Research Paper Instructions (3 components/individual assignments)
Find a cybercrime incident that has occurred within the past few years (no older than the last
3 years) which has been highly publicized in the news (domestic or international). In a 5-10
page APA-formatted paper, provide a summary of the incident as it has been reported in the
public domain (about 1 page). Highlight what components to the case that specifically make
this a cyber crime, as opposed to a non-cybercrime (about 1/2 page). Discuss what aspects
of this cybercrime are old wine, as described Dr. Kirwans video to watch for this week,
or
alternatively, if this could legitimately be considered a new wine (about 1/2 page). For the
remaining pages, discuss which theory of crime (as described in the readings/videos for the
course, or other outside resources you identify) best explains the possible motivation for the
cybercriminal(s) in your case, ensuring you fully explain the connection between the details
and summary of the case and the theory you are choosing, including going into detail about
the typology/taxonomy of the cybercrime and details directly conceptualizing the victim(s) of
the cybercrimes that facilitated their victimization (as described in the readings throughout the
course).
Research Paper Assignment 2: Theories of CrimeFirst Draft (due by the end of Week 4)
Find a cybercrime incident that has occurred within the past few years (no older than the last
3 years) which has been highly publicized in the news (domestic or international). In a 5-10
page APA-formatted paper, provide a summary of the incident as it has been reported in the
public domain (about 1 page). Highlight what components to the case that specifically make
this a cyber crime, as opposed to a non-cyber crime (about 1/2 page). Discuss what aspects
of this cybercrime are old wine, as described Dr. Kirwans video to watch for this week,
or
alternatively, if this could legitimately be considered a new wine (about 1/2 page). For the
remaining pages, discuss which theory of crime (as described in the readings/videos for the
course, or other outside resources you identify) best explains the possible motivation for the
cybercriminal(s) in your case, ensuring you fully explain the connection between the details
and summary of the case and the theory you are choosing, including going into detail about
the typology/taxonomy of the cybercrime and details directly conceptualizing the victim(s) of
the cybercrimes that facilitated their victimization (as described in the readings throughout the
course).
–Due by Sunday, 11:59pm of Week 4 (or sooner)It wouldnt happen to me: Privacy concerns and perspectives following the Cambridge Analytica scandal. International Journalof Human-Computer Studies, 143(2020), 102498. The attack revealed over 530 million users personal information, underscoringthe serious weaknesses in social media companies’ data protection. An obvious, current example of a well-publicized cybercrime is this case
