Application-cybercrime-related laws and digital evidence

Assignment Help Business Management
Reference no: EM131218705

Application: Cybercrime-Related Laws and Digital Evidence

Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. The jury's eyes widen as their minds struggle to process the weapon visually.  

Now consider the same movie scene again. Except this time, the prosecutor picks up a laptop and thrusts it into the air. The same dramatic reaction, however, is unlikely. Although digital evidence that is stored in devices might seem intangible, this type of evidence has been used in previous legal cases for trying cybercrime.  

Cybercrime is just as real and subject to the same burdens of proof and judicial process. Yet, the admissibility of digital evidence for establishing proof of a cybercrime can be challenging. Understanding the linkage between digital evidence and the execution of a cybercrime is important for establishing a legal case.

To prepare for this Assignment, pick one of the following areas of cybercrime and select a federal or state law that addresses it:

  • Computer Intrusions
  • Cyberterrorism
  • Cyberharassment and Cyberstalking
  • Economic Espionage
  • Financial Crimes and Fraud

 For this Assignment, write a 3- to 5-page paper in APA format that:

  • Summarizes the key elements of the law.
  • Explains the types of digital evidence that would need to be collected to prosecute a case under this law. Be sure that you include possible sources of evidence, such as computing devices, wireless devices, and Internet service providers (ISPs).
  • Proposes  a new or emerging technology within the area of cybercrime selected that might  not be covered under this law.

Required ResourcesReadings

  • Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
    • Chapter 6, "Organized Crime and Cyber Terrorism" (pp. 210-223) 
      These pages discuss cyber terrorism, information warfare, and cyber espionage.
  • FindLaw. (1999). United States v. Upham. Retrieved from https://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=search&case=/data2/circs/1st/981121.html
    This site contains the text for the appeal for United States v. Upham.

Reference no: EM131218705

Questions Cloud

Internet and use of communication impacted : Please answer the below questions in 400 or more words. Needs to be orginial content please. 1. How has the Internet and use of communication impacted the outcome of war(s)?
Write an essay on the given topic : Is a cause/effect essay on the subject on why collegiate athletes should be paid. - It needs to include three positive effects along with one negative effect of paying these athletes.
Possible that the ospf setting on the neighboring routers : You mentioned in a previous question of mine that one of the reasons why OSPF routers won't form adjacencies is that because it's possible that the OSPF setting on the neighboring routers don't match. What settings exactly?
Ensure the quality of public water supply systems : Do you think that the impacts of the program to control automobile pollution are progressively or regressively distributed? How about the program to ensure the quality of public water supply systems?
Application-cybercrime-related laws and digital evidence : Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. T..
Reduce tailpipe emissions : Catalytic converters are required on all new cars to reduce tailpipe emissions. Explain how this technology could have a beneficial impact in the short run but a less beneficial impact in the long run.
Identify which names in those two genealogies : What do you think about that similarity? - How does this information affect the way these genealogies should be interpreted?
Prepare a bond amortization schedule : Prepare the journal entry to record the issuance of the bonds and the related bond issue costs incurred on January 1, 2013. Prepare a bond amortization schedule up to and including January 1, 2017, using the effective interest method.
What is the theoretical framework that supports the topic : Theoretical Framework-What is the theoretical framework that supports the topic? Write a paragraph that provides the background for the development of the theory, model, or concept upon which you will frame your research.

Reviews

Write a Review

Business Management Questions & Answers

  Existence of present legal protection

In spite of the existence of the present legal protection, right of contract and considerations of public policy, is there a need for a new law against unjust dismissal? Why? Give three examples of unjust dismissal that you may be aware of.

  Supply chain disruptions of the magnitude of the japan

Supply chain disruptions of the magnitude of the Japan tsunami are, fortunately, not frequent. On the other hand, breakdowns resulting from labor and political unrest, infrastructure congestion, as well as other stoppages caused by floods, fire, etc...

  Complicated procedures in light of the theories of supply

Not only do several regulators have to approve a new regulation, however comments and reviews from industry and conservation organizations are typical. Explain these complicated procedures in light of the theories of supply and demand for regulati..

  Explain search the internet to find interesting

Explain Search the internet to find an article or real-world application involving annuities that you find interesting and informative

  Determining the external business environment

The external business environment within which New-man conducts its business is continuously changing. Classify the two (2) sub-sections of the external business environment and indicate (name) which sub-elements and/or sub-environments are releva..

  Show employee evaluation process

Show the changes that you would make in this process and how these changes could lead to improved morale within the organization.

  Influence of social media on business and communication

The Influence of Social Media on Business and Communication Management-Management Communications with Technology

  Carry out the analysis

The company has hired you to analyze the effect of such a cut on its profits. How would you carry out the analysis? What information would you need?

  Aicpa code of professional conduct rules

What if you have already told the other side that the building is fine when you learn about the problems? What other potential ethics issues do you see in this situation? Which AICPA Code(s) of Professional Conduct rules apply in this situation (expl..

  Repetitions of the data argument

The function should return an array containing repetitions of the data argument. For instance, replicate_recur(3, 5) or replicate_iter(3,5) should return [5,5,5]. If the times argument is negative or zero, return an empty array. If the argument is..

  Disaffirm the liability waiver

The school asserted that he had signed their waiver of liability and therefore was prohibited from recovering any damages. Could Pi disaffirm the liability waiver? Explain your answer applying the law you learned and include any case law reference..

  Cultural differences and international workstudies have

cultural differences and international workstudies have shown that about 40 of u.s. employees who were assigned

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd