Sign In
Not register? Register Now!
Pages:
8 pages/β‰ˆ2200 words
Sources:
Check Instructions
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 51.84
Topic:

Actions to Take Under Information Transparency Society

Research Paper Instructions:

The following is my thesis statement for this reasearch paper: With the rapid development of network and computer technology, a new type of crime has also emerged. Cybercrime is a crime that involves a computer and a network to commit illegal activity (hacking, fraud, or theft) while violates individuals' privacy and the security of the data (United Nations Office on Drugs and Crime, 2019). Because we are living in an extreme information transparency society, cybercrime has now become the fast-growing criminal technique that affects millions of people every day. Being transparent means that our personal information even our behaviors can be track through the social network or devices we own. Over such condition, can we protect ourselves from being a victim of cybercrime while having privacy?

 

Final Research Project
Students must prepare a research project on an information-related topic of their choice.  Some ideas for a project include: social networking and privacy issues; digital divide and rural areas; texting and driving, self-driving cars, cybersecurity etc.  
Late submissions will not be accepted unless there is a University approved excuse.
The final project must include:
1. The title of the topic you are writing about.
2. A brief description of the topic at the beginning of the write-up.
3. Citations with annotations for the sources of information.  See the grading rubric for the number of citations and the source of the information.  The format for the citation is the APA style.
4. Sources should include one or more of the following:
A book or book chapter
One online dictionary entry with the definition of one of your key words or phrases
Three articles from a scholarly journal
One article from a newspaper
Authoritative Web pages
A statistical resource using the a statistical database
An authoritative podcast or web video
Governmental data sources (.gov)
For other sources check with professor 
5. The final paper must be at least 8 pages of content not more than 10.  This is NOT INCLUDING a cover page and the citations page.
6. The final paper must also include 3 visuals in the form of charts, tables, graphs or other visual that shows data or information to support a point in your paper.  The visuals must take no more than 1/3 of the page.  Larger visuals must be reduced in size to fit to 1/3 of the page.
We will discuss various aspects of this research project extensively in class, and most of the homework assignments will assist in researching or preparing this research project. 
Your next three assignments will be as follows:
Assignment #1: choose your topic and write your thesis statement.  The statement should be 1 – 2 paragraphs and should be specific enough so that you can research the topic present good information and have a persuasive argument supporting the thesis.
Assignment #2: Outline your final paper.  You will be given an example of an outline that will assist you in developing the main body of your final paper.
Assignment #3: Select your sources.  Your sources of information will help support your thesis and make the fact-finding mission easier as you develop your paper.

Research Paper Sample Content Preview:

Actions to Take Under Information Transparency Society
Name:
Institution:
Introduction
The rapid development of both computer technology and the network has made it possible for most people to be connected to the internet. In contemporary society, information and communication technologies are widespread, and all individuals and organizations are focused on digitization. It is essential to note that the development of computer technology has facilitated a new form of crime, cybercrime; this form of crime is carried out by using a computer or network to commit illegal activity. Ideally, cybercrimes may be undertaken for various reasons, for example, the cybercriminals may commit a crime with the goal of generating a profit, and they may also carry out the illegal activities to acquire information from unsuspecting computer users or damage their computer systems. The information transparency society has significantly contributed to the increase of cybercrimes, and it affects millions of people across the world. Information transparency means that individuals’ personal data, as well as, their devices can be tracked. This literature explores the widespread of cybercrimes in the modern society and ways that people can protect themselves from becoming the victims of cybercrime and maintain their privacy.
Cybercrime
In this age of information explosion, there is always likely to be a boom in the cases of cybercrime. There is actually a very close relationship between crime and technology. The increased sophistication of the globe due to technological innovations and inventions also bring about increased sophistication in cybercrime. The only difference between the increased sophistication and the ways of cybercrime is in the complexity of these aspects or the utilities used in either. However, the basic idea usually remains the same. The execution of these ideas also remains the same, and that is how the whole thing about cybercrime is also little.
Such a kind of phenomenon is what has continuously made cybercrime a rapidly evolving field of crime. The new hacks and techniques employed by the cybercriminals is rather quite ingenious and will continue to be so for as long as technology keeps evolving. Security agencies have their hands full, as they brace for even more of such activities in the present and in the future. It also acts as a wakeup call for the legal and justice system to come up with new legislations against cybercrime.
There are various forms of cybercrimes that individuals can suffer from for example include identity theft. Identity theft is one of the most common types of cybercrime around the globe. It involved stealing and mimicking of one’s persona. It occurs when the cybercriminals have access to one’s personal information and may use it to steal funds, gain access to other confidential information and participate in other forms of fraud. The criminals may infringe an individual’s privacy through the use of various strategies such as hacking passwords and usernames, accessing essential information from social media, and may also send phishing emails. Phishing mails usually mimic the actual appearances of the sites that individuals often log in, from mails to social media acco...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!