Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
Learning Goal: I’m working on a psychology multi-part question and need an explanation and answer to help me learn.Week 2: First Assault Line: Hacking, Malware, and Distributed Denial of Service (DDoS)Many people who explore the Internet do so with curiosity and honorable intentions. Often, they are surprised at how easily they can cross lines and enter private domains. Unfortunately, some people intentionally cross boundary lines by hacking into databanks, e-mail accounts, and other domains of service. Many individuals and companies have experienced hacking into their private e-mail servers. This form of hacking involves persons with personal, political, or financial agendas that can bring harm to others. Malware are sophisticated viruses used to obtain money illegally, steal identity information (e.g., bank PIN numbers or password information), and control computers primarily for spamming purposes. Some people are paid to write computer malware, and others do it because they like the challenge. Even more sophisticated attacks involve distributed denial of service (DDoS). This involves using multiple computers and Internet connections to attack a targeted source usually distributed via botnets. This form of malicious malware can force a targeted system to shut down and prevent it from providing services to its clients. Often people who engage in these types of cybercrimes do not appreciate or care about the consequences of their behavior, both legal and civil. They also do not grasp or care about the harm they cause others. This week, you will explore the impact of hacking and malware distribution as it relates to ethical and criminal behavior. You will examine a case study involving hacking and opine on motivations and intent. In addition, you will submit your career choice for the Final Project.Learning ObjectivesStudents will:Evaluate motivations of cyber experimenters and hackers
Analyze differences between cyber experimentation and cybercriminal behavior
Analyze ethical and moral considerations involved in hacking
Analyze career roles in cybercrime
Learning ResourcesREQUIRED READINGSWall , D. (2001). Crime and the Internet. New York, NY: Routledge.Crime and the Internet: Cybercrimes and Cyber-Fears, by Wall, D. Copyright 2001 by Routledge (UK) – Books. Reprinted by permission of Routledge (UK) – Books via the Copyright Clearance Center.“Cybercrimes and the Internet” (pp. 1–17)
Gialopsos, B. M., & Carter, J. W. (2015). Offender searches and crime events. Journal of Contemporary Criminal Justice, 31(1), 53–70. doi:10.1177/1043986214552608van Wilsem, J. (2013). Hacking and harassment—Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453. (Accession No. 000346577400002)Vishwanath, A., Harrison, B., & Ng, Y. J. (2016). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research. doi:10.1177/0093650215627483American Psychological Association. (2010). Ethical principles of psychologists and code of conduct. Retrieved from https://www.apa.org/ethics/code/principles.pdfAmerican Psychological Association. (2013). Specialty guidelines for forensic psychology. Retrieved from http://www.apa.org/practice/guidelines/forensic-ps…Fung, B. (2013). How many cyberattacks hit the United States last year? Retrieved from http://www.nextgov.com/security/2013/03/how-many-c…United States Government Accountability Office. (2013). Cybersecurity: National strategy, roles, and responsibilities need to be better defined and more effectively implemented. Retrieved from http://www.gao.gov/assets/660/652170.pdfDocument: Week 2 Case Studies (PDF)REQUIRED MEDIAThis American Life from WBEZ. (1995). Small scale sin [Audio clip]. Retrieved December 14, 2016, from https://www.thisamericanlife.org/radio-archives/ep…Note: The approximate length of this media piece is 62 minutes.OPTIONAL RESOURCESInternational Fraternity of Cybercrime Investigators. (n.d.-a). Carders and skimming: Turning credit card theft to cash [Video file]. Retrieved December 14, 2016, from https://www.cybercrimeinvestigators.com/videos/vid… Note: The approximate length of this media piece is 13 minutes.Discussion: Where Do We Draw the Line?The term hacking describes actions along a continuum between right and wrong. Individuals may engage in non-malicious hacking for entertainment or out of curiosity, not considering that, at some point, their actions become illegal. When determining the ethicality of a hacking case, consideration of the motivation and decision-making involved can aid in determining the illegality of the situation. In this Discussion, you will examine case studies and determine the motivations of these offenders. Where do they cross ethical and/or criminal boundaries? In addition, what are the characteristics of a situation that cause it to cross the threshold into illegal territory?Note: For this Discussion, you are required to complete your initial post before you will be able to view and respond to your colleagues’ postings. Begin by clicking on the Week 2 Discussion link and then select Create Thread to complete your initial post. Remember, once you click Submit, you cannot delete or edit your own posts, and you cannot post anonymously. Please check your post carefully before clicking Submit!To prepare for this Discussion:Read through the provided case studies.
Select one to analyze for the purpose of this Discussion.
BY DAY 3Post a response to the following:Explain the motivation of the offender(s) in your selected case study. Support your response.
Determine whether the act is a crime or innocent experimentation. Justify your reasoning.
Identify the ethical and moral considerations that need to be made when experimenting with hacking.
BY DAY 5Respond to at least two of your colleagues with a substantive, interactive discussion that continues through Day 7. Note: Support your post and response with references to the Learning Resources and/or other academic resources.SUBMISSION AND GRADING INFORMATIONGrading Criteria To access your rubric:Discussion RubricPost by Day 3 and Respond by Day 5To participate in this Discussion:Week 2 DiscussionProject: Part 1A: Final Project SelectionSubmit for approval your selection of a career role within the field of cybercrime. Also, submit 2–3 case studies from the headlines, a textbook, or an article that you will use in Part 2 of your Final Project. Note: Full case studies—not summaries—should be submitted. These case studies should outline a specific cybercrime (e.g., identity theft, extortion, child sexual exploitation, human trafficking) and provide enough details that a thorough analysis can be conducted. By the end of Week 3, your Instructor will either approve your submission of career role or ask for another choice. Your Instructor will also select one of the 2–3 cases for you to use in your Final Project.BY DAY 7Part 1A of this Project is due.SUBMISSION AND GRADING INFORMATIONTo submit your completed Project for review and grading, do the following:Please save your Project using the naming convention “WK2Proj+last name+first initial.(extension)” as the name.
Click the Week 2 Project Rubric to review the Grading Criteria for the Project.
Click the Week 2 Project link. You will also be able to “View Rubric” for grading criteria from this area.
Next, from the Attach File area, click on the Browse My Computerbutton. Find the document you saved as “WK2Proj+last name+first initial.(extension)” and click Open.
If applicable: From the Plagiarism Tools area, click the checkbox for I agree to submit my paper(s) to the Global Reference Database.
Click on the Submit button to complete your submission.
Grading Criteria To access your rubric:Week 2 Project RubricCheck Your Project Draft for AuthenticityTo check your Project draft for authenticity:Submit your Week 2 Project draft and review the originality report.Submit Your Project by Day 7To submit your Project:Week 2 ProjectWHAT YOU CAN EXPECT:A high quality explanation and answer with in your time limitQuick responsive communicationOriginal explanations and answers with any outside resources cited
