Part one: Use the text, internet, and/or other sources and select an example of terrorists (either domestic or international) that have used technology to further their ideologies.
Explain specifically how the terrorist organization uses, or has used technology in their activities (or related to a specific event).
Provide a profile on the terrorist group including:
activities involving technology
any legal action taken against the organization
Explain the use of high tech evidence to support cyber crime cases
Part two: Perform a key word search on online identity theft and locate two cases involving online identity theft.
Summarize the facts of each case, including how:
the thief obtained the victim’s information
what the thief did with the information
the impact to the victim
Recommend at least 3 methods for each case that the victim could have used to prevent the theft.
Critique the tracking methods used to investigate the internet identity thefts.
Include both parts one and two in a single word document for submission.
Length should be at least 3.5 pages, excluding your cover and references page, in 10-12 point font (Arial, Courier, and Times New Roman are acceptable).
Viewpoint and purpose should be clearly established and sustained
Assignment should follow the conventions of Standard American English (correct grammar, punctuation, etc.).
Writing should be well ordered, logical, and unified, as well as original and insightful
Your work should display superior content, organization, style, and mechanics
Appropriate citation style should be followed
has been added to your cart!
have been added to your cart!
You must log in and be a buyer of this download to submit a review.