Thursday, February 20, 2020

Social research methods Proposal Example | Topics and Well Written Essays - 1250 words

Social methods - Research Proposal Example portant to prevent, control as well as investigate cyber activities in order to protect the informational, financial and other assets of an individual or an organization. The digital assets of individuals and institutions should be protected sufficiently in order to maintain the CIA system of digital information which includes the factors of confidentiality, integrity and availability of digital assets. The information present in the human brains, in transit or stored in physical or digital media needs to be protected to maintain their authenticity and confidentiality. These facts establish the high requirement and relevance of understanding cyber-crime in order to control and prevent these crimes. The research work will be segregated in three categories for the ease of answering the research questions adequately. These categories are the prevention of cyber-crimes, the control of cyber-crimes and the investigation of cyber–crimes. The main terms that can be used to search the empirical literature relevant to this research are cyber-crimes, digital crimes, hacking, cyber frauds, viruses, attacks, cyber security, credit card fraud, identity theft, internet fraud, electronic communications privacy and electronic surveillance. Some relevant literary works in journals, article, newspapers and other publications can be considered for this research. The documents referred to for this research will include but are not limited to the use of books, journals, valid websites, published reports and guidelines. Also, the cyber laws implemented in differ countries for the prevention and investigation of cyber-crimes like the European Laws, The United States Federal laws, The Security Protect Yourself Against Cyber Trespass (SPY) Act , the Information Technology Act , Nigerian Evidence Act, Japan’s Cyber Laws, Indian Cyber Laws, the Cybercrime Act, the Freedom of Information Bill, the Data Protection Act and the Financial Integrity Act would be studied for gaining a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.