Kizza (2014) addressed network attacks and intrusions broadly as â€œcybercrimeâ€ and attributed them largely to moral and ethical deficiencies of the perpetrators. Lessig (2006) approached law in the network largely in terms of computer â€œcodeâ€ that defines what can and cannot be done with the network. In other words, Lessig found the issue of what is a crime and who bears responsibility to be more ambiguous than does Kizza. Search the Internet to find two examples of activities that meet the definition of cybercrimes (The two examples are cyberstalking and Cyberterrorism). (The LexisNexis Academic database in the Library provides searchable access to a wealth of news articles and features.) Then briefly summarize your examples and apply and criticize Kizzaâ€™s (2014) and Lessigâ€™s (2006) positions on what constitutes a crime and who is responsible for the activities described in your examples. Identify at least two of the stated or unstated assumptions that underlie each of Kizzaâ€™s (2014) or Lessigâ€™s (2006) arguments and specify at least two practical implications. Does Kizzaâ€™s (2014) or Lessigâ€™s (2006) position apply better to either or both of your examples? Support your analysis by citing specific statements by these authors or at least two outside sources. You might want to look ahead to Lessigâ€™s (2006) Chapter 3 for some more material. Discuss and cite both course textbooks, (Kizzaâ€™s 2014) Computer Network Security and Cyber Ethicsand Lessigâ€™s (2006) Code and Other Laws of Cyberspace, and at least one additional credible, scholarly source to support your analysis and positions. Use APA style guidelines, citing references as appropriate. Your paper should be two to three pages in length. Before submitting your final version, be sure to submit a draft version to the TurnItIn Checker on the Colorado Platform.
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.