Papaer 1 - Research Paper Example

Comments (0) Cite this document
Cecilia Blay, a former teacher, seeks to explain the connection between the suicidal victims and their online suicide motivators. This…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Research Papaer 1
Read TextPreview

Extract of sample "Papaer 1"

Computer Crime Crime Summary The Dangerous Connections video illustrates the role that computer internet sources play in flaring suicidal endeavors of distressed victims. Cecilia Blay, a former teacher, seeks to explain the connection between the suicidal victims and their online suicide motivators. This follows a report of a successful suicide of a college girl called Nadi Kajouji. Investigations show that a friend she meets online entices her into committing suicide. The friend is a purportedly young nurse with the username, Cami D.
Cecilia discovers that there are over seven thousand websites that directly linking to suicides. She also discovers websites with people struggling to commit suicide. Cecilia then establishes an online chat with a 17 year old suicidal girl from South America. The girl is on a suicide trail with the enticement of a purportedly young nurse by the username, Li Dao. They make a concord to hang themselves together at a specific time in front of a webcam. As Cecilia later realizes, the nurse turns out to be a middle aged man named William. William masks himself as Cami D, Falcon Girl and Li Dao. The evidence provides a platform for inquiry into one of the most alarming computer crime syndicates.
Motivational Typology
The section expounds the basic connection between interactive motivational typology and the crimes perpetrated by the computer1. On a wider scale, the section elaborates the elements of humanity that can be enticed to motivate a suicide attempt. The motives for any criminal activity are dependent on a particular technology. There are psychological behavioral motives that motivate a criminal activity.
Power assurance is a behavioral motive that restores the poise of low-confidence individuals. They perpetrate criminal activities through online molestation and blackmailing of their victims2. Andrew Archambeau, a 32 year old male stalker, molests a lady she meets through an online dating cite. They meet personally and after the romance goes bad, Andrew molests her via emails. Profit driving motives are the source of most computer crimes. Offenders seek to gain from the computer crimes by defrauding their victims. In a case study, Vladimir Levin, a computer guru, defrauded a major bank of Russia funds through a fraud system. The motivators of suicidal computer crimes suffer from rage punitive, atrocious and devious behavioral motives.
The case of Andrew reaches the police attention. The police warn Andrew to seize her actions. However, he proceeds with the behavior. The assistant county prosecutor charges Andrew under the law of prowlers as a malfeasance3. Vladimir Levin case falls under the state laws of access for falsified drives. Computer crimes attract fines, probation and to a severe extreme, jailing. The penalty for computer crimes depends on the nature of the crime. Computer crimes against the state are a felony and attract severe penalties. Minor crimes, for instance misdemeanor, attract a considerable amount of fine in most states.
Computer crimes are on the rise with the technological advancements in the current world. Courts require computer forensics to retrieve evidence for computer crime cases. Computer forensics decodes data in computer systems to act as evidence for computer crimes. This evidence is requisite in the court of law for sentencing of perpetrators of computer crimes. Technological advancement empowers criminals with the skill to use encryption techniques to cover their tracks. However, armature criminals with diminutive technological know-how fail to cover their trail. This provides the law with an upper hand of utilizing computer forensics to retrieve evidence for sentencing.
Work Cited
Casey, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Burlington: Elsevier Science, 2011.
Vacca, John R. Computer Forensics: Computer Crime Scene Investigation. Hingham, Mass: Charles River Media, 2005. Print. Read More
Cite this document
  • APA
  • MLA
(“Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 words. Retrieved from
(Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 Words)
Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 Words.
“Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Economics term papaer

...?Economics Term Paper Table of Contents Question One 3 Question Two 4 Question Three 5 Question Four 7 References 8 Question One It has been d that the Central Bank has instructed the commercial banks to transfer an extra of 0.5% in order to neutralize the easing of the monetary policy in the US. It was announced in order to encourage the currency from appreciating. There are various kinds of reserves that the bank needs to maintain. They are legal reserves, primary reserves, loan loss reserves and desired reserves among others. However, it is worthwhile mentioning in this case that the kind of reserves that was ordered by the Central Bank to the commercial bank has been the deposit reserves ratio. It would help in tightening... Term Paper...
4 Pages(1000 words)Term Paper

Assignment 1: Standards Research

...? Standards and organizations Number: Lecturer: Question There are many standards which have been set up to govern the operations of the internet. These standards have been used to manage the various enhancements that are seen to be effected from time to time. There are many standards and organizations that have been set to oversee the implementation of internet technologies. One of the standards organizations that have been set up is the IETF. This is the internet engineering task force. This is tasked with the various technologies which are set for use in the internet. There are various working groups in each standards organization. One of the working groups in the IETF is that of IPv6 Maintenance (6man). This is working group... Standards...
3 Pages(750 words)Assignment

Fundementals of communication term papaer

...?Essa Al-maadeed COMM 1011-02 Henry Archer April 12, Fundamentals of communication: Communicating Across Cultures Effects of cultural differences on communication have been significant in my immediate environment. Being a foreign student, I have had problems communication with people in the culturally diverse environment. Communicating my ideas and thoughts to peer and teachers has been difficult and I have in the process yielded to acculturation influence, shifting from my culture based communication approach to the applicable approach in my environment as I adjust to it. My visits to Qatar however realign my communication approach. Group discussions, video-calling, online chatting, and email writing are some of the communication...
4 Pages(1000 words)Essay

Fieldwork papaer

...on a first-name basis, with the permission of the interviewee. The whole set-up was very jovial, warm, and casual that no one seemed to want to be addressed too formally. A few asked “not to be quoted” on certain issues that they personally deem as sensitive, and to exercise balance on the overall research, it is decided that everyone would just be under a pseudonym, except for the Master Gardener Al Renner. It is expected to learn about the overall impact of a community garden to the community as a whole, and to the participating individuals. Questions to be considered are: 1) What is in it for the community?, 2) What is in it for me?, and 3) Is the effort to volunteer for such community work worth...
5 Pages(1250 words)Assignment

Concert performance review papaer

... Task: Concert performance review The music is Symphony No.5 in C minor Op.67" Beethoven. It is ical music played by an orchestra. One person leads the seated orchestra throughout the music. They sit in the shape of a semi-curve in a hall. One person in the orchestra is standing at the back. The orchestra consists of men and women. They are in black and white dresses. The leader of the orchestra is a man. The music takes approximately thirty-four minutes. The speed of the music is slow. The orchestra sometimes pauses, and the music goes down. The orchestra then comes up and picks the initial speed they had before lowering the speed. At some points during the music, the orchestra does not blow the instruments and quietness prevails...
2 Pages(500 words)Essay

Research Critique, Part 1

...MRSA Literature review user [Pick the Introduction The research intention is to find and inquire about the effectiveness of cohorting Methicillin-resistant Staphylococcus aureus (MRSA) disease hit patients. MRSA is a type of viral disease that is spread due to open wounds and unhealthy environment may contribute to this diseases. Many antibiotics can also increase the probability of MRSA disease in the human body. The research question is focusing on the question that ‘is cohorting the MRSA hit patients effective?’ ;useful or not in the perspective of patient outcomes; and is the cost of health measures taken in the treatment of the MRSA hit patients by cohorting decreased? Will the separation of these...
3 Pages(750 words)Essay

Research paper 1

...a certain limit. BioAssay In this experiment we would like to understand 2 primary things. Firstly, the physiological change induced by caffeine keeping in mind that the chemical is capable of altering heart rate and secondly, observes any behavioral changes in the organism if any. The environmental stressor that we would study here is caffeine, a stimulating drug that is known to be toxicant for some marine organisms at high levels. Significance Of This Research This research serves more than one purpose. Firstly, we will understand the toxicity of the chemical in shrimp and observe the affect on its life cycle. Shrimp is an important part of the marine ecosystem and food chain and if caffeine has any...
3 Pages(750 words)Research Paper

Research critique part 1

...Research Critique Research Critique Problem ment This research paper analyzes the nursing role in preventing chronic illnesses. The clinical problem that resulted into the research problem discussed in the paper is the increased prevalence of chronic diseases in the Australian population. It had not been known that primary health care plays a key role in preventing chronic illnesses. This is the area that contributes to the research question (Harris and Lloyd, 2008). The paper was done by the National Preventative Health Task Force on the role played by nurses in preventing the risk to chronic illnesses and mainly focusses on problems in the way individuals lead their lives. Several factors were assessed including alcohol, tobacco... and...
3 Pages(750 words)Term Paper

Unit 1 Assignment: Research

... Comparison between ADAAG Standards and UD Principles ADAAG standards UD Principles Interior Floor Surfaces Floor surfaces shall be stable, firm, slip resistant and glare-free. Tolerance for Error: The design minimizes hazards and the adverse consequences of accidental or unintended actions. Interior Floor Surfaces Floor surfaces shall not be heavily patterned. Carpet shall be low profile or low loop construction, directly glued to the subfloor. Equitable Use The design is useful and marketable to people with diverse abilities. Interior Doors Unless equipped with a power door operator, doors shall have level wheelchair maneuvering spaceon both sides of the door, and clear spacebeside the latch, as described... Comparison...
1 Pages(250 words)Essay

Reading Research Literature # 1

...Reading Research Literature Reading Research Literature Week 5 Type your answers to the following questions using complete sentences and correct grammar, spelling, and syntax. Click Save as and save the file with your last name and assignment, e.g.,NR439_RRL1_Smith. Submit to the Reading Research Literature #1 basket in the Dropbox by 11:59 pm MT Sunday at the end of Week 5. The guidelines and grading rubric for this assignment may be found in Doc Sharing. Title: RRL#1 Name: [replace this text with your name] Questions 1-5 pertain to: Cherlin, E. J., Curry, L. A., Thompson, J. W., Greysen, S. R., Spatz, E., Krumholz, H. M., & Bradley, E....
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Research Papaer 1 for FREE!

Contact Us