Cyberbullying and Cyber Crime

Only available on StudyMode
  • Topic: Computer crime, Cyber-bullying, Crime
  • Pages : 20 (5743 words )
  • Download(s) : 177
  • Published : May 11, 2013
Open Document
Text Preview
Prince Mohammed Bin Fahd University

Learning outcome assessment | Section 201 Research: Cyber bullying and cyber crime, one reason the Internet has turned from beneficial to disastrous Dr Ali Alghazo

Yomna Loai Al-Ibrahim – 201001070 Wala’a Al-Yousef – 201101049

 
 

Table
 of
 Contents
 
Research
 Proposal
 ............................................................................................................  3
  Introduction:
 .....................................................................................................................  3
  Purpose:
 .............................................................................................................................  3
  Rational:
 .............................................................................................................................  4
  Research
 Question:
 ..........................................................................................................  4
  Brief
 Literature
 Review:
 .................................................................................................  4
  Literature
 Review
 ..............................................................................................................  7
  Methodology
  .....................................................................................................................  13
  Findings
 .............................................................................................................................  11
  Discussion
 .........................................................................................................................  14
  Conclusion
 .........................................................................................................................  18
  Recommendation:
 ..........................................................................................................  20
  Limitation:
 ........................................................................................................................  20
  References:
 .......................................................................................................................  20
  Appendices……………………………………………………………………………………………….20   Appendix
 A
 ...............................................................................................................................................  22
  Appendix
 B
 ...............................................................................................................................................  44
  Appendix
 C
 ...............................................................................................................................................  75
  Appendix
 D
 ...............................................................................................................................................  78
  Appendix
 E
 ...............................................................................................................................................  79
 

 
 
 
 
 
 
 
 

 

2
 


 

Research Proposal Introduction: It’s clear that nowadays; laptops are spread all over the world. And as much as we all believe the Internet is a blessing, there is unfortunately the other harmful side of it. With no doubt, most of us have their personal stuff like pictures, videos, or any sort of documents stored in their laptops. And knowingly, we are aware that attacks on computers to steal data are increasing. It reached to the point where one can be able to hack and get unauthorized information. And once, one of us has seen a movie called ‘Cyber bully’ which was released in 2011. The movie tells the story of a...
tracking img