Discuss cybercrime topics and implications from a multidisciplinary/multi-viewpoint perspective.

engineering

Description

1.   Learning Outcomes

This assignment addresses the following learning outcomes from the module syllabus:

·         Critically evaluate methods and techniques used for cybercrime.

·         Investigate, summarise and review emerging technologies and their use in cybercrime.

·         Discuss cybercrime topics and implications from a multidisciplinary/multi-viewpoint perspective.

 

 

2.   Assignment Description

Anonymous technologies, the same way as other technologies, can be used for legitimate and illegitimate purposes. This assignment comprises two parts.

 

You may choose to investigate one specific class of anonymous technology (e.g., anonymous web browsing, anonymous P2P communication, anonymous emailing service, anonymous content distribution), one specific technique (e.g., onion routing, proxy server, mix network, remailer), or one specific application (e.g., Tor, I2P, Freenet, Mixmaster, Osiris Serveless Portal System).

 

The essay should contain a maximum of 1600 words – excluded the list of references, and should:

(i)             Summarise, in no more than 150 words how the chosen class, technique, or application works. Use references to provide deeper explanations and definitions.

(ii)            Discuss how the chosen class, technique, or application has been used by Internet users for legitimate purposes.

(iii)           Discuss how the chosen class, technique, or application has been used by cybercriminals (illegitimate purposes).

(iv)          Discuss and critically evaluate which measures can be adopted against the chosen anonymous technology used by cybercriminals.

(v)           Critically evaluate and discuss the literature, rather than simply regurgitating what you have read.

You have to interpret, reflect and be critical about what you read and about the sources you actually use.

(vi)          Contrast and compare the legitimate and illegitimate viewpoints (usages) of the chosen anonymous technology.

(vii)         Use in-text citations where neccessary, which should be in Harvard style[1].

 

 

There is no template to follow for the essay; it is up to you to make it look neat, logically structured and coherent. Also, remember that the language used should be specific, precise, objective, direct, and simple. You should not use colloquial language, should use your own words, and you are advised to use short sentences, appropriate for technical writing.    

 

         

 

3.   Submission

 

Learning to write concisely is an important skill to develop and is useful throughout your academic and professional career. Your mark will be penalised if you exceed the word counts or page limits.

·         For every 10% you exceed your word limit, you will have 10% of your marks removed until a maximum of 100%. Your word limit does not include references, but does include citations (quotes).

 

You should use Microsoft Word to complete this assignment. If you use a word processor other than Microsoft Word then you should check to ensure that the document layout is the same as Microsoft Word. The essay should be in a single column format with the default settings (font, margin, space) of MS Word. The submission should be done via Turnitin on Blackboard.

 

 

 

4.   Penalties for late submission

 

Except where an extension of the hand-in and/or discussion deadline dates have been approved (using extenuating circumstances forms), lateness penalties will be applied in accordance with University policy as shown in Table 1[2].



[1]Referencing guides (link to Anglia Ruskin University), https://www.uclan.ac.uk/students/library-it/faq/guides_forms.php  

[2] http://www.uclan.ac.uk/aqasu/academic_regulations.php


Related Questions in engineering category