Explain the basic legal rights of individuals and companies who are affected by cyber crime.

Protection from Cyber Crime

Cybersecurity is not only an issue for governments and large corporations, it also impacts us as individuals. From a criminal justice professional perspective, provide a professional opinion about the issues related to security and protection from cybercrime.

From a personal perspective, address the following.

Describe the data you currently have that you consider important.
Explain a minimum of two techniques you currently utilize to protect your valuable data from being a target of cyber crime.
Describe what you could do to better protect yourself from cyber crime.
From a professional, evidence-based perspective, address the following.

Explain the basic legal rights of individuals and companies who are affected by cyber crime.
Explain the ways in which questions about cybersecurity are out of your hands. (In other words, what can’t you do to protect yourself?)
Analyze the risks inherent to corporations that cannot be controlled or limited through any protective actions.

Required Resources

Articles

Finklea, K. & Theohary, C. A. (2015). Cybercrime: Conceptual issues for congress and U.S. Law Enforcement. Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/R42547.pdf

This article provides a comprehensive overview about issues for congress and national law enforcement to consider in the security and protection of cybercrime.
Accessibility Statement does not exist
Privacy Policy
Kelly, B. B. (2012). Investing in a centralized cybersecurity infrastructure: Why “hacktivism” can and should influence cybersecurity reform. Boston University Law Review, 92(5), 1663-1711.

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides a comprehensive overview and analysis about the need for cybersecurity reform.
Lohr, S. (2010, January 17). Companies fight endless war against computer attacks. New York Times. Retrieved from http://www.nytimes.com

This article explores how Google and other companies are attempting to prevent and respond to cyber-attacks.
Accessibility Statement does not exist

Privacy Policy
Macmanus, S. A., Caruson, K., & McPhee, B. D. (2013). Cybersecurity at the local government level: Balancing demands for transparency and privacy rights. Journal of Urban Affairs, 35(4), 451-470. http://dx.doi.org/10.1111/j.1467-9906.2012.00640.x

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines what is needed to better balance privacy protection and transparency in cybersecurity policy making.

Verini, J. (2010, November 10). The great cyberheist. New York Times Magazine. Retrieved from http://www.nytimes.com

This article provides a real-world example of one criminal’s cybercrimes and the aftermath.
Accessibility Statement does not exist
Privacy Policy
Recommended Resource

Website

MSCJ Professional Sources. (http://ashford-mscj.weebly.com/)

This resource site will provide assistance in researching additional sources for the assessments within this course.