Cyber law Assignment | Online Assignment

Sleepless in Seattle Assignment | Essay Help Services
June 15, 2020
Strategic Assignment | Online Assignment
June 15, 2020

Assessment 2a | Discussion
Overview
This assessment aligns to the following Subject Intended Learning Outcomes :
1.Explain and critically analyse the origins and structural design of the Internet insofar as it relates to cybercrime.
2.Differentiate and characterise types of cybercrime being perpetrated today.
5.Develop and participate in critical discussions on current cybercrime issues and threats.
NOTE that your responses MUST be taken from this subject only. You are allowed to discuss legal solutions (i.e. reference to case law, legislation and policy) from THIS subject only. You will not receive marks for solutions that are purely technical or that are from outside this subject (e.g. international treaties/conventions/law/police not discussed and/or do not feature in the lecture or reading materials).
Use this book as references to solve the question
• Jonathan Clough, Principles of Cybercrime. (Cambridge
University Press, 2nd ed, 2015)
https://books.google.com.au/books?id=3s13CgAAQBAJ&printsec=frontcover&dq=Jonathan+Clough,+Principles+of+Cyber
crime.+(Cambridge+University+Press,+2nd+ed,+2015)&hl=en&sa=X&ved=0ahUKEwi3mIf-
nd_jAhVbQH0KHfs8ArQQ6AEIKDAA#v=onepage&q=Jonathan%20Clough%2C%20Principles%20of%20Cybercrime.%20(Ca
mbridge%20University%20Press%2C%202nd%20ed%2C%202015)&f=false

Instructions
Assessment 2a asks you to consider the content across Modules 1 to 5 through the lens of a complex question.
Modules of the Clough textbook (1 to 5) Chapter

Don't use plagiarized sources. Get Your Custom Essay on
Cyber law Assignment | Online Assignment
Just from $13/Page
Order Essay
  1. Cybercrime Chapter 1
  2. Computer as target Chapter 2
  3. Fraud
    Chapter 7
  4. Criminal copyright infringement and ‘Spam’
    Chapter 8 & Chapter 9
  5. Harassment
    Chapter 12

You are required to submit discussion post (2a). You MUST choose your words carefully and make your submission thoughtful and grounded in the subject materials for this subject only. See note above.
Question The Internet was designed to be ‘open’ with distributed control and mutual trust among users. Some believe that this design has led to new security threats. How can we address this threat through law/policy while retaining the ‘openness’ of the Internet?

Inherent in each of the questions is the need to consider the three contexts of: the ‘origins’, the ‘current’ and the anticipated ‘next’. Use the question to guide your critical analysis, differentiation, categorisation and overall explanation of the range of content within Module 1-5, and to develop and share critical discussion on cyber law with your student peers.

While formulating your posts, aim to achieve:

  1. General/overall quality approach to development and sharing of quality discussion.
  2. Specific critical discussion on current cybercrime issues and threats.
  3. Support with relevant theory/ evidence/ examples from THIS SUBJECT ONLY.
  4. Appropriate structure and formatting, and language use.

Please see the Assessment 2a Rubric for further detail:

CRITERIA    Marking Rubric 
General approach to development and sharing of quality discussion  

(20% of mark) Consistently excellent level of participation across the discussion forums, sharing detail to benefit others in the peer group.
Overall demonstrates deep critical reflection and analysis.
(16-20 marks)
Critical discussion on current cybercrime
issues and threats

(50% of Total mark)
Comprehensively developed critical discussion on current cybercrime issues and threats, across the discussion forums.
Comprehensively and effectively applies knowledge to critical questions, demonstrating deep understanding of the origins and structural design of the Internet insofar as it relates to cybercrime, and the differences and characteristics of cybercrime being perpetrated today. (40-50 marks)
Use of relevant supporting theory/
evidence/ examples

(20% of mark) Supports discussion comprehensively with highly relevant references and examples.
Demonstrates wide knowledge of available and current information on cybercrime types, issues and threats. (16-20 marks)
Appropriate structure and formatting and use of language

(10% of Total mark) Responded to the two key questions within the required timeframe.
Meets format requirements to a high standard, including clear discussion titles or headings, word count (close to approximation), and referencing.
Consistently uses clear, appropriate and respectful language when discussing issues and in reply to others. (8-10 marks)

Assessment format requirements
Formatting requirements for your discussion posts:
• write in a discussion style, that is, not too formal and aiming to by understood by your peers
• maximum 600 words
• use the correct dedicated discussion forum provided for each question
• evidence/reference your discussion (a brief reference list can be outside the word count)
• clear, appropriate and respectful use of language
• convey a sense of sharing within your class community, to benefit others in your peer group with your contribution.
• Without introduction -conclusion

                                                                                Place Order