Difference of Insider and Outsider Computer Crimes Research Paper – coursefighter.com
Business Finance – coursefighter.com
For this Activity, visit http://www.fbi.gov/about-us/investigate/cyber and locate a recent example of computer crime. This Activity has three (3) parts.
Your Activity responses should be both grammatically and mechanically correct and formatted in the same fashion as the Activity itself. If there is a Part A, your response should identify a Part A, etc. In addition, you must appropriately cite all resources used in your response and document them in a bibliography using APA style. (A-5 page response is required.)
Part A Define computer crime.
Part B Differentiate between insider and outsider computer crimes. The crime you choose could be embezzlement (insider), theft (outsider), or another form of crime such as mail fraud or child pornography.
Part C Summarize five computer crimes that you find on the FBI website. Detail the cases, methods of investigation, charges brought, and identify the federal and state laws that govern the crimes. Include in your discussion a summary of how investigators ferreted out the offenders, the charges brought against them, as well as the minimum and maximum consequences for committing such a crime. If the offenders have not yet been punished, detail the possible consequences they will receive for their misdeeds.