to assist
individuals, businesses, and governments in acknowledging the ethical and legal prospects of
cybersecurity and cybercrimes as well as to assist with the synchronization of legal systems. As
such, the paper aims to assist institutions and economies to better comprehend the international
and national repercussions of growing cybercrimes, to evaluate the requirements of current local,
national, and international equipment, and to help economies to develop a rational and logical
legal framework.
CYBERCRIME
6
This paper provides a multifaceted and inclusive overview of the most pertinent subjects
related to the legal prospects of cybercrime and concentrates on the trends of cybercrimes in the
existing technologically advanced economy. Some of the cybercrime concepts that the paper will
address and analyze are internet crime, identity crime, cyber stalking, cyber bullying, and cyberpornography. This research study will specifically attempt to answer the research questions. By
determining how cybercrimes impact society, addressing the numerous alternatives and effective
measures to prevent their occurrences will be simple (Yar, 2013).
Nature of the Problem
The United States Department of Justice cites that cybercrimes entail ‘‘any violations of
criminal law that involve a knowledge of computer technology for their perpetration,
investigation, or prosecution’’ (Loader & Thomas, 2013). Due to the complete number of
violations that come under the canopy of cybercrime, it’s a sect that remains hard to define.
Typically, the assortment of the activities and conducts that come under this umbrella and the
progressing nature of technologies that change the manner cyber criminals perpetrate make it
difficult to contract down further. Cybercrime has increased significantly on a global landscape
in the recent past.
Two major reasons cause the trend of increasing violations. First, the ever-growing
number of businesses depending on computers to operate and secondly, the surge in individuals
mastering the concept of technology to perpetrate cybercrimes. With the aspect of e-commerce
becoming common for companies of all sizes and shapes, today any business is susceptible to
this problem. Cybercrime is approximated to cost the worldwide economy billions of dollars
every year. However, it’s difficult to measure the number of cybercrime attacks occurring in the
CYBERCRIME
7
global economy. Therefore, successful prosecutions are difficult to get. A noteworthy exception
was the Hao brothers, who were executed in 1999 in China for hacking into the computer system
and network of a bank and transferring some funds into their personal accounts.
Background and Significance of the Problem
Crime and deviance have been linked to mankind since his fall. Typically, crime remains
indefinable and obscures itself from the presence of development and growth. Different
economies have utilized multiple approaches to counterattack crimes based on their nature and
scope. Cybercrime refers to types of crime perpetrated on the internet using the computer as
either the intended victim or the equipment. It is very hard to group crimes into different
classifications because they change on a daily basis.
The introduction of computers and the development of the internet made possible the
attainment of a large improvement in surgery, research, communication, and expertise.
Regrettably, the internet and computers have further provided a new natural scope for crime.
According to Janet Reno, an advocate in the United States, although the internet and other
gadgets of technological advancement have brought about numerous benefits to humanity, it also
promoted new potentials for crimes and deviance. Cybercrime is essentially branded as
committing a transgression through the utilization of the internet or a computer system.
The internet has been considered as jointly the uncountable of telecommunications and
computer accessories entailing gear and functional systems, which consist of the unified
worldwide web of frameworks that offer work to the protocols. In other words, the internet is a
wide computer web that is joined together. This joint allows individuals to connect to numerous
other computers to accrue and transmit data and information. Nonetheless, this connectivity
CYBERCRIME
8
allows deviant people to broadcast with victims and/or other cybercrime criminals. Even though
no universally recognized description of cybercrime is present, a difference is usually made
between a traditional misdeed that is conducted via the use of the internet or a computer and a
transgression that involves specifically targeting a computer technology.
Definitions of Terms
I.
Cybercrimes – cybercrimes refer to criminal and deviant conducts and behaviors
perpetrated via the use of a computer or any other form of the technological device.
This deviant act entails any criminal act the deals with computer systems and
networks. Cybercrime can also be defined as any illegal conduct that utilizes the
computer as its key means of commission (Anderson, et al, 2013).
II.
Computer trespass – this refers to the illegal access to a computer system and/or
network with the malicious intention of omitting a crime.
III.
Hacking – this is the process of accessing the computer system or network without the
authority and/or consent of the users. Hackers often intrude into these systems and
networks with the intention of interrupting with the stored contents.
IV.
Cyber-stalking – this entails the use of social media platforms and internet chat rooms
by sexual predators to identify and harass their victims.
V.
Cyber-terrorism – this refers to the use of the internet to plan deliberate and
widespread attacks to interrupt computer systems and networks. It entails the process
of using the computer systems or networks to transmit violent and vicious
information, plan a terrorist attack, or recruit terrorists.
VI.
Cyber-pornography – this entails the conduct of using cyberspace to develop, issue,
publish, or import obscene materials or pornography, particularly contents portraying
CYBERCRIME
children engaging in sex with adults. Typically, this form of cybercrime is a criminal
offense and is categorized as causing harm to individuals. Cyber-pornography
essentially means the use of the internet to share adult and child pornography.
VII.
Cyber-bullying – this is an example of harassment using electronic gadgets. It’s the
use of technological accessories to threaten, harass, and/or embarrass other people.
Cyber-bullying result in mental and emotional anguish on the part of the victim.
VIII.
The computer as a tool – when the person is the primary target of cybercrime, the
computer is regarded as the tool as opposed to the target. These deviant behaviors
essentially entail simple computer expertise.
IX.
Computer as target – in this case, deviant activities are conducted by a particular
group of offenders. Crimes that entail the computer as the target require technical
knowledge of the criminals (Clough, 2015).
9
CYBERCRIME
10
Review of Literature
Theoretical and Practical Importance of Studying Cybercrime
The internet and computers play a gradually integral role in daily life, making it
extremely essential to understand and acknowledge the changing aspects of cybercrime and those
who are victims of this criminal act. Studying cybercrime and cyber security, in general, examine
the interpreters for participation in several types of cybercrime and nonconformity, from
common issues like computer hacking and media piracy. Many criminological perspectives were
created to address street crimes, so it is not clear how these perspectives may apply to virtual
crime and deviance. Therefore, studying cybercrime offers critical understanding into the utility
of several perspectives to address cybercrimes (Anderson, et al, 2013).
Studying cybercrime essentially gives in-depth insight into the prevalence and trend of
cybercrime felonies using data sets from populations across the world. It provides readers a basic
insight of, and gratitude for several forms and types of cybercrime, and summarizes potential
predictors of both victimization and offending. Individuals live in a progressively networked
environment, from government infrastructure to personal banking. As a result, safeguarding
those networks and systems is no longer discretionary. Cybercrime is now steadily at the top of
the global itinerary as high-profile security breaches increase dreads and worries that security
attacks could risk the international economy (Loader & Thomas, 2013).
A recent report published by the World Economic Forum (WEF) stated a blunt caution
that 90 percent of companies worldwide recognize they are insuffi …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more