At: http://investigation.discovery.com/investigation/internet-cases/internet-cases.html, you will find 10 cases that involved Internet related crimes. Choose the one that interests you the most. If none of those interest you, you may choose a case from any category listed in Chapter 1 of the text. You are going to put yourself in the investigator’s shoes using the knowledge you have acquired during this course. Your investigation must include: •The type of computer crime •The Computer Law that was violated (Fed/state) •One of the following: ◦How the crime scene was secured ◦How the evidence was collected ◦How the evidence was analyzed – including the processes and what tools were used. •A formal report •How you would prepare for a deposition/trial The assignment should include the following: •An in-depth submission that should be free of spelling and grammar errors in APA format. • A powerpoint containing a minimum of 50 slides. •You will be assessed on the rationale you use in addressing the questions/issue posted, and how well you justify your argument regarding this issue. •Your response must be thought provoking, have well developed ideas and/or opinions, and should reference any supporting material from the text, lecture or other sources you have used to complete the assignment. You may use your text or the internet as a reference, but remember to cite your sources. Please be sure to submit your assignment.
https://blackboardmasters.com/wp-content/uploads/2019/11/logo2-300x75.png 0 0 Admin https://blackboardmasters.com/wp-content/uploads/2019/11/logo2-300x75.png Admin2021-04-23 13:34:142021-05-02 15:21:06How the evidence was analyzed – including the processes and what tools were used