Compare and contrast the various techniques utilized by the United States and the United Kingdom to combat and prosecute cyber crime. Address the potential legal issues that can arise with official attempts at combatting cyber crime. Explain which of the two nations appears to have the most effective anti-cyber crime legislation currently in existence.

United States versus United Kingdom: Legislation to Prosecute

Prior to beginning work on this discussion, read Chapters 1 and 3 in the text.

Throughout the years, governmental legislative bodies have attempted to draft laws and policies designed to combat cyber crime and protect the assets of individuals, corporations, and government entities. However, there is not yet a unified international code in existence that can effectively address the devastating impact of cyber crime. The United States has enacted the Computer Fraud and Abuse Act (CFAA), designed as the primary statute used to prosecute hacking cases, and has tasked the Computer Crime and Intellectual Property Section (CCIPS) to investigate instances of cyber crime. In the United Kingdom, the Computer Misuse Act of 1990 and the Metropolitan Police Central e-crime Unit (PCeU) are used in efforts to combat cyber crime and enforce regulations governing the online medium.

In your 300-word initial post, compare and contrast the various techniques utilized by the United States and the United Kingdom to combat and prosecute cyber crime. In addition, address the potential legal issues that can arise with official attempts at combatting cyber crime. Explain which of the two nations appears to have the most effective anti-cyber crime legislation currently in existence. Utilize the required sources to support your statements.

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/

Chapter 1: Technology and Cybercrime
Chapter 3: Computer Hackers and Hacking

Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. Evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.

Viruses, Trojan Horses, and Worms

Prior to beginning work on this discussion, read Chapter 4 in the text, watch the Technology in 10: Malware, Viruses, Worms, and More (https://www.youtube.com/watch?v=29LOaxPwPPU) video, and review the Cisco What Is the Difference: Viruses, Worms, Trojan Horses, and Bots? (https://tools.cisco.com/security/center/resources/virus_differences) article.

Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.

In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.

Analyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy. Explain the growth of innovative file sharing such as peer-to-peer (P2P) and Internet Relay Chat (IRC) and their impact on the methods for detecting and preventing intellectual property piracy.

Evolution of Piracy and Corresponding Legislation

Prior to beginning work on this assignment, read Chapter 5 in the textbook and view the Digital (https://www.youtube.com/watch?v=RMaXj1Kjis8), Piracy (Lhttps://www.youtube.com/watch?v=RMaXj1Kjis8) and Steve Wozniak: Digital Piracy (https://www.youtube.com/watch?v=jJRSjFqu-8Q) videos. You must include at least one additional scholarly and/or professional source for your paper. You may wish to review the recommended resources for this week for assistance with this research. You may also access the MSCJ Professional Sources (Links to an external site.) guide for assistance with finding appropriate resources.

Theft of intellectual property, such as music and video recordings, has been commonplace for many years. During the 1970s and 1980s portable inexpensive recording devices made piracy of video and music relatively easy to accomplish. With the advent of the MP3 and MP4 formats utilized to compress large files for data storage and portability, piracy has flourished. Motion pictures, music, and data can now be easily accessed via small personal computerized devices such as cellular phones, tablets, and MP3 players. In addition, large files can be easily stored on digital flash drives often no bigger than a coin. This has enabled digital pirates to safely store movies, music, and data for transport to locations on a global scale.

In this paper, you must

Analyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy.
Explain the growth of innovative file sharing such as peer-to-peer (P2P) and Internet Relay Chat (IRC) and their impact on the methods for detecting and preventing intellectual property piracy.

Trace the evolution of legislation and organizations such as the World Intellectual Property Organization (WIPO), the Copyright Act of 1976, No Electronic Theft (NET) Act, and Directive 91/250/EEC/2009/24/EC designed to curtail and prevent digital piracy.
The Evolution of Piracy and Corresponding Legislation paper:

Analyze what makes computer hacking and cyber crime attractive for some people. Briefly examine the history of computer hacking and hackers. Identify the defining characteristics of a hacker. Describe the beneficial aspects of computer hacking. Examine how hackers utilize cyberspace to communicate and form communities. Evaluate the computer hacking aspects of cyber crime that thwart efforts by the law enforcement community to detect and combat such activity.

Subculture of Cyber Crime

Prior to beginning work on this Interactive Assignment, read the Choo (2008) and Koops (2010) articles.

As the newly elected sheriff of the Village of Dibley, you have been assigned to head the National Cybersecurity Squad. Your team is responsible for developing a report on the typology of a computer hacker. You have recently stumbled across the 1983 motion picture Wargames and were surprised to learn that it is widely considered to be one of the most significant factors responsible for increasing public interest in technology, most notably computer hacking. After watching the movie, you have gained an interest in the world of cyber crime and have started lurking in various hacking fan sites, news groups, Facebook groups, and bulletin board networks in an attempt to learn as much as possible about the culture of cyber criminals and computer hackers. You want to ensure that you bring as much relevant information to your team as possible.

For your initial post, you must create a workable typology of a computer hacker to present to your team. Your report must be in the form of a PowerPoint presentation comprised of at least six content slides. Your PowerPoint presentation must be clear and provide your audience with an understanding of the purpose and meaning of the report.

Include the following elements in your presentation:

Analyze what makes computer hacking and cyber crime attractive for some people.
Briefly examine the history of computer hacking and hackers.
Identify the defining characteristics of a hacker.
Describe the beneficial aspects of computer hacking.
Examine how hackers utilize cyberspace to communicate and form communities.
Evaluate the computer hacking aspects of cyber crime that thwart efforts by the law enforcement community to detect and combat such activity.

For each one of your content slides, provide speakers notes that include what you would say about the content of each slide if you were to present it formally. Include visual enhancements in your presentation. These may include: appropriate images, appropriate animations, and transitions from content piece-to-content piece and slide-to-slide. (Images should be cited in APA format as outlined by the Writing Center (Links to an external site.). Students may wish to use the Where to Get Free Images guide for assistance with accessing freely available public domain and/or Creative Commons licensed images.) It is recommended that you access Garr Reynolds’ Top Ten Slide Tips (https://www.garrreynolds.com/preso-tips/design/), which provides useful assistance with creating successful PowerPoint presentations.

Article
Choo, K. R. (2008). Organised crime groups in cyberspace: A typology (Links to an external site.). Trends in Organised Crime, 11, 270-295. http://dx.doi.org/10.1007/s12117-008-9038-9

The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. The author of this article examines three categories of organized criminal groups operating exclusively within cyberspace. It will assist you in the development of this week’s discussion posts and the interactive assignment.
Koops, B.-J. (2010). The internet and its opportunities for cybercrime (Links to an external site.). In M. Herzog-Evans (Ed.), Transnational Criminology Manual: Volume 1. Introductive part: What is criminology? (pp. 735 -754). http://dx.doi.org/10.2139/ssrn.1738223

Name several types of crimes and torts that can be committed via computer. Can you provide any examples from the news or current events?

Discussion 3A

Name several types of crimes and torts that can be committed via computer. Can you provide any examples from the news or current events?

Write an essay that briefly explains the concept of Duty of Care and how it relates to the case Liebeck v. McDonald’s. What were the implications of the case for the food business?

Assignement 3A

Read and view the following:

Duty of Care: Cornell University Law School. (n.d.). Duty of care. Retrieved from https://www.law.cornell.edu/wex/duty_of_care

Rosenberg, M. G. (n.d.). Learn what really happened in the McDonald’s coffee case. Retrieved from http://www.mgrlaw.net/mcdonalds.htm

Video: Democracy Now! Archives (2011, January 25). The story behind the infamous McDonald’s coffee case & how corporations used it to push tort reform [Video File]. Retrieved from https://www.youtube.com/watch?v=i2ktM-lIfeQ

Then write an essay that briefly explains the concept of Duty of Care and how it relates to the case Liebeck v. McDonald’s. What were the implications of the case for the food business?

List 3 additional intellectual property protections SOPhiGEo, LLC can obtain as the corporate IP owner for this widget in the United States, and for each provide: Name and brief general definition of the type of IP; How long the IP will last to cover the widget; What aspect of the widget it will cover;

For the following question, write a short essay response. You must include APA7th ed. Formatted sources in support of your essay in text and the full references at the end of your answer.

ESSAY QUESTION FACT SCENARIO: YOUR EASSAY IS BASED ON THESE FACTS:

George and Sophia are entrepreneurs who together own a limited liability company. SOPhiGEo, LLC. They are inventors and have invented a widget that can be plugged into a mobile phone or personal computer to detect unsolicited third-party access of camera and/or audio recording features on the equipment and block the intruder with a repeating loop of nonsense gibberish that can be stopped on the intruder’s device only by the widget’s primary user. This widget has a proprietary design and operating code. SOPhiGEo is calling it “LoktYU.’ Currently the only intellectual property (IP) protection SOPhiGEo has employed is trade secret.

QUESTION

List 3 additional intellectual property protections SOPhiGEo, LLC can obtain as the corporate IP owner for this widget in the United States, and for each provide:

  1. Name and brief general definition of the type of IP;
  2. How long the IP will last to cover the widget;
  3. What aspect of the widget it will cover;

Write an essay that briefly explains the real property principle of Eminent Domain and summarizes the case Kelo v. The City of New London and its implications for business.

Assignment 2A

Read the following:
The United States Department of Justice. (2015). History of the federal use of eminent domain. Retrieved from http://www.justice.gov/enrd/history-federal-use-eminent-domain

Poppel, S. D. (2006, May). Pennsylvania limits exercise of eminent domain in the wake of Kelo v. City of New London. Retrieved from https://businessdocbox.com/Government/67780628-Pennsylvania-limits-exercise-of-eminent-domain-in-the-wake-of-kelo-v-city-of-new-london.html

Then write an essay that briefly explains the real property principle of Eminent Domain and summarizes the case Kelo v. The City of New London and its implications for business.

After reading the chapters and viewing the videos, comment on the advantages and disadvantages of the various business formations. What would you recommend to an entrepreneur just starting out?

Discussion 2A

After reading the chapters and viewing the videos, comment on the advantages and disadvantages of the various business formations. What would you recommend to an entrepreneur just starting out?

Attached are the slides for the chapters.

Videos:

First, read the articles below and then discuss in your own words the debate between the two theories.

Discussion 2B

First, read the articles below and then discuss in your own words the debate between the two theories.

Stockholder (or shareholder) theory of the corporation: Friedman, M. (1970, September 13). The social responsibility of business is to increase its profits. In The New York Times. Retrieved from http://umich.edu/~thecore/doc/Friedman.pdf

Stakeholder theory of the corporation: Matteson, M., & Metevier, C. (2015.) Freeman’s stakeholder theory. Retrieved from https://philosophia.uncg.edu/phi361-matteson/module-1-why-does-business-need-ethics/freemans-stakeholder-theory/

Shareholder Theory vs. Stakeholder Theory Debate: Smith, H.J. (2003, July 15). The Shareholders v. the stakeholders debate. In MIT Sloan Management Review. Retrieved from http://sloanreview.mit.edu/article/the-shareholders-vs-stakeholders-debate/