SlideShare a Scribd company logo
1 of 15
Running Head: THE CHANGING NATURE OF CYBER CRIME
1
THE CHANGING NATURE OF CYBER CRIME
2
The Changing Nature of Cyber Crime
Marquita Watkins
MBA5005 | Law & Ethics for Managers
South University - Online
July 31, 2019
Introduction
The human life has transformed gradually for quite a long time,
this includes the manner job is done, the way people interact
among other aspects of the human life. At the center of this
transformation and the changes in human life is the technology
which has developed and encouraged development in other
sectors of human life. Despite technology being so useful and
being the driving factors of so many changes that take place in
the human life, it has come with so many challenges and the
main one which has become the subject of this topic is cyber-
crime. Cyber-crime can be defined as the illegal or criminal
activities that are normally carried out by the use of computers
and the internet at large which may include hacking, piracy,
fraud, identity theft among many others. This topic has been
selected due to the ongoing debates on cyber-crime, how it
keeps on evolving and the general implication it has on
individuals and business organizations (Agustina, 2015).
The history of cybercrime goes back to the 1970s where it
began simply as hacking and have grown to be a serious threat
considering the complexity in the form it is taking in the
modern times. The issue has proved to be threatening and the
serious part is the fact that it is not getting any better, it keeps
on worsening day by day and in the modern world it is one of
the main issues organizations and individuals got to deal with.
There have been several cases that deal with cyber-crimes in the
recent times by various legal institutions. The transformation
and the fact that cyber-crime is taking a different angle which
has also motivated the changes in some laws that regulated the
crime level in the society. There are several cases that have
been handled that relate to cyber-crime. The changing nature
and the increasing number of cases in the modern cyber-crime is
the one reason why this topic was actually selected.
Literature Review
Cyber-crime has attracted a lot of discussions in various
platform both business as well as the legal dimension of this
practice. This has motivated many scholars to come up with
research studies hence the many literatures on this particular
topic. There are so many studies on the subject and it seems
majority have come up with a common result of study outcome.
Going by the recommendations of many scholars it is quite clear
that cyber-crime keeps on changing from time to time. One of
the findings that these literatures have revealed is that the level
of cyber-crime seems to hike with the development in
technology. As technology changes and gets more advanced,
the state of cyber-crime also changes.
More developed countries like the United States experience
many cases of cyber-crime, companies have been sued over the
years for not protecting the information from their clients which
end up in the hands of hackers. Earlier this year the CEO and
the whole management of Facebook was summoned to give a
report on how some vital data about the clients were exposed.
This was one of the most recent cases of cyber-crime. The
United States have come up with quite a number of laws that
help in governing cases that relate to cyber-crime. Initially the
main issue was hacking which was mainly in the organizations
but currently several researchers have found out that it has
changed and the crime are even directed towards individuals.
The crime has taken different dimensions due to the increasing
cases and the transformation that Cyber-crime seems to be
undergoing over the years (Arief, Adzmi & Gross, 2015).
There are several articles that have discussed this particular
topic one of those articles is the Understanding cybercrime:
Phenomenon challenge and legal response. This article has
pointed out an issue that cyber-crime has become so technical to
the point that technical measures alone do not solve the
problem, it has therefore been recommended that the law
enforcement should go ahead and carry out investigation and
even go ahead to process the results and come up with some
effective prevents the spread of this vice. One of the main areas
that have made this vice somehow quite complex is the fact that
the related adequate legislation has actually changed and
apparently this is the reason the level of importance of cyber
security crimes. This work of literature has as well pointed out
the fact that the issue of cyber-crimes is not only a national
problem instead it actually goes beyond boarders. There are
several cases of mails being sent across the global with illegal
content. This shows that this is an issue of global concern. The
article has clearly explained the international aspect of the
cyber-crime and even discussed the strategies that can actually
be employed to take control. The issue needs to be given
significant level of global attention, there are so many cases
that call for cooperation between countries in order to
effectively solve the problem. Cyber-crime touches several
areas including exposing the minors to harmful contents like
pornography, the organizations are made vulnerable among
others. This article recommended serious monitoring on the
technological arena because it is the motivating factor behind
the increase in cases of cyber-crime (Arief, Adzmi & Gross,
2015).
The other scholar who has looked into this issue was mainly
focusing on the cyber-crime more closely and looking into the
impact this vice has in the community in general. Cyber-crime
is one of the main problems that the current organizations and
the various legal institutions. The increase in cyber-crime all
over the world is being contributed to by the level of
technological development. In the modern world it is so easy to
get access to information through the mobile phones and
computers. The technological development has brought in
platforms like the social medias that has been embraced
significantly by the current generation. So generally there are
several articles and works of literature that have been written on
this particular subject. (Finklea & Theohary, 2015).
Laws and Regulations
There are several laws that have been set on this specific issue
of cyber-crime. This issue is so serious and it has adverse
implications in the society. This is one of the reasons the
governments together with other legislative bodies have come
up with laws that are meant to control the issues to do with
cyber-crime. The criminal s has increases and so are the cyber-
crime cases, it is therefore, important to have some proper law
to give a scale of judgement in the courts of law in relation to
criminal activities that relate to the computers and the internet.
According to United Nations conference on Trade and
Development, approximately 72% of the countries globally have
put in place cyber laws, and in the remaining 28%
approximately 9% have draft legislation, 18% have no
legislation on the same while 1% have completely no data. The
laws in this case are both for the developing and the developed
countries globally. It is clear that the issue takes a different
direction day by day and so it is important to have clear
guidelines legally to help the people in making relevant
decisions. The federal government came up with laws back in
the 1986. The Computer Fraud and Abuse Act (CFAA). Was
formulated to give the federal government a clear way of
dealing with the criminals. This law has been amended severally
considering the fact that the technology keeps on changing day
by day.
Conclusion
Cyber-crime cases are among the most common cases in the
various legal bodies, the various legal bodes have solved
summary cases that deal with the cases. The crime started back
in the 1970s as hacking but today it has advanced. The concept
is therefore that serious as it has implication on individuals and
the companies at large. Several research studies have been
organized to cover this topic and it is quite clear that this issue
is serious and has been covered in many works of literature
(Finklea & Theohary, 2015).
References
Agustina, J. R. (2015). Understanding cyber victimization:
Digital architectures and the
disinhibition effect. International Journal of Cyber
Criminology, 9(1), 35.
Arief, B., Adzmi, M. A. B., & Gross, T. (2015). Understanding
cybercrime from its stakeholders' perspectives: Part 1--
attackers. IEEE Security & Privacy, 13(1), 71-76.
Finklea, K. M., & Theohary, C. A. (2015, January). Cybercrime:
conceptual issues for
congress and US law enforcement. Congressional Research
Service, Library of
Congress.
1
Running head: INTERNET
7
INTERNET
IS Policies
The Earth is increasingly developing an environmental sense
awareness by bringing a new form of assessment that helps in
describing the many processes, investigations, and tests that are
taken with the aim of monitoring the environmental state, its
impact and the changes that any human action could obtain from
its quality. This paper will focus on a proposalof internet of
products on environmental monitoring.
In recent years, the wireless device proliferation has led to the
internet of thing rise which allows system connection and data
interchange between them. The aspect is the basic design of
system proposal which is based on internet of things for
monitoring some parameters of the environment like
temperature, pollution of air, humidity, the intensity of sunlight
and rain which is considered to be efficient and reliable. As a
result of the introduction of the mobile communication network
to the inaccessible areas, IoT built actual monitoring of the
parameters of the environment like temperature, sunlight, rain,
humidity, and air pollution has become more effective and has a
cost-effective solution. The proper monitoring of these
parameters by the use of an integrated system, it will help in the
agriculture in observing the healthy crop growths, industries to
guarantee the safe operating environment and healthy life in
towns (Fang, Da Xu, Zhu, Ahati, Pei, Yan & Liu, 2014). Several
based IoT application has been testified like monitoring of
pollution, management of wastes, quality of water and security.
Proposed system
The base of an environmental monitoring system is created by
the use of Arduino board of UNO which offers control and
handing out with the assist of ATmega microcontroller 328. The
network sensor comprises of various sensors to help in sensing
the key of environmental parameters like temperature, rain,
sunlight, humidity, and air pollution. The Arduino communicate
directly with a single sensor and gathers necessary data. The
availability of data provides it to perform a series of transfers
and processes the data to the Wi-Fi module server. The sensors
that are arranged and are used for monitoring actual
environmental data are DHT11 which is for humidity and
temperature sensor, MQ135 for the sensor of gas, KG004
module for the sensor for the drop of rain and RES-0276 for the
light dependent resistor. On the side of the server, API platform
id chose to provide support for various analyses of graphics
tools like MATLAB, Gauge, and Google. The tools improve the
visualization and analysis capabilities and offer a graphical user
interface which is better.
Implementation and system design
The main focus of IoT is based on system monitoring which
helps in track-keeping of environmental parameters like
humidity, temperature, sunlight, rain, and air pollution. The
design operates in actual environmental and collects data for
analysis. The explanation covers the sensor network creation,
electronic device, the requirements of functional software,
process development, programming, the testing and
implantation, and the final prototype product.
Sensor Design Network
The use of the sensor is the only way of getting the real sense of
the several parameters of the environment. The sensor design
network is an important section of the system as the final user
would depend on data given by these sensors only. Properly
designed and correctly calibrated network of the sensor will aid
the purpose. The temperature and humidity readouts sensor use
the digital signal acquisition temperature method reading
capture and suitable humidity sensing mechanism which ensures
long-term steadiness and consistency. DHT11 sensor consists of
a resistive type measurement of humidity component and a
negative temperature coefficient component measurement.
MQ135 which is for sensing of gas is sensitive to alcohol,
benzene, and smoke. The sensor is comprised of ceramic tube of
a micro Al2O3, tin oxide subtle layer, electrode gauging, and
heater which are made into a crust made by plastic and net of a
stainless brace. The radiator is promoted essential settings of
work for components of subtle work. The enclosed MQ135
contains six pins; four are used to collect signals, and the
remaining two used to provide heating current. MQ135 value of
resistance is diverse types and gases concentration.
Consequently, sensitivity adjustment is required when using this
component and as a result of this, detector calibration is
desirable. The KG004, a module for rain sensing, is a cost-
effective sensor and it operates through a sequence of
uncovered parallel traces on board which produces a variation
of electricity when falls or change in volume of water. LDR is
used for sensing light and is a resistive sensor whose resistance
shifts with the intensity of light that drops upon it. A decrease
in the resistive sensor increases the incident of the intensity of
light.
Development process and programming environment
The microcontroller in the board of Arduino is automated with
the IDE Arduino for linking to the sensor network, data reading
and lastly for conveying these data over Wi-Fi network after
pre-processing. For data storage on the side of the server, the
platform for ThingSpeak is used. ThingSpeak is an IoT open
source application and API to stock and recovers information
from things using the protocol of HTTP over the internet
through a local network area. ThingSpeak also allows for the
logging creation of sensor applications, submissions for
location tracking and a social network of things with informs of
status.
How environmental monitoring supports electronic commerce
The e-commerce future will focus on convenient and
diversification development. The competition will be more
powerful, a system of e-commerce consists of logistics,
inventory and electronic payment. In case of IoT technology is
used in numerous e-commerce aspects, e-commerce will
momentously enhance the efficiency of the system, for instance,
the cost of operation is reduced, improvement of the experience
of the customer, due to this, electronic commerce has got into a
new development phase (Lee & Lee, 2015). IoT is linked with
electronic commerce, and modern system IoT of e-commerce is
created.
Pros of Environmental monitoring
The IoT enables for automation and control of tasks that are
carried out daily by avoiding the intervention of human.
Communication of machine to machine helps in maintaining
processes transparency (Asghar, Negi & Mohammadzadeh,
2015). IoT also brings about tasks uniformity and maintenance
of quality service. There is a possibility of taking necessary
actions in emergency cases.
Reduced energy utilization and resources can be accomplished
by implementing this technology and keeping the device under
surveillance. In case of possible bottlenecks, damages and
failures to the system an alarm can be triggered to alert the
personnel. Thus, money is saved IoT by the use of technology.
The interaction between machines to machine offers better
efficiency. Thus, correct results can be quickly obtained. The
finding helps invaluable time-saving. The IoT allows people to
engage in other constructive jobs instead of repeating the same
tasks daily.
Almost all the technology’s applications conclude in
increased convenience, comfort and efficient management, thus
enhancing the quality of life.
Cons of environmental monitoring
All appliances of household, industrial machinery, services in
the public sector such as the supply of water and transport and
several devices which are all linked to the internet, more
information are accessible on it. The information is susceptible
to attack by hackers. It would be very catastrophic if
confidential and personal information is obtained by
unauthorized.
People's lives will be progressively controlled by technology
and will be reliable on it. The coming generation is now
addicted to technology for every small thing. People have
decided on how their everyday lives can systematize and
controlled by technology.
References
Asghar, M. H., Negi, A., & Mohammadzadeh, N. (2015, May).
Principle application and vision in Internet of Things (IoT).
In International Conference on Computing, Communication &
Automation (pp. 427-431). IEEE.
Fang, S., Da Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., & Liu,
Z. (2014). An integrated system for regional environmental
monitoring and management based on internet of things. IEEE
Transactions on Industrial Informatics, 10(2), 1596-1605.
Lee, I., & Lee, K. (2015). The Internet of Things (IoT):
Applications, investments, and challenges for
enterprises. Business Horizons, 58(4), 431-440.
The Internet of Things (IoT) Product Proposal Assignment
The Internet of Things allows objects to be sensed and
controlled remotely across existing network infrastructure,
creating opportunities for more direct integration between the
physical world and computer-based systems, and resulting in
improved efficiency, accuracy, and economic benefit.
The IoT products and solutions in each of these markets have
different characteristics:
Manufacturing:
By networking machinery, sensors, and control systems
together, the IoT intelligent systems enable rapid manufacturing
of new products, dynamic response to product demands, and
real-time optimization of manufacturing production and supply
chain networks.
Media:
The combination of analytics for conversion tracking with
behavioral targeting and programmatic media has unlocked a
new level of precision that enables display advertising to be
focused on the devices of people with relevant interests.
Environmental Monitoring:
Environmental monitoring applications of the IoT typically
utilize sensors to assist in environmental protection by
monitoring air or water quality, atmospheric or soil conditions,
and even the movements of wildlife and their habitats.
Development of resource-constrained devices connected to the
Internet also means that other applications like earthquake or
tsunami early-warning systems can also be used by emergency
services to provide more effective aid.
Infrastructure Management:
The IoT infrastructure can be used to monitor any events or
changes in structural conditions that can compromise safety and
increase risk. It can also be utilized to schedule repair and
maintenance activities in an efficient manner by coordinating
tasks between different service providers and users of these
facilities.
Energy Management:
It is expected that IoT devices will be integrated into all forms
of energy-consuming devices (switches, power outlets, bulbs,
televisions, etc.) and be able to communicate with the utility
supply company in order to effectively balance power
generation and energy usage.
Medical and Healthcare Systems:
IoT devices can be used to enable remote health monitoring and
emergency notification systems. These health monitoring
devices can range from blood pressure and heart rate monitors
to advanced devices capable of monitoring specialized implants,
such as pacemakers or advanced hearing aids. Specialized
sensors can also be equipped within living spaces to monitor the
health and general well-being of senior citizens while also
ensuring that proper treatment is being administered as well as
assisting people regain lost mobility via therapy.
Building and Home Automation:
IoT devices can be used to monitor and control the mechanical,
electrical, and electronic systems used in various types of
buildings (e.g., public and private, industrial, institutions, or
residential). Home automation systems, like other building
automation systems, are typically used to control lighting,
heating, ventilation, air conditioning, appliances,
communication systems, entertainment, and home security
devices to improve convenience, comfort, energy efficiency,
and security.
Transportation:
The IoT can assist in integration of communications, control,
and information processing across various transportation
systems. Application of the IoT extends to all aspects of
transportation systems (i.e. the vehicle, the infrastructure, and
the driver or user). Dynamic interaction between these
components of a transport system enables inter and intra
vehicular communication, smart traffic control, smart parking,
electronic toll collection systems, logistic and fleet
management, vehicle control, and safety and road assistance.
Large-scale deployments:
There are several planned or ongoing large-scale deployments
of the IoT to enable better management of cities and systems.
For example, Songdo in South Korea, a fully equipped and
wired smart city, is the first of its kind and near completion.
Nearly everything in this city is planned to be wired, connected,
and turned into a constant stream of data that would be
monitored and analyzed by an array of computers with little to
no human intervention. Another example of a large-scale
deployment is the one completed by New York Waterways in
New York City to connect all their vessels and be able to
monitor them live 24/7.
Pros and Cons of IoT
Note: Clickhereassisted audio provided to describe the “For” or
“Against” IoT image.
Assignment Directions:
Review the list of IoT product characteristics for various
markets. Select a market from this list: Manufacturing, Media,
Environmental Monitoring, Infrastructure Management, Energy
Management, Medical and Healthcare Systems, Boiling and
Home Automation, Transportation, or Large-scale Deployments.
Provide a five- to seven-page paper that includes the following
elements:
· Introduction
· Proposal of an Internet of Things product:
· What is the IoT proposed product?
· Provide the statement of need for the IoT product.
· What else is offered similar to the proposed IoT product in the
market?
· How is your proposed IoT idea better or different? Identify the
qualities that make the IoT product better or different than other
products.
· Description of your chosen market that could benefit from an
IoT product:
· Does the IoT product
· solve a problem for the market,
· enhance exiting processes,
· improve existing products, or
· provide a new product offering?
· Identify how the IoT product supports electronic commerce,
business-to-business electronic commerce, or business-to-
consumer electronic commerce in the market?
· Identification of both pros and cons for the proposed IoT
product (see the “Pros and Cons of IoT” diagram above).
· What are the pros of the proposed IoT product?
· What are the cons of the proposed IoT product?
· Conclusion
· Reference List
The Internet of Things (IoT) Product Proposal Assignment
· Must be five to seven double-spaced pages in length (not
including title and references pages) and formatted according to
APA style as outlined in the Ashford Writing Center (Links to
an external site.).
· Must include a separate title page with the following:
· Title of paper
· Student’s name
· Course name and number
· Instructor’s name
· Date submitted
· Must use at least three scholarly sources in addition to the
course text.
· The Scholarly, Peer Reviewed, and Other Credible
Sources (Links to an external site.) table offers additional
guidance on appropriate source types. If you have questions
about whether a specific source is appropriate for this
assignment, please contact your instructor. Your instructor has
the final say about the appropriateness of a specific source for a
particular assignment.
· Must document all sources in APA style as outlined in the
Ashford Writing Center.
· Must include a separate references page that is formatted
according to APA style as outlined in the Ashford Writing
Center.
Carefully review the Grading Rubric (Links to an external site.)
for the criteria that will be used to evaluate your assignment.

More Related Content

Similar to Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx

Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challengesijtsrd
 
Assignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAssignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAbramMartino96
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxSANSKAR20
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxjeanettehully
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxwlynn1
 

Similar to Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx (10)

Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
 
Assignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAssignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advance
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
 

More from jeanettehully

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docxjeanettehully
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docxjeanettehully
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docxjeanettehully
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docxjeanettehully
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docxjeanettehully
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docxjeanettehully
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docxjeanettehully
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docxjeanettehully
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docxjeanettehully
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docxjeanettehully
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docxjeanettehully
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docxjeanettehully
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docxjeanettehully
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docxjeanettehully
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docxjeanettehully
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docxjeanettehully
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docxjeanettehully
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docxjeanettehully
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docxjeanettehully
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docxjeanettehully
 

More from jeanettehully (20)

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx

  • 1. Running Head: THE CHANGING NATURE OF CYBER CRIME 1 THE CHANGING NATURE OF CYBER CRIME 2 The Changing Nature of Cyber Crime Marquita Watkins MBA5005 | Law & Ethics for Managers South University - Online July 31, 2019 Introduction The human life has transformed gradually for quite a long time, this includes the manner job is done, the way people interact among other aspects of the human life. At the center of this transformation and the changes in human life is the technology which has developed and encouraged development in other sectors of human life. Despite technology being so useful and being the driving factors of so many changes that take place in the human life, it has come with so many challenges and the main one which has become the subject of this topic is cyber- crime. Cyber-crime can be defined as the illegal or criminal activities that are normally carried out by the use of computers and the internet at large which may include hacking, piracy, fraud, identity theft among many others. This topic has been selected due to the ongoing debates on cyber-crime, how it keeps on evolving and the general implication it has on individuals and business organizations (Agustina, 2015). The history of cybercrime goes back to the 1970s where it began simply as hacking and have grown to be a serious threat considering the complexity in the form it is taking in the
  • 2. modern times. The issue has proved to be threatening and the serious part is the fact that it is not getting any better, it keeps on worsening day by day and in the modern world it is one of the main issues organizations and individuals got to deal with. There have been several cases that deal with cyber-crimes in the recent times by various legal institutions. The transformation and the fact that cyber-crime is taking a different angle which has also motivated the changes in some laws that regulated the crime level in the society. There are several cases that have been handled that relate to cyber-crime. The changing nature and the increasing number of cases in the modern cyber-crime is the one reason why this topic was actually selected. Literature Review Cyber-crime has attracted a lot of discussions in various platform both business as well as the legal dimension of this practice. This has motivated many scholars to come up with research studies hence the many literatures on this particular topic. There are so many studies on the subject and it seems majority have come up with a common result of study outcome. Going by the recommendations of many scholars it is quite clear that cyber-crime keeps on changing from time to time. One of the findings that these literatures have revealed is that the level of cyber-crime seems to hike with the development in technology. As technology changes and gets more advanced, the state of cyber-crime also changes. More developed countries like the United States experience many cases of cyber-crime, companies have been sued over the years for not protecting the information from their clients which end up in the hands of hackers. Earlier this year the CEO and the whole management of Facebook was summoned to give a report on how some vital data about the clients were exposed. This was one of the most recent cases of cyber-crime. The United States have come up with quite a number of laws that help in governing cases that relate to cyber-crime. Initially the
  • 3. main issue was hacking which was mainly in the organizations but currently several researchers have found out that it has changed and the crime are even directed towards individuals. The crime has taken different dimensions due to the increasing cases and the transformation that Cyber-crime seems to be undergoing over the years (Arief, Adzmi & Gross, 2015). There are several articles that have discussed this particular topic one of those articles is the Understanding cybercrime: Phenomenon challenge and legal response. This article has pointed out an issue that cyber-crime has become so technical to the point that technical measures alone do not solve the problem, it has therefore been recommended that the law enforcement should go ahead and carry out investigation and even go ahead to process the results and come up with some effective prevents the spread of this vice. One of the main areas that have made this vice somehow quite complex is the fact that the related adequate legislation has actually changed and apparently this is the reason the level of importance of cyber security crimes. This work of literature has as well pointed out the fact that the issue of cyber-crimes is not only a national problem instead it actually goes beyond boarders. There are several cases of mails being sent across the global with illegal content. This shows that this is an issue of global concern. The article has clearly explained the international aspect of the cyber-crime and even discussed the strategies that can actually be employed to take control. The issue needs to be given significant level of global attention, there are so many cases that call for cooperation between countries in order to effectively solve the problem. Cyber-crime touches several areas including exposing the minors to harmful contents like pornography, the organizations are made vulnerable among others. This article recommended serious monitoring on the technological arena because it is the motivating factor behind the increase in cases of cyber-crime (Arief, Adzmi & Gross, 2015). The other scholar who has looked into this issue was mainly
  • 4. focusing on the cyber-crime more closely and looking into the impact this vice has in the community in general. Cyber-crime is one of the main problems that the current organizations and the various legal institutions. The increase in cyber-crime all over the world is being contributed to by the level of technological development. In the modern world it is so easy to get access to information through the mobile phones and computers. The technological development has brought in platforms like the social medias that has been embraced significantly by the current generation. So generally there are several articles and works of literature that have been written on this particular subject. (Finklea & Theohary, 2015). Laws and Regulations There are several laws that have been set on this specific issue of cyber-crime. This issue is so serious and it has adverse implications in the society. This is one of the reasons the governments together with other legislative bodies have come up with laws that are meant to control the issues to do with cyber-crime. The criminal s has increases and so are the cyber- crime cases, it is therefore, important to have some proper law to give a scale of judgement in the courts of law in relation to criminal activities that relate to the computers and the internet. According to United Nations conference on Trade and Development, approximately 72% of the countries globally have put in place cyber laws, and in the remaining 28% approximately 9% have draft legislation, 18% have no legislation on the same while 1% have completely no data. The laws in this case are both for the developing and the developed countries globally. It is clear that the issue takes a different direction day by day and so it is important to have clear guidelines legally to help the people in making relevant decisions. The federal government came up with laws back in the 1986. The Computer Fraud and Abuse Act (CFAA). Was formulated to give the federal government a clear way of dealing with the criminals. This law has been amended severally
  • 5. considering the fact that the technology keeps on changing day by day. Conclusion Cyber-crime cases are among the most common cases in the various legal bodies, the various legal bodes have solved summary cases that deal with the cases. The crime started back in the 1970s as hacking but today it has advanced. The concept is therefore that serious as it has implication on individuals and the companies at large. Several research studies have been organized to cover this topic and it is quite clear that this issue is serious and has been covered in many works of literature (Finklea & Theohary, 2015). References Agustina, J. R. (2015). Understanding cyber victimization: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35. Arief, B., Adzmi, M. A. B., & Gross, T. (2015). Understanding cybercrime from its stakeholders' perspectives: Part 1-- attackers. IEEE Security & Privacy, 13(1), 71-76. Finklea, K. M., & Theohary, C. A. (2015, January). Cybercrime: conceptual issues for congress and US law enforcement. Congressional Research Service, Library of Congress. 1 Running head: INTERNET 7 INTERNET
  • 6. IS Policies The Earth is increasingly developing an environmental sense awareness by bringing a new form of assessment that helps in describing the many processes, investigations, and tests that are taken with the aim of monitoring the environmental state, its impact and the changes that any human action could obtain from its quality. This paper will focus on a proposalof internet of products on environmental monitoring. In recent years, the wireless device proliferation has led to the internet of thing rise which allows system connection and data interchange between them. The aspect is the basic design of system proposal which is based on internet of things for monitoring some parameters of the environment like temperature, pollution of air, humidity, the intensity of sunlight and rain which is considered to be efficient and reliable. As a result of the introduction of the mobile communication network to the inaccessible areas, IoT built actual monitoring of the parameters of the environment like temperature, sunlight, rain, humidity, and air pollution has become more effective and has a cost-effective solution. The proper monitoring of these parameters by the use of an integrated system, it will help in the agriculture in observing the healthy crop growths, industries to guarantee the safe operating environment and healthy life in towns (Fang, Da Xu, Zhu, Ahati, Pei, Yan & Liu, 2014). Several
  • 7. based IoT application has been testified like monitoring of pollution, management of wastes, quality of water and security. Proposed system The base of an environmental monitoring system is created by the use of Arduino board of UNO which offers control and handing out with the assist of ATmega microcontroller 328. The network sensor comprises of various sensors to help in sensing the key of environmental parameters like temperature, rain, sunlight, humidity, and air pollution. The Arduino communicate directly with a single sensor and gathers necessary data. The availability of data provides it to perform a series of transfers and processes the data to the Wi-Fi module server. The sensors that are arranged and are used for monitoring actual environmental data are DHT11 which is for humidity and temperature sensor, MQ135 for the sensor of gas, KG004 module for the sensor for the drop of rain and RES-0276 for the light dependent resistor. On the side of the server, API platform id chose to provide support for various analyses of graphics tools like MATLAB, Gauge, and Google. The tools improve the visualization and analysis capabilities and offer a graphical user interface which is better. Implementation and system design The main focus of IoT is based on system monitoring which helps in track-keeping of environmental parameters like humidity, temperature, sunlight, rain, and air pollution. The design operates in actual environmental and collects data for analysis. The explanation covers the sensor network creation, electronic device, the requirements of functional software, process development, programming, the testing and implantation, and the final prototype product. Sensor Design Network The use of the sensor is the only way of getting the real sense of the several parameters of the environment. The sensor design network is an important section of the system as the final user would depend on data given by these sensors only. Properly designed and correctly calibrated network of the sensor will aid
  • 8. the purpose. The temperature and humidity readouts sensor use the digital signal acquisition temperature method reading capture and suitable humidity sensing mechanism which ensures long-term steadiness and consistency. DHT11 sensor consists of a resistive type measurement of humidity component and a negative temperature coefficient component measurement. MQ135 which is for sensing of gas is sensitive to alcohol, benzene, and smoke. The sensor is comprised of ceramic tube of a micro Al2O3, tin oxide subtle layer, electrode gauging, and heater which are made into a crust made by plastic and net of a stainless brace. The radiator is promoted essential settings of work for components of subtle work. The enclosed MQ135 contains six pins; four are used to collect signals, and the remaining two used to provide heating current. MQ135 value of resistance is diverse types and gases concentration. Consequently, sensitivity adjustment is required when using this component and as a result of this, detector calibration is desirable. The KG004, a module for rain sensing, is a cost- effective sensor and it operates through a sequence of uncovered parallel traces on board which produces a variation of electricity when falls or change in volume of water. LDR is used for sensing light and is a resistive sensor whose resistance shifts with the intensity of light that drops upon it. A decrease in the resistive sensor increases the incident of the intensity of light. Development process and programming environment The microcontroller in the board of Arduino is automated with the IDE Arduino for linking to the sensor network, data reading and lastly for conveying these data over Wi-Fi network after pre-processing. For data storage on the side of the server, the platform for ThingSpeak is used. ThingSpeak is an IoT open source application and API to stock and recovers information from things using the protocol of HTTP over the internet through a local network area. ThingSpeak also allows for the logging creation of sensor applications, submissions for location tracking and a social network of things with informs of
  • 9. status. How environmental monitoring supports electronic commerce The e-commerce future will focus on convenient and diversification development. The competition will be more powerful, a system of e-commerce consists of logistics, inventory and electronic payment. In case of IoT technology is used in numerous e-commerce aspects, e-commerce will momentously enhance the efficiency of the system, for instance, the cost of operation is reduced, improvement of the experience of the customer, due to this, electronic commerce has got into a new development phase (Lee & Lee, 2015). IoT is linked with electronic commerce, and modern system IoT of e-commerce is created. Pros of Environmental monitoring The IoT enables for automation and control of tasks that are carried out daily by avoiding the intervention of human. Communication of machine to machine helps in maintaining processes transparency (Asghar, Negi & Mohammadzadeh, 2015). IoT also brings about tasks uniformity and maintenance of quality service. There is a possibility of taking necessary actions in emergency cases. Reduced energy utilization and resources can be accomplished by implementing this technology and keeping the device under surveillance. In case of possible bottlenecks, damages and failures to the system an alarm can be triggered to alert the personnel. Thus, money is saved IoT by the use of technology. The interaction between machines to machine offers better efficiency. Thus, correct results can be quickly obtained. The finding helps invaluable time-saving. The IoT allows people to engage in other constructive jobs instead of repeating the same tasks daily. Almost all the technology’s applications conclude in increased convenience, comfort and efficient management, thus enhancing the quality of life. Cons of environmental monitoring All appliances of household, industrial machinery, services in
  • 10. the public sector such as the supply of water and transport and several devices which are all linked to the internet, more information are accessible on it. The information is susceptible to attack by hackers. It would be very catastrophic if confidential and personal information is obtained by unauthorized. People's lives will be progressively controlled by technology and will be reliable on it. The coming generation is now addicted to technology for every small thing. People have decided on how their everyday lives can systematize and controlled by technology. References Asghar, M. H., Negi, A., & Mohammadzadeh, N. (2015, May). Principle application and vision in Internet of Things (IoT). In International Conference on Computing, Communication & Automation (pp. 427-431). IEEE. Fang, S., Da Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., & Liu, Z. (2014). An integrated system for regional environmental monitoring and management based on internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1596-1605. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
  • 11. The Internet of Things (IoT) Product Proposal Assignment The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy, and economic benefit. The IoT products and solutions in each of these markets have different characteristics: Manufacturing: By networking machinery, sensors, and control systems together, the IoT intelligent systems enable rapid manufacturing of new products, dynamic response to product demands, and real-time optimization of manufacturing production and supply chain networks. Media: The combination of analytics for conversion tracking with behavioral targeting and programmatic media has unlocked a new level of precision that enables display advertising to be focused on the devices of people with relevant interests. Environmental Monitoring: Environmental monitoring applications of the IoT typically utilize sensors to assist in environmental protection by monitoring air or water quality, atmospheric or soil conditions, and even the movements of wildlife and their habitats. Development of resource-constrained devices connected to the Internet also means that other applications like earthquake or tsunami early-warning systems can also be used by emergency services to provide more effective aid. Infrastructure Management: The IoT infrastructure can be used to monitor any events or changes in structural conditions that can compromise safety and increase risk. It can also be utilized to schedule repair and maintenance activities in an efficient manner by coordinating tasks between different service providers and users of these facilities. Energy Management:
  • 12. It is expected that IoT devices will be integrated into all forms of energy-consuming devices (switches, power outlets, bulbs, televisions, etc.) and be able to communicate with the utility supply company in order to effectively balance power generation and energy usage. Medical and Healthcare Systems: IoT devices can be used to enable remote health monitoring and emergency notification systems. These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants, such as pacemakers or advanced hearing aids. Specialized sensors can also be equipped within living spaces to monitor the health and general well-being of senior citizens while also ensuring that proper treatment is being administered as well as assisting people regain lost mobility via therapy. Building and Home Automation: IoT devices can be used to monitor and control the mechanical, electrical, and electronic systems used in various types of buildings (e.g., public and private, industrial, institutions, or residential). Home automation systems, like other building automation systems, are typically used to control lighting, heating, ventilation, air conditioning, appliances, communication systems, entertainment, and home security devices to improve convenience, comfort, energy efficiency, and security. Transportation: The IoT can assist in integration of communications, control, and information processing across various transportation systems. Application of the IoT extends to all aspects of transportation systems (i.e. the vehicle, the infrastructure, and the driver or user). Dynamic interaction between these components of a transport system enables inter and intra vehicular communication, smart traffic control, smart parking, electronic toll collection systems, logistic and fleet management, vehicle control, and safety and road assistance. Large-scale deployments:
  • 13. There are several planned or ongoing large-scale deployments of the IoT to enable better management of cities and systems. For example, Songdo in South Korea, a fully equipped and wired smart city, is the first of its kind and near completion. Nearly everything in this city is planned to be wired, connected, and turned into a constant stream of data that would be monitored and analyzed by an array of computers with little to no human intervention. Another example of a large-scale deployment is the one completed by New York Waterways in New York City to connect all their vessels and be able to monitor them live 24/7. Pros and Cons of IoT Note: Clickhereassisted audio provided to describe the “For” or “Against” IoT image. Assignment Directions: Review the list of IoT product characteristics for various markets. Select a market from this list: Manufacturing, Media, Environmental Monitoring, Infrastructure Management, Energy Management, Medical and Healthcare Systems, Boiling and Home Automation, Transportation, or Large-scale Deployments. Provide a five- to seven-page paper that includes the following elements: · Introduction · Proposal of an Internet of Things product: · What is the IoT proposed product? · Provide the statement of need for the IoT product. · What else is offered similar to the proposed IoT product in the market? · How is your proposed IoT idea better or different? Identify the qualities that make the IoT product better or different than other products. · Description of your chosen market that could benefit from an IoT product: · Does the IoT product · solve a problem for the market,
  • 14. · enhance exiting processes, · improve existing products, or · provide a new product offering? · Identify how the IoT product supports electronic commerce, business-to-business electronic commerce, or business-to- consumer electronic commerce in the market? · Identification of both pros and cons for the proposed IoT product (see the “Pros and Cons of IoT” diagram above). · What are the pros of the proposed IoT product? · What are the cons of the proposed IoT product? · Conclusion · Reference List The Internet of Things (IoT) Product Proposal Assignment · Must be five to seven double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.). · Must include a separate title page with the following: · Title of paper · Student’s name · Course name and number · Instructor’s name · Date submitted · Must use at least three scholarly sources in addition to the course text. · The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment. · Must document all sources in APA style as outlined in the Ashford Writing Center. · Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing
  • 15. Center. Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment.