In a minimum of 450 words, discuss the topics below.
- Describe several possible Cybercrime objectives and operational methods employed to abuse Digital currencies and the “Internet of Things.”
- Examine and Describe laws and practices related to Computer Forensics. Will these laws and practices be sufficient for the emerging cybercrimes you have described above? Explain your answer.
Brown, I., Edwards, L., & Marsden, C. (2009). Information Security and Cybercrime. (L. Edwards, & C. Waelde, Eds.) Oxford: Hart. Retrieved November 9, 2020, from https://ssrn.com/abstract=1427776
Koops, B.-J. (2010). The Internet and its Opportunities for Cybercrime (Vol. 1). (M. Herzog-Evans, Ed.) Nijmegen: WLP. doi:10.2139/ssrn.1738223
Kratchman, S., Smith, J. L., & Smith, M. (2008). The Perpetration and Prevention of Cybercrimes. Internal Auditing, 23(2), 3-12. Retrieved November 9, 2020, from https://ssrn.com/abstract=1123743
Wall, D. S. (2008). Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime. International Review of Law, Computers and Technology, 22(1-2), 45-63. Retrieved November 9, 2020, from https://ssrn.com/abstract=1124662