- CLICK HERE FOR HELP ON THIS PAPER…………………….
- Paper instructions:
1) Should employees have the right to the expectation of privacy while using an employer’s computer workstation? Why or why not? How far should an employer be able to take their investigation of off-work but online habits of employees? Should off-work but online behavior have an impact on employment? Why or why not? What is the difference between a hacker and a cracker?
2) In terms of securing data, what reasonable practices should consumers be able to expect when submitting personal information, such as credit card information, social security information, physical and e-mail addresses? How might P2P sites, such as Kazaa, create unforeseen problems with data security?
3) Compare and contrast the differences in Conventional Crimes and Internet Crimes. Should clear distinctions be made between the criminal activities that occur online as opposed to those that occur offline? Should clear distinctions be made in the consequences for those crimes? Why or why not? Provide an example of a case that contains the four elements of Internet criminal liability.
4) How should copyrighted material, such as music, be handled online? Should P2P sites, where music can be easily and freely downloaded, be made illegal? How might this be handled fairly for artists and consumers both?
CLICK HERE FOR HELP ON THIS PAPER…………………….
5) Provide the URL of at least one site that discusses the impact of the Internet on online criminal activities and provide a brief review of the information contained there. Did you learn anything new? Were you surprised by any of the information presented on the site? How will the Internet impact the future of crime and the solutions for combating it?
Internet CrimeWhile using an employer’s computer, employees have a right to the privacy as prescribed by universal human rights universally. This is because as an employee, one has her privet life that does not in way relate to activities of the work place. There are personal financial transactions that they may be involved in. if employers are able to interfere with the employees’ privacy, and then it may pose a security challenge if for instance the employer shares private information about employees with other people. If conducting off work investigations, the employer needs to restrict himself to matters that affect work and not the personal life of an employee. Off-work but online activities of employees will have an impact on employment if they discuss matters related to the job. These may be discussion about the financial activities to friends, the location of the company and the performance of the company. Al these may have negative impact to the company.CLICK HERE FOR HELP ON THIS PAPER……………………. According to Wall (2001), a hacker is proficient with programming and computers to an advance level that they can know what is coming in and out of a system while there is no illegality of their activities. On the other hand a cracker is a person who uses their computer proficiency for personal benefit against the law. Activities of a cracker may include, stealing data, distributing bank virus and changing bank accounts among others. Simply what a hacker does with his knowledge of computers is what can define him to be a cracker or not. It can therefore be said that all hackers are not crackers but all crackers are hackers. Many people use the two words interchangeably due to lack of information.CLICK HERE FOR HELP ON THIS PAPER……………………. When submitting data such as credit card information, consumers should be careful and end ensure that no recording or reproduction of the information is carried out. They should be cautious about who is asking for the information since it may lead to loss of funds in a scam. P2P sites cerate unforeseen problems since even fraudsters may access the site and collect information that they may use to cone many pole all over the world. In conventional crimes, one is bale to see whoever is committing the crime which can help in investigations. While, in internet crimes it becomes more difficult to have the physical evidence of the offenders. Clear distinction should be drawn between these two types of crimes since they occur in a different manner and may different number of people. The consequences of internet crime may affect a lot of people unknowingly compared to conventional crimes. The Wiki Leaks, a global website that offered to publish secret US government documents is a case that contains the four elements of Internet criminal liability. The site revealed thousands of details about the American war in Afghanistan Copyrighted materials such as music should be highly protected and all downloads disabled such that one can only be listened to the music. For downloading, one must be given the permission by relevant parties after paying for the song. P2P sites should be made illegal to curb piracy online. This should be done by developing a universal site that will be accessed after permission form a union of artists. The site, http://cyberwhitepaper.dpmc.gov.au/white-paper/protecting-and-promoting-australias-digital-economy/crime-online-threatening-confidence-in-the-digital-economyprovides information about the consequences of cyber crime. Form the site I learnt the devastative effects of cyber crime and I was surprised how serious the crime is. The internet is sophisticating the future of crime and a solution to this can be effective scrutiny of internet sites to curb criminal activities.ReferenceWall, D. (2001). Crime and the Internet. New York: Routledge.