Crt 205 Final Project

Only available on StudyMode
  • Download(s) : 183
  • Published : September 5, 2010
Open Document
Text Preview
Axia College Material
Appendix E

Critical Analysis Forms

Fill out one form for each source.

|Source 1 Title and Citation: The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime | |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber | |Crime. Ed. Louise Gerdes. Detroit: Greenhaven Press, 2009. Opposing Viewpoints Resource Center. Gale. Apollo Library. 12 Dec. 2009 | |. |

| | |The European Council-sponsored a multilateral treaty specifically addressing| |1 |Identify the principal issue presented by the |the requirement for investigation and prosecution of the computer network | | |source. |crimes. This treaty promotes a type of global law enforcement for computer | | | |network-based crimes covered under the treaty. | | | |One example of bias is the authors one sidedness point-of-view considering | |2 |Identify any examples of bias presented by the |all cyber activate related to Cybercrimes or network-based crimes illegal. | | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) | | |determined this. |professionals to fix and repair holes in the security system. Whereas, | | | |cracking; which is similar to hacking, is a process use by individuals | | | |intending to do harm to others. | | | |One identifiable area that the author was vague in is what the European | |3 |Identify any areas that are vague or ambiguous.|Council considered Cybercrimes or network-based crimes. For example, | | |If none exist, explain how you determined this.|pirating, hacking, cracking, infecting, stalking, and/or theft. | | | | | | | |I find this source credible. In personal experiences with viruses, worms, | |4 |Do you find the source credible? Explain your |spyware, and malware I found in numerous chat forum pages on or related to | | |reasoning. |the topic there is a growing threat to users all around the world because | | | |of Cybercrimes or network-based crimes. | | | |One rhetorical device used by the author is rhetorical definition by using | |5 |Identify and name any rhetorical devices used |loaded language while trying to clarify that Cybercrime or network-based | | |by the author. If none exist, explain how you |crimes are a huge problem in global society and needs law enforcement to | | |determined this. |protect users. | | | |The article does not have any fallacies. I determined this by knowing in | |6 |Identify and name any fallacies used by the |many cases fallacies start with the structure of a good argument and garble | | |author. If none exist, explain how you |or pervert it. In this case the author is trying to promote knowledge that | | |determined this....
tracking img