Wednesday, June 19, 2019
Social research methods Proposal Example | Topics and Well Written Essays - 1250 words
Social methods - Research Proposal Exampleportant to prevent, control as well as investigate cyber activities in order to protect the informational, financial and other assets of an individual or an organization. The digital assets of individuals and institutions should be protected sufficiently in order to maintain the CIA system of digital information which includes the factors of confidentiality, integrity and availability of digital assets. The information present in the human brains, in transit or stored in physical or digital media needs to be protected to maintain their authenticity and confidentiality. These facts establish the high requirement and relevance of understanding cyber-crime in order to control and prevent these crimes. The seek work will be segregated in three categories for the ease of answering the research questions adequately. These categories are the prevention of cyber-crimes, the control of cyber-crimes and the investigation of cybercrimes.The main cost that can be used to search the empirical literature relevant to this research are cyber-crimes, digital crimes, hacking, cyber frauds, viruses, attacks, cyber security, credit card fraud, identity theft, internet fraud, electronic communications privacy and electronic surveillance.Some relevant literary works in journals, article, newspapers and other publications can be considered for this research. The documents referred to for this research will include except are not limited to the use of books, journals, valid websites, published reports and guidelines. Also, the cyber laws implemented in differ countries for the prevention and investigation of cyber-crimes like the European Laws, The United States federal official laws, The Security Protect Yourself Against Cyber Trespass (SPY) Act , the Information Technology Act , Nigerian Evidence Act, Japans Cyber Laws, Indian Cyber Laws, the Cybercrime Act, the Freedom of Information Bill, the entropy Protection Act and the Financial In tegrity Act would be studied for gaining a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.