The study of criminal justice and criminology has experienced tremendous growth over the last years, which is evident, in part, by the widespread popularity and increased enrollment in criminology and criminal justice departments at the undergraduate and graduate levels, both across the United States and internationally. An evolutionary paradigmatic shift has accompanied this criminological surge in definitional, disciplinary, and pragmatic terms.
Over dependent of Governments and Businesses in technology give birth to the rising wave of cybercrime. Cyber terrorism is also on the increase. In the near future, wars between nations will be shifted from the physical combat to cyber space. Cyber wars will be valuable tools in the hands of the enemies against world powers; cybercrime will also be a million dollar business.
In the light of this, we will need clear and concise techniques in fighting cybercrime thereby reducing it to the barest minimum. This crime can be difficult to control or prevent as the attackers are often times faceless, the attacker can be your next door neighbor or a person in a different geographical location or continent.
This type of crime can be targeted toward Government, Agencies, Ministries, and Businesses irrespective of size and even individuals. The skills required of an attacker is dropping by the day as there are freely available and downloadable tools on the internet that even script kiddies can download and run against any vulnerable target without understanding what the tools does.
Attacks techniques are also getting sophisticated as more and more tools are out there that try to make the attacked extremely difficult if not impossible to detect.
With this, it is therefore my desire to research into ways of controlling, preventing and investigating where possible the cybercrime activities of the cyber space, thereby making our cyberspace maximally secured since there cannot be total security.
By so doing it will boost our economic gains from the cyber space.
Cybercrime is a crime involving computers or digital devices, in which a computer can be either a target of the crime, a tool of the crime or contain evidence of the crime.
The procurement and retention of highly skill cybercrime expert by Government and Business Enterprises cannot be overemphasized.
This will ensure compliance with international acceptable standard of usage of computer and other technological devices in the work places. Although prevention as they say is better than cure, irrespective of the deterrent measures to prevent and or control cybercrime, there may still be breaches, where this occur, Forensics Experts will be called in to conduct a sound digital forensic investigations, analysis, documentation and reconstruction of the crime scene and present the evidence of the findings to Engr.
Effiong Ndarake Effiong July Page 2 the appropriate authorities or the Jury as the case may be, that can lead to arrest, prosecution and conviction of the culprit. Information stored in Human brain, electronic devices physical media and those on transit needs to be protected.
Hence the urge for this research topic. This research will therefore be broken down into three major categories namely: This will deal with the formation of adequate policies to control cybercrime activities. The policies should also spell out appropriate punishment for cyber criminals if convicted by appropriate court of competent jurisdiction, this will be a deterrent measures to other who may want to engage in the act.
In this section, I will be focusing here on the training of both users and administrators of the cyber space, best practices, security awareness etc. Hackers mind set will also be a focus, the tools and techniques of the hackers will be exposed and the various ways of preventing and detecting cybercrime activities will be the core of the training to be evangelized here.
Bearing in mind that users are the weakest security link. Tools that will help in this will be both commercial and open source tools which will include but not limited to: Since there is no such thing as total security and an unbreakable system, I have to assume that at one point or the other, the system can be broken into irrespective of the controls and prevention.
However, should this happen. The issue of investigations set in, unraveling the mysteries behind the attack, tracing the hacker through the cyber space. This is a very interesting module as Engr. Effiong Ndarake Effiong July Page 3 forensic investigation of both network based attacks and computer systems including mobile devices will be covered.
From identification, collection, preservation analysis, documentation and presentation of facts of cybercrime investigation will be a treated.Qualitative Research On Quantitative Research Words | 6 Pages. qualitative research method involves analysing data, such as words, pictures or objects.
It is more subjective, and requires the researcher to interpret data in order to form thematic ideas. The advent of academic journals such as Crime, Media, Culture, Journal of Criminal Justice and Popular Culture, and the recent Journal of Qualitative Criminal Justice and Criminology also speak to the emergence of content analysis and other qualitative techniques in the study of crime and social control.
Examination of these criminological theory research papers quickly confirms the aforementioned interdisciplinary nature of the field, with research papers presenting biological, psychological, and biosocial explanations and solutions for crime (Part III: Theories of Crime and Justice).
Part IV: Criminology Research provides example research papers on various quantitative and qualitative designs and techniques employed in criminology research. Comparison of the purposes and application of these research methods across various criminal justice topics illustrates the role of criminologists as social scientists engaged in research enterprises wherein single studies fluctuate in focus along a .
Research and Evaluation on Victims of Crime (CFDA No.
) supporting the Office for Victims of Crime (OVC) on research, evaluation, and programmatic projects. Over the years, the shared priorities of OVC and NIJ have resulted in a number of in novel ways or qualitative, mixed-methods or Community Based Participatory Research (CBPR.
Family members of homicide victims are a neglected population whose posthomicide experience is shaped by the social milieu and primacy of the state's agenda for justice. Themes derived from interviews with 14 families about their lived experience are analyzed and explored through the lens of social constructionist theory, and implications for.