100% (1)
page:
8 pages/≈2200 words
Sources:
-1
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 51.84
Topic:

Actions to Take Under Information Transparency Society

Research Paper Instructions:

The following is my thesis statement for this reasearch paper: With the rapid development of network and computer technology, a new type of crime has also emerged. Cybercrime is a crime that involves a computer and a network to commit illegal activity (hacking, fraud, or theft) while violates individuals' privacy and the security of the data (United Nations Office on Drugs and Crime, 2019). Because we are living in an extreme information transparency society, cybercrime has now become the fast-growing criminal technique that affects millions of people every day. Being transparent means that our personal information even our behaviors can be track through the social network or devices we own. Over such condition, can we protect ourselves from being a victim of cybercrime while having privacy?

 

Final Research Project


Students must prepare a research project on an information-related topic of their choice.  Some ideas for a project include: social networking and privacy issues; digital divide and rural areas; texting and driving, self-driving cars, cybersecurity etc.  

Late submissions will not be accepted unless there is a University approved excuse.

The final project must include:

1. The title of the topic you are writing about.
2. A brief description of the topic at the beginning of the write-up.
3. Citations with annotations for the sources of information.  See the grading rubric for the number of citations and the source of the information.  The format for the citation is the APA style.
4. Sources should include one or more of the following:
A book or book chapter
One online dictionary entry with the definition of one of your key words or phrases
Three articles from a scholarly journal
One article from a newspaper
Authoritative Web pages
A statistical resource using the a statistical database
An authoritative podcast or web video
Governmental data sources (.gov)
For other sources check with professor 

5. The final paper must be at least 8 pages of content not more than 10.  This is NOT INCLUDING a cover page and the citations page.
6. The final paper must also include 3 visuals in the form of charts, tables, graphs or other visual that shows data or information to support a point in your paper.  The visuals must take no more than 1/3 of the page.  Larger visuals must be reduced in size to fit to 1/3 of the page.

We will discuss various aspects of this research project extensively in class, and most of the homework assignments will assist in researching or preparing this research project. 

Your next three assignments will be as follows:
Assignment #1: choose your topic and write your thesis statement.  The statement should be 1 – 2 paragraphs and should be specific enough so that you can research the topic present good information and have a persuasive argument supporting the thesis.

Assignment #2: Outline your final paper.  You will be given an example of an outline that will assist you in developing the main body of your final paper.

Assignment #3: Select your sources.  Your sources of information will help support your thesis and make the fact-finding mission easier as you develop your paper.



Research Paper Sample Content Preview:

Actions to Take Under Information Transparency Society
Name:
Institution:
Introduction
The rapid development of both computer technology and the network has made it possible for most people to be connected to the internet. In contemporary society, information and communication technologies are widespread, and all individuals and organizations are focused on digitization. It is essential to note that the development of computer technology has facilitated a new form of crime, cybercrime; this form of crime is carried out by using a computer or network to commit illegal activity. Ideally, cybercrimes may be undertaken for various reasons, for example, the cybercriminals may commit a crime with the goal of generating a profit, and they may also carry out the illegal activities to acquire information from unsuspecting computer users or damage their computer systems. The information transparency society has significantly contributed to the increase of cybercrimes, and it affects millions of people across the world. Information transparency means that individuals’ personal data, as well as, their devices can be tracked. This literature explores the widespread of cybercrimes in the modern society and ways that people can protect themselves from becoming the victims of cybercrime and maintain their privacy.
Cybercrime
In this age of information explosion, there is always likely to be a boom in the cases of cybercrime. There is actually a very close relationship between crime and technology. The increased sophistication of the globe due to technological innovations and inventions also bring about increased sophistication in cybercrime. The only difference between the increased sophistication and the ways of cybercrime is in the complexity of these aspects or the utilities used in either. However, the basic idea usually remains the same. The execution of these ideas also remains the same, and that is how the whole thing about cybercrime is also little.
Such a kind of phenomenon is what has continuously made cybercrime a rapidly evolving field of crime. The new hacks and techniques employed by the cybercriminals is rather quite ingenious and will continue to be so for as long as technology keeps evolving. Security agencies have their hands full, as they brace for even more of such activities in the present and in the future. It also acts as a wakeup call for the legal and justice system to come up with new legislations against cybercrime.
There are various forms of cybercrimes that individuals can suffer from for example include identity theft. Identity theft is one of the most common types of cybercrime around the globe. It involved stealing and mimicking of one’s persona. It occurs when the cybercriminals have access to one’s personal information and may use it to steal funds, gain access to other confidential information and participate in other forms of fraud. The criminals may infringe an individual’s privacy through the use of various strategies such as hacking passwords and usernames, accessing essential information from social media, and may also send phishing emails. Phishing mails usually mimic the actual appearances of the sites that individuals often log in, from mails to social media accounts. Once the user uses their personal credentials to log in, these malwares send it to the criminal, who then uses the information for their own fraudulent purposes.
Ransomware may also be used by the perpetrators of crime to lock valuable files that contain crucial personal information, and they demand a ransom to release the files (Federal Bureau of Investigation, 2020). Just like phishing mails, ransomwares also install themselves on the computer system through file downloads or flash disks connected to these systems. Once these malwares get into the systems, they then encrypt all the data in such a manner that the owner cannot even access it.
Most importantly, cyber stalking is also a significant cybercrime which necessitates online harassment where the victims are subjected to numerous messages and emails that are focused on intimidating and instilling fear. Besides, the criminals may also use phishing where they send malicious emails that are aimed at helping them to gain access to a personal computer where they can access essential information, and content can be used to blackmail them.
There are numerous criminal syndicates across the world that focus on the use of blackmail to demand for money from their victims. They utilize these cybercriminal techniques such as hacking, phishing and even jamming to demand for pay from these individuals out there. They utilize the sensitive information they get from these criminal activities to extort their targets. The main threat usually, is to either get paid or they release the sensitive information either to the public or to certain people. The same happens with companies, where firms are forced to kind of buy back their own sensitive data from these criminals, or else suffer the leakage of the same to their competitors.
Ideally, transparency is a critical issue in this era of computer technology. Information transparency entails making the information explicitly available to the intended users; often, confidential and transparency information may be made available to other individuals, and an organization would require it for decision-making processes (Turilli & Floridi, 2009). Customers engaging with business relationships with most companies and organizations in the current society are needed to give some of their personal information to the firm. In such situations, the company is responsible for ensuring that the privacy of the customers’ information is upheld, and this can be achieved by setting clear guidelines to determine who, how and when this information is used in the organization.
It is essential to comprehend that the number of data breaches reported every year from 2010 to 2019 has remained high, and since 2016, over a thousand cases of violations are reported. Figure 1 provides a summary of the number of breaches that have been reported since 2010. This is a clear testimony to the earlier discussion that as the years go by, more and more technological advancements are done, and so do the cases of cybercrime increase.
Figure 1 (Insurance Information Institute, 2020).
Vaccaro (2006) explains that customers’ confidential data should always be protected, and this is possible by limiting the practices that necessitate the use of sensitive information. It is essential to note that there are many companies that have failed to safeguard and secure the information of their customers by ensuring that it is not given to other parties without the consent of the owners’ consent. However, some companies, such as Facebook, have failed to safeguard the privacy of Facebook users. The firm, Facebook, has been accused of allowing cybercrime groups that are aimed at selling stolen credit card data, hacking tools, intensity information, and other cyber...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!