Title: What is the Punishment for Cyber Crimes?
Enver Buçaj. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law. Acta Universitatis Danubius: Juridica 13.1 (2017): 140161. Print.
According to Enver (2017) Cyber security remains a challenge at a national State level despite the fact that stakeholders recognize the cyber threat. However, the fact remains that cybercrime involves numerous principles of international law but unfortunately much of international laws are not clear on addressing cybercrimes so many principles of international laws were developed before cybercrime emerged.
There are conflicting national criminal laws that are considered acceptable as long as the crime remained in low scale and was limited. It came down to a country’s decision whether to incriminate the cybercrimes being a matter within the discretion of national since the consequences of that will only affect those who live within the borders of that country. An example by Enver (2017) was anyone can visit a web-page site in France not realizing that his or her communication travels through Japan and Brazil to get there. This example shows the complications of cybercrimes and why it is vital an international law is created to punish these acts.
Jetha, K. (2013). CYBERCRIME AND PUNISHMENT: AN ANALYSIS OF THE DEONTOLOGICAL AND UTILITARIAN FUNCTIONS OF PUNISHMENT IN THE INFORMATION AGE. Proceedings of the Conference on Digital Forensics, SecurityandLaw,,17-22.Retrievedfromhttps://search-proquest-com.ezproxy1.apus.edu/docview/1508544624?accountid=8289
According to Jetha (2013) criminal legislation has remained relatively stagnant. Work in cybercrime can be divided into two types: the first and most common type is basically a migration of real-world crimes to cyberspace. The second kind is specifically defined cyber offenses like hacking or distributing malicious software. Unfortunately, it is the first type that legislation establishes cybercrime as a distinct field and has fallen behind in changes to technology. Due to this, crimes like hacking the defendants are often charged with fraud, which has been in place since the late 1800s.Each student will be required to complete the term project, which is a research proposal written in an APA Style. The project should be about 8 double spaced pages, not counting the cover and reference page or annotated bibliography/appendix. Don’t forget to include a Cover Page, an abstract and a list of references. The research proposal you write in this course will NOT be sent to the IRB for approval. This is because you will not be conducting actual research for the purposes of this class. You will however gain an insight as to how to write a research proposal.
Each student will be required to complete a research proposal, as the term project. The research proposal will include the following:
Title page
Abstract (100-120 words)
Introduction
Hypothesis/Problem Statement/Purpose Statement
Definitions included in research
Literature Review organized around variables.
Research methods/design (this can be a proposal to collect original research or a proposal to organize and categorize secondary data into your own variables)
References/Works Cited
Appendices – as needed (annotated bibliography, example consent form, example survey if used)
The research proposal (Term Project) must be in a Word Document (.doc) uploaded to the assignment section. Students will be required to use at least five scholarly references in their work.
Students are required to follow APA Style guidelines.
Please make sure that you are using the course-writing rubric to use as a checklist so that you write a solid paper.
Do not include quotes in your work. The student needs to display good critical thinking skills and not a string of quotes written by published authors. Your proposal is what is needed for a successful research project to be conducted in the future.
** I have already chosen a topic and sources so the paper must be something about Cyber Crime Punishment. I have added the sources that need to be used as well**
Recent Comments