SlideShare a Scribd company logo
1 of 2
Critical Thinking: What is Crime in the Cyber Realm?
(100 Points)
Kizza (2014) addressed network attacks and intrusions broadly
as “cybercrime” and attributed them largely to moral and ethical
deficiencies of the perpetrators. Lessig (2006) approached law
in the network largely in terms of computer “code” that defines
what can and cannot be done with the network. In other words,
Lessig found the issue of what is a crime and who bears
responsibility to be more ambiguous than does Kizza.
Search the Internet or Digital Library located on the Colorado
Platform to find two examples of activities that meet the
definition of cybercrimes. (The LexisNexis Academic database
in the Library provides searchable access to a wealth of news
articles and features.)
Then briefly summarize your examples and apply and criticize
Kizza’s (2014) and Lessig’s (2006) positions on what
constitutes a crime and who is responsible for the activities
described in your examples. Identify at least two of the stated or
unstated assumptions that underlie each of Kizza’s (2014) or
Lessig’s (2006) arguments and specify at least two practical
implications. Does Kizza’s (2014) or Lessig’s (2006) position
apply better to either or both of your examples?
Support your analysis by citing specific statements by these
authors or at least two outside sources. You might want to look
ahead to Lessig’s (2006) Chapter 3 for some more material.
Discuss and cite both course textbooks, (Kizza’s 2014)
Computer Network Security and Cyber Ethics
and Lessig’s (2006)
Code and Other Laws of Cyberspace,
and at least one additional credible, scholarly source to support
your analysis and positions.
Use APA style guidelines, citing references as appropriate.
Your paper should be two to three pages in length
. Before submitting your final version, be sure to submit a draft
version to the TurnItIn Checker on the Colorado Platform.
Support:
I will provide (
(Kizza’s 2014)
Computer Network Security and Cyber Ethics
and
Lessig’s (2006)
Code and Other Laws of Cyberspace
) Textbooks

More Related Content

Similar to Critical Thinking What is Crime in the Cyber Realm(100 Points).docx

Assignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docxAssignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docx
howard4little59962
 

Similar to Critical Thinking What is Crime in the Cyber Realm(100 Points).docx (11)

This week’s Critical Thinking assignment is based on the article
This week’s Critical Thinking assignment is based on the articleThis week’s Critical Thinking assignment is based on the article
This week’s Critical Thinking assignment is based on the article
 
Assignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docxAssignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docx
 
"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading
 
Argosy psy 303 module 5 assignment 1 lasa 2 society
Argosy psy 303 module 5 assignment 1 lasa 2 societyArgosy psy 303 module 5 assignment 1 lasa 2 society
Argosy psy 303 module 5 assignment 1 lasa 2 society
 
Argosy psy 303 module 5 assignment 1 lasa 2 society
Argosy psy 303 module 5 assignment 1 lasa 2 societyArgosy psy 303 module 5 assignment 1 lasa 2 society
Argosy psy 303 module 5 assignment 1 lasa 2 society
 
A Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification ToolA Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification Tool
 
Essay About Hockey In Tamil Language. Online assignment writing service.
Essay About Hockey In Tamil Language. Online assignment writing service.Essay About Hockey In Tamil Language. Online assignment writing service.
Essay About Hockey In Tamil Language. Online assignment writing service.
 
50 Informative Essay Introducti. Online assignment writing service.
50 Informative Essay Introducti. Online assignment writing service.50 Informative Essay Introducti. Online assignment writing service.
50 Informative Essay Introducti. Online assignment writing service.
 
The Myth of Free Information
The Myth of Free InformationThe Myth of Free Information
The Myth of Free Information
 
‘CodeAliker’ - Plagiarism Detection on the Cloud
‘CodeAliker’ - Plagiarism Detection on the Cloud ‘CodeAliker’ - Plagiarism Detection on the Cloud
‘CodeAliker’ - Plagiarism Detection on the Cloud
 
What happened to the Semantic Web?
What happened to the Semantic Web?What happened to the Semantic Web?
What happened to the Semantic Web?
 

More from taminklsperaw

David Freeman argues in Messy Desk Means Something’s Getting Do.docx
David Freeman argues in Messy Desk Means Something’s Getting Do.docxDavid Freeman argues in Messy Desk Means Something’s Getting Do.docx
David Freeman argues in Messy Desk Means Something’s Getting Do.docx
taminklsperaw
 
Database RetrievalThe goal of this assignment is to locate and use.docx
Database RetrievalThe goal of this assignment is to locate and use.docxDatabase RetrievalThe goal of this assignment is to locate and use.docx
Database RetrievalThe goal of this assignment is to locate and use.docx
taminklsperaw
 
Data Analysis—Small Group DiscussionAs a nurse engaged in evidence.docx
Data Analysis—Small Group DiscussionAs a nurse engaged in evidence.docxData Analysis—Small Group DiscussionAs a nurse engaged in evidence.docx
Data Analysis—Small Group DiscussionAs a nurse engaged in evidence.docx
taminklsperaw
 
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxCW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
taminklsperaw
 
Current Issue Critical ThinkingRead the following excerp.docx
Current Issue Critical ThinkingRead the following excerp.docxCurrent Issue Critical ThinkingRead the following excerp.docx
Current Issue Critical ThinkingRead the following excerp.docx
taminklsperaw
 

More from taminklsperaw (20)

Decision Making in Collegial Courts  Please respond to the followi.docx
Decision Making in Collegial Courts  Please respond to the followi.docxDecision Making in Collegial Courts  Please respond to the followi.docx
Decision Making in Collegial Courts  Please respond to the followi.docx
 
Debate ItAbsorption costing and other methods make it possible.docx
Debate ItAbsorption costing and other methods make it possible.docxDebate ItAbsorption costing and other methods make it possible.docx
Debate ItAbsorption costing and other methods make it possible.docx
 
DB #1, involves your reading Streaming Dreams” (2012). Therein, Joh.docx
DB #1, involves your reading Streaming Dreams” (2012). Therein, Joh.docxDB #1, involves your reading Streaming Dreams” (2012). Therein, Joh.docx
DB #1, involves your reading Streaming Dreams” (2012). Therein, Joh.docx
 
Data Warehouses and Network Infrastructure Please respond to the f.docx
Data Warehouses and Network Infrastructure Please respond to the f.docxData Warehouses and Network Infrastructure Please respond to the f.docx
Data Warehouses and Network Infrastructure Please respond to the f.docx
 
Data Warehouses and Network InfrastructureImagine that you are a.docx
Data Warehouses and Network InfrastructureImagine that you are a.docxData Warehouses and Network InfrastructureImagine that you are a.docx
Data Warehouses and Network InfrastructureImagine that you are a.docx
 
Data mining does not stand alone in businesses. It is unusually part.docx
Data mining does not stand alone in businesses. It is unusually part.docxData mining does not stand alone in businesses. It is unusually part.docx
Data mining does not stand alone in businesses. It is unusually part.docx
 
David Freeman argues in Messy Desk Means Something’s Getting Do.docx
David Freeman argues in Messy Desk Means Something’s Getting Do.docxDavid Freeman argues in Messy Desk Means Something’s Getting Do.docx
David Freeman argues in Messy Desk Means Something’s Getting Do.docx
 
Database RetrievalThe goal of this assignment is to locate and use.docx
Database RetrievalThe goal of this assignment is to locate and use.docxDatabase RetrievalThe goal of this assignment is to locate and use.docx
Database RetrievalThe goal of this assignment is to locate and use.docx
 
Data and Information  Please respond to the followingAnalyze the.docx
Data and Information  Please respond to the followingAnalyze the.docxData and Information  Please respond to the followingAnalyze the.docx
Data and Information  Please respond to the followingAnalyze the.docx
 
Data Analysis—Small Group DiscussionAs a nurse engaged in evidence.docx
Data Analysis—Small Group DiscussionAs a nurse engaged in evidence.docxData Analysis—Small Group DiscussionAs a nurse engaged in evidence.docx
Data Analysis—Small Group DiscussionAs a nurse engaged in evidence.docx
 
Darr writes, To transform the organization so that its culture is .docx
Darr writes,  To transform the organization so that its culture is .docxDarr writes,  To transform the organization so that its culture is .docx
Darr writes, To transform the organization so that its culture is .docx
 
Cyberwarfare has been in the mainstream discussion of cybersecurity .docx
Cyberwarfare has been in the mainstream discussion of cybersecurity .docxCyberwarfare has been in the mainstream discussion of cybersecurity .docx
Cyberwarfare has been in the mainstream discussion of cybersecurity .docx
 
Cut and paste a chart from the web explaining the trade balance betw.docx
Cut and paste a chart from the web explaining the trade balance betw.docxCut and paste a chart from the web explaining the trade balance betw.docx
Cut and paste a chart from the web explaining the trade balance betw.docx
 
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxCW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
 
Cybersecurity Organization policy135 words with 2 references per.docx
Cybersecurity Organization policy135 words with 2 references per.docxCybersecurity Organization policy135 words with 2 references per.docx
Cybersecurity Organization policy135 words with 2 references per.docx
 
Currently, most developed countries use a variation of Keyness poli.docx
Currently, most developed countries use a variation of Keyness poli.docxCurrently, most developed countries use a variation of Keyness poli.docx
Currently, most developed countries use a variation of Keyness poli.docx
 
Currents are important in marine ecosystems because they redistribut.docx
Currents are important in marine ecosystems because they redistribut.docxCurrents are important in marine ecosystems because they redistribut.docx
Currents are important in marine ecosystems because they redistribut.docx
 
Current Issue Critical ThinkingRead the following excerp.docx
Current Issue Critical ThinkingRead the following excerp.docxCurrent Issue Critical ThinkingRead the following excerp.docx
Current Issue Critical ThinkingRead the following excerp.docx
 
Daoism WorksheetComplete the following questions in detail. Answ.docx
Daoism WorksheetComplete the following questions in detail. Answ.docxDaoism WorksheetComplete the following questions in detail. Answ.docx
Daoism WorksheetComplete the following questions in detail. Answ.docx
 
DAOISM & CONFUCIANISMWEEK 4Cosmogony - Origin of the Universe.docx
DAOISM & CONFUCIANISMWEEK 4Cosmogony - Origin of the Universe.docxDAOISM & CONFUCIANISMWEEK 4Cosmogony - Origin of the Universe.docx
DAOISM & CONFUCIANISMWEEK 4Cosmogony - Origin of the Universe.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Critical Thinking What is Crime in the Cyber Realm(100 Points).docx

  • 1. Critical Thinking: What is Crime in the Cyber Realm? (100 Points) Kizza (2014) addressed network attacks and intrusions broadly as “cybercrime” and attributed them largely to moral and ethical deficiencies of the perpetrators. Lessig (2006) approached law in the network largely in terms of computer “code” that defines what can and cannot be done with the network. In other words, Lessig found the issue of what is a crime and who bears responsibility to be more ambiguous than does Kizza. Search the Internet or Digital Library located on the Colorado Platform to find two examples of activities that meet the definition of cybercrimes. (The LexisNexis Academic database in the Library provides searchable access to a wealth of news articles and features.) Then briefly summarize your examples and apply and criticize Kizza’s (2014) and Lessig’s (2006) positions on what constitutes a crime and who is responsible for the activities described in your examples. Identify at least two of the stated or unstated assumptions that underlie each of Kizza’s (2014) or Lessig’s (2006) arguments and specify at least two practical implications. Does Kizza’s (2014) or Lessig’s (2006) position apply better to either or both of your examples? Support your analysis by citing specific statements by these authors or at least two outside sources. You might want to look ahead to Lessig’s (2006) Chapter 3 for some more material. Discuss and cite both course textbooks, (Kizza’s 2014) Computer Network Security and Cyber Ethics and Lessig’s (2006)
  • 2. Code and Other Laws of Cyberspace, and at least one additional credible, scholarly source to support your analysis and positions. Use APA style guidelines, citing references as appropriate. Your paper should be two to three pages in length . Before submitting your final version, be sure to submit a draft version to the TurnItIn Checker on the Colorado Platform. Support: I will provide ( (Kizza’s 2014) Computer Network Security and Cyber Ethics and Lessig’s (2006) Code and Other Laws of Cyberspace ) Textbooks