Exploration of cybercrime as changing threat to international security

• Aims.
This study seeks to analyze the dynamics of cybercrime inorder to understand how changing transnational criminal activities threatens international security. Further, this study aims to identify risks factors that follow certain strategic technological advancement, that should help improve anticipation of likely threats as well as help device effective counter measures.

• Objectives.
1. To investigate how the cyber platform is exploited in the process of advancing criminal goals.
2. To establish the far reaching impact of cybercrime activities.
3. To analyze cybercrime counter measures and the challenges of policing the cyber platform.
4. To evaluate changing cybercrime trends that could help prepare better for future threats.

• Content.
Use excellent grammar to engage in an academic debate analysing various theories relating to cybercrime and organised criminal organisation.

Critically analyse the push and pull factors that makes cybercrime attractive to transnational organised criminal networks.

Demonstrate good research ability and avoid being simplistic in your arguments and ensure your persuasions are academically justified and referenced – using Harvard referencing)

Use a coherent structure with a reference list that is extensive and from a mixture of resources (i.e. books, internet, Youtube, journals etc)

• Example of structure.

Title page

List of Contents

Declaration

Abstract

List of Figures

List of Tables

List of Abbreviation

Acknowledgement

Chapter 1
1.1. Introduction
1.2. Aims and Objectives

Chapter 2
2.1. Literature Review

Chapter 3
3.1. Introduction.
3.2. Analysis.
3.3. Traditional cybercrime threats (Online fraud, paedophilia, human trafficking etc).
3.4. Evolving cybercrime threats (Corporate hackings at Sony and data theft by wiki leaks etc)
3.5. Emerging cybercrime threats (Online radicalisations and cyber warfare etc).
3.6. Associated threats (threats to drone technology, and robotics or automated services).
3.7. Impact.
3.8. Evaluation.
3.9. Conclusion.

Chapter 4
4.1. Introduction.
4.2. Analysis.
4.3. Counter measures (International agreement, New Laws etc)
4.4. Impact (success and failures).
4.5. Evaluation.
4.6. Conclusion.

Chapter 5
5.1. Introduction
5.2. Analysis
5.3. Challenges (Lack of cooperation on cyber security between major powers i.e. US v Russia).
5.3. ii Lack of capacity (skills or resources) in the Developing world.
5.4. iii Rapid pace of technology change and advancement.
5.4. Impact
5.5. Evaluation
5.6. Conclusion

Chapter 6
6.1. Conclusion

Reference List

Bibliography

Appendices

Get a 10% discount on an order above $50
Use the following coupon code :DUE