Application-cybercrime-related laws and digital evidence

Assignment Help Business Management
Reference no: EM131218705

Application: Cybercrime-Related Laws and Digital Evidence

Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. The jury's eyes widen as their minds struggle to process the weapon visually.  

Now consider the same movie scene again. Except this time, the prosecutor picks up a laptop and thrusts it into the air. The same dramatic reaction, however, is unlikely. Although digital evidence that is stored in devices might seem intangible, this type of evidence has been used in previous legal cases for trying cybercrime.  

Cybercrime is just as real and subject to the same burdens of proof and judicial process. Yet, the admissibility of digital evidence for establishing proof of a cybercrime can be challenging. Understanding the linkage between digital evidence and the execution of a cybercrime is important for establishing a legal case.

To prepare for this Assignment, pick one of the following areas of cybercrime and select a federal or state law that addresses it:

  • Computer Intrusions
  • Cyberterrorism
  • Cyberharassment and Cyberstalking
  • Economic Espionage
  • Financial Crimes and Fraud

 For this Assignment, write a 3- to 5-page paper in APA format that:

  • Summarizes the key elements of the law.
  • Explains the types of digital evidence that would need to be collected to prosecute a case under this law. Be sure that you include possible sources of evidence, such as computing devices, wireless devices, and Internet service providers (ISPs).
  • Proposes  a new or emerging technology within the area of cybercrime selected that might  not be covered under this law.

Required ResourcesReadings

  • Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
    • Chapter 6, "Organized Crime and Cyber Terrorism" (pp. 210-223) 
      These pages discuss cyber terrorism, information warfare, and cyber espionage.
  • FindLaw. (1999). United States v. Upham. Retrieved from https://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=search&case=/data2/circs/1st/981121.html
    This site contains the text for the appeal for United States v. Upham.

Reference no: EM131218705

Questions Cloud

Internet and use of communication impacted : Please answer the below questions in 400 or more words. Needs to be orginial content please. 1. How has the Internet and use of communication impacted the outcome of war(s)?
Write an essay on the given topic : Is a cause/effect essay on the subject on why collegiate athletes should be paid. - It needs to include three positive effects along with one negative effect of paying these athletes.
Possible that the ospf setting on the neighboring routers : You mentioned in a previous question of mine that one of the reasons why OSPF routers won't form adjacencies is that because it's possible that the OSPF setting on the neighboring routers don't match. What settings exactly?
Ensure the quality of public water supply systems : Do you think that the impacts of the program to control automobile pollution are progressively or regressively distributed? How about the program to ensure the quality of public water supply systems?
Application-cybercrime-related laws and digital evidence : Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. T..
Reduce tailpipe emissions : Catalytic converters are required on all new cars to reduce tailpipe emissions. Explain how this technology could have a beneficial impact in the short run but a less beneficial impact in the long run.
Identify which names in those two genealogies : What do you think about that similarity? - How does this information affect the way these genealogies should be interpreted?
Prepare a bond amortization schedule : Prepare the journal entry to record the issuance of the bonds and the related bond issue costs incurred on January 1, 2013. Prepare a bond amortization schedule up to and including January 1, 2017, using the effective interest method.
What is the theoretical framework that supports the topic : Theoretical Framework-What is the theoretical framework that supports the topic? Write a paragraph that provides the background for the development of the theory, model, or concept upon which you will frame your research.

Reviews

Write a Review

Business Management Questions & Answers

  Role of agenda and consequences of poor planning

Explain the role of the agenda and consequences of poor planning.

  Company or organization deploy and ids

Honeypots have an intended purpose. What do you think it is? What benefits could be rendered from setting up a honeypot in an organization?

  Marilyn didn''t get the job at the quick mart

Marilyn didn't get the job at the Quick Mart. She communicated a lawyer to discuss her options.

  Reasons that many companies are turning to outsourcing

What are four reasons that many companies are turning to outsourcing

  Why it is important to understand components of business

What are some of the components of these cultures that you need to understand from a business standpoint. How are they different in each country

  Marginal costs that characterize both plants

The manager of a two plant firm needs to decide how much to produce in each plant. According to an economist the demand curve for the firm's product was estimated to be P = 78 - 15Q, Q is equal to the output in plan 1 plus output in plant 2 such t..

  Risk in small business managementplanning ahead for risk

risk in small business managementplanning ahead for risk involves awareness of possible risks and thinking through ways

  What are intermediary organizations in entrepreneurship

Government and Philanthropic organizations are very important in entrepreneurship and often rely on Intermediary Organizations. - what are intermediary organizations in entrepreneurship?

  The cost of living increases

The City of St. Albans has a unionized police force that is coming up for a contract renewal. The police have one issue: the cost of living increases. During the past 10 years, police officers have received minimal cost of living increases, and th..

  Describe corporate culture and its importance

Analyze and describe corporate culture and its importance within an organization. What are some potential ramifications for an organization having a negative culture? Please explain your answer.

  Strategic management - hewlett-packard coexternal

strategic management - hewlett-packard co.external environment analysis for hewlett-packard company - computer and

  Cipher operation paper

How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd