Assignment 1: Cyber Computer Crime

Assignment 1: Cyber Computer Crime

Assignment 1: Cyber Computer Crime

Due Week 3 and worth 75 points

Create a 15-slide presentation or 10-minute video presentation using Kaltura in which you:

  1. Describe the responsibilities of the National Security Administration (NSA).
  2. Identify the four critical needs at the state or local level of law enforcement in order to fight computer crime more effectively.
  3. Explain how the U.S. Postal Service assists in the investigation and prosecution of cases involving child pornography.
  4. Discuss how and why the Department of Homeland Security (DHS) consolidated so many federal offices.
  5. Go to https://research.strayer.edu to locate at least three (3) quality references for this assignment. One of these must have been published within the last year. Note: Wikipedia and similar websites do not qualify as quality resources.

Presentation Pro Tips:

  1. Practice, practice, practice. Say it over and over again so that you come across cool and collected and your information isn’t lost in your nervousness or verbal stops (um, er, uh).
  2. PowerPoints should have only a single thought on each slide and complete sentences are not necessary. Sometimes a single word with a good graphic or just a strong graph is all you need.
  3. Use 18 point font or larger. (18 point font is the smallest that can be read from across the room.)
  4. Relax. You know the information. Now you’re just showing it.

Your assignment must follow these formatting requirements:

  1. This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required presentation length.

The specific course learning outcomes associated with this assignment are:

  1. Describe the criminology of computer crime.
  2. Explain the various digital laws and legislation in support of law enforcement.
  3. Use technology and information resources to research issues in information technology in criminal justice.
  4. Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style conventions.

 

  • TEMPLATE FOR ASSIGNMENT 1_HIS105_Prof. Stansbury

    Feel free to type on this template below and use it as the basis of your paper. Save it. Then, remove the TEMPLATE heading above and this paragraph. Then, once in ecree, you can do one of two things: 1) use the “upload” tool on the lower right and upload this document. 2) Or, you may copy/paste this document one paragraph at a time (and one source at a time) into the ecree platform. Whichever, method you use, get the paper in ecree first, THEN worry about arranging the ecree paragraph labels on the left of the screen and dealing with blank paragraph boxes, etc. Be sure your paper includes short in-text citations in the body of the paper, as well as the Sources list at the end. The FORMAT SAMPLE PAPER illustrates those things and gives many suggestions. The instruction sheet provides the list of sources from which you may draw; be sure the Schultz textbook is one of your sources. The instruction sheet also provides the two thesis statements—choose one of those.

     

    Your title. PART ONE: INTRODUCTION WITH THESIS (one paragraph):

     

    PART TWO—THREE SPECIFIC EXAMPLES (two paragraphs):

     

    PART THREE: DEALING WITH AN OPPOSING VIEW (one paragraph):

     

    PART FOUR: LEGACY and IMPACT TODAY–CONCLUSION (one paragraph):

     

     

    Sources

     

    1.

     

    2.

     

    3.

Technology & Critical Thinking Presentation

Throughout this course you have been learning about critical thinking in criminal justice. You have completed simulations and explained how critical thinking applied to each. Technology is a great resource to use and helpful in solving crimes. In this last assignment you are asked to show the relationship between critical thinking and technology in criminal justice.

Select a criminal justice agency, and review the influence of technology on the agency.

Create an 8-10 slide Microsoft® PowerPoint® presentation in which you:

  • Describe the use of technology within the agency you selected: for example, the use of computers, smartphones, and social media.
  • Evaluate how technology has enhanced the critical-thinking skills used by the agency.
  • Assess the advantages and disadvantages of using technology with creative thinking within criminal justice agencies in the 21st century.
  • Provide recommendations as to the use of technology to help the use of critical- and creative-thinking skills within the agency.

Include comprehensive speaker notes.

Format your speaker notes and any citations consistent with APA guidelines.

Click the Assignment Files tab to submit your assignment.

MUSIC APPRECIATION

The principles of unity and variety apply to all music, regardless of compositional style or historical period.

Now that you are familiar with the concepts in the first section of the course (Basic Musical Concepts), and you have seen how they work on different pieces of music, try your hand, mouse, and ears at how they operate in a music selection that you may not have heard yet:  “Manha de Carnaval” by Sigman and Bonfa.

Assignment #3 Audio:

Your analysis should include:

  • The number of different musical ideas in the piece (for example, can we say that there are two ideas A and B? Or is there only one?)
  • The timings (start and stop times) of the different sections of the piece. (Hint: Listen for changes in musical ideas and timbre, for example, points when different instruments come in or give way to others.)
  • How unity and variety are exemplified in those sections through the use of:
    1. Dynamics
    2. Timbre
    3. Pitch
  • Although there are sections that feature one instrument over others, whether you think this is a piece for a solo performer or for an ensemble.
  • A list of the characteristics of the musical style closest to the one this piece exemplifies. (Hint: Look at the last lecture in the first section of the course)
  • Whether you think this piece serves (or could serve) a specific purpose.
  • Whether or not it has any specific connotation(s) for you.

Comulative Risk Model

Instructions: Complete PART I and PART II below.

PART I

Instructions: Read through the scenario and respond to the questions below.

Lisa is accused of luring a group of men into a park where they are attacked by a criminal street gang. She is also a gang member and this is part of her initiation. She had a very strict upbringing and was physically abused by her older brother and father growing up. At age 13, she befriended some gang members who let her hang around with them. She started skipping school and committing petty crimes such as theft and burglary. Her gang got into a fight with a rival gang and she was injured, requiring stitches and X-rays. A police report was filed, although no charges were brought against her.

Upon further investigation, you learn that Lisa was enrolled in several honors classes in her freshman year of high school before she started skipping school to be with her gang. In order to gain entrance to the honors classes, she was tested by the school psychologist for intelligence (IQ) and personality traits to determine the best fit for her academically. She had an IQ of 120, which is highly intelligent. Her personality traits, however, revealed that she was outgoing, quick to anger, had problems with authority, and charming with her peers. She was sent to the school counselor to help her with anger management, but only attended three sessions before dropping out of school.

Using the Criminal Data Guide document and thinking about the cumulative risk model, respond to the following:

  1. What questions would you have asked to find out the information      regarding Lisa’s school history?
  2. What other types of information would be important to ask about      to further investigate this case?
  3. Does Lisa’s IQ play a role in her behavior? Explain using      psychological theories to support your response.
  4. What role does Lisa’s age play in predicting her future criminal behavior?      Are there developmental risk factors involved? Use psychological theories      to support your rationale.
  5. Based upon psychological theories, what interventions might have      prevented or reduced the likelihood of Lisa’s behavior?

PART II

Instructions: Read the scenario below and respond to the questions.

Grant is a 14-year-old male from a poor home. Both of his parents work opposite shifts to make ends meet. Since Grant in the oldest child, he is often tasked with watching his younger brother and sister. However, when his parents are home, they are frequently tired and unable to pay much meaningful attention to their kids. Grant has several friends at school that he is close to and they are all in advanced placement classes. The school measured Grant’s IQ at 115, making him smarter than most of his peers. He really does not have to study much to get good grades, so he hangs out with two other friends and drinks alcohol with them. He is not well-liked by most of his peers who make fun of him because he is tall, smart, and gangly in appearance. Sometimes, the only meal he eats is at school as part of the lunch program because his parents do not have the time to make dinner. Last week, he was arrested for hacking the school’s computer system to change a few grades for his friends. Although never charged, he also hacked into a chain of local gas stations’ computer systems and tried to change gas prices, mainly because he was bored.

Using the Criminal Data Guide document and thinking about the cumulative risk model, respond to the following:

  1. What risks does Grant have according to the cumulative risk      model?
  2. How might these risks be realistically reduced?