Friday, May 10, 2019

Social research methods Proposal Example | Topics and Well Written Essays - 1250 words

Social methods - Research Proposal Exampleportant to prevent, control as well as canvas cyber activities in order to protect the informational, financial and other assets of an individual or an organization. The digital assets of individuals and institutions should be defend sufficiently in order to brinytain the CIA system of digital information which allows the factors of confidentiality, integrity and availability of digital assets. The information present in the human brains, in transit or stored in physical or digital media needs to be protected to maintain their authenticity and confidentiality. These facts establish the high requirement and relevancy of understanding cyber-crime in order to control and prevent these crimes. The research work will be segregate in three categories for the ease of answering the research questions adequately. These categories argon the prevention of cyber-crimes, the control of cyber-crimes and the investigation of cybercrimes.The main terms t hat can be used to search the empirical literature relevant to this research are cyber-crimes, digital crimes, hacking, cyber frauds, viruses, attacks, cyber security, credit card fraud, identity theft, internet fraud, electronic communications privacy and electronic surveillance. rough relevant literary works in journals, article, newspapers and other publications can be considered for this research. The documents referred to for this research will include but are not limited to the use of books, journals, valid websites, published reports and guidelines. Also, the cyber laws implemented in resist countries for the prevention and investigation of cyber-crimes like the European Laws, The United States Federal laws, The Security Protect Yourself Against Cyber Trespass (SPY) motivate , the information Technology Act , Nigerian Evidence Act, Japans Cyber Laws, Indian Cyber Laws, the Cybercrime Act, the Freedom of Information Bill, the Data Protection Act and the Financial Integrity A ct would be studied for gaining a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.