Preview

Research Paper Outline

Satisfactory Essays
Open Document
Open Document
423 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Paper Outline
How to Avoid Being a Victim of Cybercrime

Thesis Statement: Cybercrime is an increasing concern among individuals across the U.S. making it necessary to know how to avoid being a victim.

Subtopic 1: What is a cybercrime? Supporting Facts: The use of digital information systems to conduct or facilitate illegal activity. Supporting Facts: Cybercrime has now surpasses illegal drug trafficking as a criminal moneymaker. Supporting Facts: Someone’s identity is stolen every 3 seconds Supporting Facts: Theft of personal data Supporting Facts: Copyright infringement

Subtopic 2: Classification of Cybercrime (Type 1, Type 2) Supporting Facts: Type 1: Any cybercrime that relates to theft or manipulation of data or service via hacking or viruses, identity theft, and bank or e-commerce fraud. Supporting Facts: Hackers often carry out Type 1 cybercrime by taking advantage of flaws in a web browser to place a Trojan horse virus onto the unprotected victims computer. Supporting Facts: Type 2 cybercrimes tend to be much more serious. Supporting Facts: Type 2 covers things such as cyberstalking and harassment, child predation, extortion, blackmail, stock market manipulation, complex corporate espionage, and planning or carrying out terrorist activities.

Subtopic 3: Prevention Supporting Facts: Keep your computer current with the latest patched and updates Supporting Facts: Make sure your computer is configured securely Supporting Facts: Choose strong passwords Supporting Facts: Protect computer with security software Supporting Facts: Protect your personal information Supporting Facts: Review credit report, and bank and credit card statements regularly

Subtopic 4: Laws against Cybercrime Supporting Facts: Computer Fraud and Abuse Act Supporting Facts: Identity Theft Supporting Facts: Wire Fraud, etc.

Conclusion: I have not come up with a conclusion yet. I believe it is best to gather all of the facts first, write the paper second and write my



References: Cybercrime. (2013). In C. Bates et al. (Eds.), Global social issues: An encyclopedia. London, United Kingdom: Routledge. Retrieved from http://ezproxy.apus.edu/login?url=http://search.credoreference.com.ezproxy2.apus.edu/content/entry/sharpesi/cybercrime/0 Dell. (n.d.). Top 10 Steps To Help Stop Cybercrime. Retrieved from http://www.dell.com/downloads/ca/support/top_10_steps_to_protect_against_cybercrime_dell_en.pdf Jarrett, H. (n.d.). Prosecuting Computer Crimes. Retrieved from Office of Legal Education Executive Office for United States Attorneys website: http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf Norton. (n.d.). Cybercrime - The Definition of Cybercrime | Norton. Retrieved May 14, 2015, from http://us.norton.com/cybercrime-definition/promo RCMP. (2012, October 4). Top 10 Cyber Crime Prevention Tips - Royal Canadian Mounted Police. Retrieved May 14, 2015, from http://www.rcmp-grc.gc.ca/tops-opst/tc-ct/cyber-tips-conseils-eng.htm

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Research Paper Outline

    • 824 Words
    • 3 Pages

    A. Lee Harvey Oswald went to the Soviet Union during a time of terrorism between the Soviet Union and the United States also known as “The Cold War”.…

    • 824 Words
    • 3 Pages
    Good Essays
  • Better Essays

    research paper outline

    • 1471 Words
    • 6 Pages

    This evaluation will determine the reliability of the narrator, how Connie’s sense of entitlement affects her as a narrator and point of view, and the historical events that inspired the author.…

    • 1471 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Many cases of data and identity thefts only show the vulnerability of Americans in terms of the protection of their personal data. With the purpose of addressing these challenges, St. Louis County is responsible to play a part in protecting the country by the enforcement of a cyber-crime unit that is able to assist government institutions, businesses, and citizens to fight against cyber terrorism. The thought is that this will develop into a larger defense strategy which can be linked with other agencies like local law enforcements agencies, police departments, DHS, CIA, ATB, ICE, and FBI. The three most risky cybercrimes affecting citizens in the St. Louis County are known to be sexual solicitation, identity theft, and cyber-attacks affecting individual computers or the networks. In order to protect the county from these crimes the police commissioner has been me to put together and build a special cyber-crime task…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Since cybercrime operates across a network via many countries and individuals seeking to do harm, this means that there is a collective need for something to be done. There are organizations like the National Crime Prevention Council that seek to combat criminal activity that takes place both in the public and private sectors, but this is on a national level - not a local level. As such, there needs to be more of collective emphasis on creating groups that seek to handle cybercrime at the communal level. This seems to be lacking despite the growing amount of issues that cybercrime causes - and the fact that it is a transnational problem that needs solving. In addition to this, local law enforcement agencies can become involved in dealing with this transnational issue in order to ensure that cybercrime is stopped as quickly as possible.…

    • 1442 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    An international team of researchers has achieved a scientific milestone by unraveling for the first time the genetic code of an entire human chromosome.…

    • 1593 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Research Paper Outline

    • 616 Words
    • 2 Pages

    In the United States alone sixty-eight percent of all Americans are over weight, thirty-three percent are obese, and five percent of all Americans have extreme obesity (Business Insider). Although one-third of Americans are the healthy amount of weight, two-thirds of all Americans are over weight and fast food is the reason. The three reasons are that meal portions are too large, the meals are too full of calories, and there are too many locations of restaurants.…

    • 616 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Uniform Crime Report

    • 1797 Words
    • 8 Pages

    Cited: Atlas, N. (2011, January 26). Summary of the Uniform Crime Reporting Program. Retrieved October 5, 2012, from Summary of the Uniform Crime Reporting Program: http://www.nationalatlas.gov/articles/people/a_crimereport.html…

    • 1797 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    research paper outline

    • 397 Words
    • 2 Pages

    A. Historical immigration overview: Immigrants leave behind family, their home place, for a better life.…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “Policing in America today is at a crossroads as it looks towards the future, the old policing strategies are no longer suited to address the emerging threats and growth of electronic crimes arising from out of the growth and popularity of the Internet, these crimes include: online fraud, child pornography, embezzlement, economic espionage, privacy violations, computer intrusions, cyber--stalking or any other offences that occur in an electronic environment for the express purpose of economic gain or with the intend to destroy or inflict harm to another person or institution.” …

    • 2169 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays