Technology Influences Assignment Paper

Technology Influences Assignment Paper

How technologies have contributed to the increase in crime rates

Technologies have immensely contributed to the problem of increased levels of criminal activity.  Advances in computers, mobile apps, the internet and communication networks have been used by the criminals to commit crimes as digital child pornography, cyber-attack, espionage, online fraud, identity theft, hacking and intellectual property theft.   As Karake et al (2017) indicate, prior to the emergence of digital data, the world was predisposed to physical threats only. Advances in technology have resulted in more utilization of cyberspace, which has subsequently offered cybercriminals and users abundant opportunity to cause harm, either unintentionally or intentionally. Technology Influences Assignment Paper

Rapid technological advancements have generated both novel forms of crime as well as novel methods of investigations. Cybercrime offending may be legally and technically complex. Rapid advances in the operation of information communication technologies along with innate differences amid schemes of law internationally are challenges for forensic interrogators, investigating authorities, criminal justice administrators and prosecuting agencies. According to Karake et al (2017), several cybercrime criminals have escaped prosecution because substantive criminal laws are weak and fail to address technological schemes of offending.

Establishing the place where a crime occurred and overcoming the negative and positive conflict of legislation make it difficult for judicial officers, prosecutors, and police when drafting subpoenas and issuing warrants. Brown (2015) alleges that even in the presence of strong procedural and substantive criminal laws and concurrence with global instruments like the Budapest Convention, investigations might yield little if police are not competent and well equipped.  A majority of cybercrimes are well-conceived and sophisticated, needing police to use deductive reasoning and technological expertise to unravel intricate modus operandi and validate aspects of a crime.

ORDER A FREE -PAPER HERE

How I will propose technology be implemented into the solution

Cybercrime can be curbed through development of strategies and doctrines that engage all entities who have an understanding of information and communication to implement technical measures that can assist then build strong security for their data and systems and improve personal security along with the resilience of information communication technologies.  If a nation can offer support to the involved entities, cybercrime can be reduced or eradicated.

The key to developing strategies needed to curb cybercrime is the availability of resources and capability to develop hardware and software, to blend the constituents of strength, and the creation of functional devices.  As Cruz-Cuhna (2014) recommends, several technological solutions can be utilized to lessen cyber risks, including whitelisting anti-virus services, intrusion prevention systems and firewall at bot the gate-way and host level. Trojans along with other cyber risks may be utilized through the application of layering technologies, like transaction verification processes and two-factor authentication. Intrusion Prevention System signatures and indicators might also be useful in the detection and blockage of malware trojans. Technology Influences Assignment Paper

Crime activities with computer networks or computers may be anticipated through learning more on the origin and effect of cybercrime. Entities can hire information technology security consultants and individuals who are knowledgeable in the eradication of cybercrime. Header information in email threads may assist investigators to identify the source of communication and pinpoint where the suspect can be located also reveal personal details of the criminals and co-conspirators (Brown, 2015). During cybercrime investigations, investigation officers are always able to detect technology utilized in the commission of the offense but are not able to know the criminal who used the device as a result of full drive encryption or due to the usage of the device by more than one suspect. In such cases, surveillance through keystroke monitor together with hidden cameras might expose passphrases and recognize the offender.

References

Brown, C. (2015).  Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice. International Journal of Cyber Criminology, 9(1): 55-119.

Cruz-Cuhna, M.  (2014). Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. Pennsylvania: IGI Global.

Karake, Z., Shallhoub, R., & Ayas, H.  (2017). Enforcing Cybersecurity in Developing and Emerging Economies: Institutions, Laws and Policies. Northampton, MA:  Edward Elgar Publishing. Technology Influences Assignment Paper

Strayer_Writing_Standards

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
hiw 01
Pro service tips
How to get the most out of your experience with Nursing Papers Writer
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
Trustpilot
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat