Research Paper – Cyber Crime and the Collection of Digital Forensics Assignment | Professional Essay Writers

The instructions and my outline

 

Don't use plagiarized sources. Get Your Custom Essay on
Research Paper – Cyber Crime and the Collection of Digital Forensics Assignment | Professional Essay Writers
Just from $13/Page
Order Essay

Research Paper Instructions

TheResearch Paper will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well-planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.

 

This Research Paper will allow you to be exposed to technical literature for further exploration of the body of research as a whole, as well as enable you to practice navigating around it Thus, a well-written paper will show your ability, not only to research, but also to communicate via the written word. How well your document conforms to the required form and format will demonstrate your attention to detail and instruction.

 

Research topic:

 

Research some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commercial forensic packages that you think you would use for such crimes.What advantages are offered by commercial forensic packages? Are there any disadvantages to using them? If so, what are they?

 

 

Each paper must:

 

  • Have a lengthof 2,750–3,250 words (Note: the word count does not include words used in figures, tables,diagrams, or the bibliography);
  • Be formatted according to current APAformat;
  • Include figures, tables, or diagrams where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count);
  • Include an in-text citation whenever the source to which you refer is used;
  • Attribute quotes to the source obtained, but quotes must not makeup a significant portion of the body of the text;
  • Have in-text citations for each reference on the bibliography; and
  • Include at least 3 references in addition to the course textbook and the Bible.

 

Each paper must include these 4 sections:

 

  1. Research Topics:

What specifically do you want to learn about or prove as you do this research?

List the research topics that you included as at least 3–4 bullets in theResearch Paper Outline and Bibliography. Following each bullet, discuss the research topic in detail. Note: your paper must be focused to allow in-depth research.In this first section, the research topics are stated as bullets to help sharpen your focus and to ensure that your focus is maintained as the paper develops.

 

 

  1. Literature Search Results:

What do others say about this subject?

This section will show the depth of your research. All entries in your bibliography must be cited at least once in this section. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors’ ideas and concepts and must say from where they come. Often this is the largest section of the paper.The time to state your own ideas will come in the following section.

  1. Conclusions:

What have you learned from your research?

The purpose of this section is not simply to reiterate the previous sections, but for thoughtful reflection. Now is the time to state your own conclusions.In this section, each of the specific research questions you selectedin the Research Paper Outline and Bibliographymust be restated and directly answered, even if your conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. However, this does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.

  1. Bibliography:

Your paper must include at least 5 citations, 2 of which must be the course textbook and the Bible. Both the in-text citations and the accompanying bibliographic information must be in current APA format. You must cite professionally edited, peer-reviewed sources. They can be solely Internet-based or from print sources. Do not cite encyclopedias (online or otherwise) or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial, uncited research which will often lead you to acceptable sources). You must use resources with a specific technical focus on your topic.

 

Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 5.

 

 

 

 

 

 

 

Cyber Crime and the Collection of Digital Forensics

Advanced Topics in Computer Security

 

Cyber Crime and the Collection of Digital Forensics

Research Objectives

  • Briefly discuss the overall concept of digital crime and digital forensic evidence left behind.
  • Discuss the National Institute of Justice’s focus and involvement of child abuse, exploitation, domestic violence, and gambling.
  • Discuss the types of evidence these crimes leave behind, both digital and non-digital.
  • Discuss the forensic tools (packages) used for these crimes and the advantages and disadvantages of each through a systematic comparison.
  • Discuss the Biblical concept of sin, crime, evidence, and principles in which God tells us to live our lives.

Questions

  1. How has digital technology impacted the legal justice system when prosecuting criminal cases such as those involved with child and domestic abuse, exploitation, human trafficking, and gambling?
  2. What commercial forensic packages are available and what are the legal restrictions on using them?
  3. How are privacy laws impacted?
  4. What types of digital forensic evidence is admissible in court and how do different states vary?

 

References

Horsman, G. (2018). A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: A case study on Periscope. Journal of Information Security and Applications, 42, 107–117. doi: 10.1016/j.jisa.2018.07.009

Jones, B., Pleno, S., & Wilkinson, M. (2012). The use of random sampling in investigations involving child abuse material. Digital Investigation, 9. doi: 10.1016/j.diin.2012.05.011

Sanchez, L., Grajeda, C., Baggili, I., & Hall, C. (2019). A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM). Digital Investigation, 29. doi: 10.1016/j.diin.2019.04.005

 

https://www.digitalforensics.com/digital-forensics/data-evidence-acquisition

https://nij.ojp.gov/digital-evidence-and-forensics

https://nij.ojp.gov/library/publications/new-approaches-digital-evidence-acquisition-and-analysis

 

Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.