Exploration of cybercrime as changing threat to international security
• Aims.
This study seeks to analyze the dynamics of cybercrime inorder to understand how changing transnational criminal activities threatens international security. Further, this study aims to identify risks factors that follow certain strategic technological advancement, that should help improve anticipation of likely threats as well as help device effective counter measures.
• Objectives.
1. To investigate how the cyber platform is exploited in the process of advancing criminal goals.
2. To establish the far reaching impact of cybercrime activities.
3. To analyze cybercrime counter measures and the challenges of policing the cyber platform.
4. To evaluate changing cybercrime trends that could help prepare better for future threats.
• Content.
Use excellent grammar to engage in an academic debate analysing various theories relating to cybercrime and organised criminal organisation.
Critically analyse the push and pull factors that makes cybercrime attractive to transnational organised criminal networks.
Demonstrate good research ability and avoid being simplistic in your arguments and ensure your persuasions are academically justified and referenced – using Harvard referencing)
Use a coherent structure with a reference list that is extensive and from a mixture of resources (i.e. books, internet, Youtube, journals etc)
• Example of structure.
Title page
List of Contents
Declaration
Abstract
List of Figures
List of Tables
List of Abbreviation
Acknowledgement
Chapter 1
1.1. Introduction
1.2. Aims and Objectives
Chapter 2
2.1. Literature Review
Chapter 3
3.1. Introduction.
3.2. Analysis.
3.3. Traditional cybercrime threats (Online fraud, paedophilia, human trafficking etc).
3.4. Evolving cybercrime threats (Corporate hackings at Sony and data theft by wiki leaks etc)
3.5. Emerging cybercrime threats (Online radicalisations and cyber warfare etc).
3.6. Associated threats (threats to drone technology, and robotics or automated services).
3.7. Impact.
3.8. Evaluation.
3.9. Conclusion.
Chapter 4
4.1. Introduction.
4.2. Analysis.
4.3. Counter measures (International agreement, New Laws etc)
4.4. Impact (success and failures).
4.5. Evaluation.
4.6. Conclusion.
Chapter 5
5.1. Introduction
5.2. Analysis
5.3. Challenges (Lack of cooperation on cyber security between major powers i.e. US v Russia).
5.3. ii Lack of capacity (skills or resources) in the Developing world.
5.4. iii Rapid pace of technology change and advancement.
5.4. Impact
5.5. Evaluation
5.6. Conclusion
Chapter 6
6.1. Conclusion
Reference List
Bibliography
Appendices
Use the following coupon code :DUE