ABSTRACT
Many traditional crimes are now being aided or abetted through the use of
computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the following text, key research findings in the area of traditional American criminal investigations are summarized. Similarities and differences between traditional and computer crime investigations are then presented, and consequent implications are discussed. Pragmatic suggestions as to how American computer crime investigative task forces can most competently fulfill their intended objectives are given in conclusion via a hypothetical example of a specialized unit. It is hoped that past knowledge can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2IMPORTANCE OF THE STUDY
1.4DEFINITION OF THE STUDY
1.5ASSUMPTION OF THE STUDY
CHAPTER TWO
2.0LITERATURE REVIEW
TOPOLOGY
SPAM
FRAUD
OBSCENE OR OFFENSIVE CONTENT
HARASSMENT
CHAPTER THREE
3.0DRUG TRAFFICKING
3.1CYBER TERRORISM
3.2CYBER WARFARE
3.3DOCUMENTED CASES
CHAPTER FOUR
4.0COMBATING COMPUTER CRIME
CHAPTER FIVE
5.1 CONCLUSION
5.2 LIMITATION OF THE STUDY
5.3 SUGGESTION FOR FURTHER RESEARCH
REFERENCE
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Using The Computer System In Crime Investigation.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/255/using-the-computer-system-in-crime-investigation
"Using The Computer System In Crime Investigation." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/255/using-the-computer-system-in-crime-investigation>.
"Using The Computer System In Crime Investigation.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/255/using-the-computer-system-in-crime-investigation>.
"Using The Computer System In Crime Investigation.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/255/using-the-computer-system-in-crime-investigation.
- Related Works
- Design And Implementation Of An Online Student Admission System (a Case Study Of Federal College Of Education, Eha-amufu, Enugu State)
- Steganography – An Art Of Hiding Digital Information
- Web Base Proxy Server An Overviewed Of Issues And Prospects
- Design And Implementation Of Wap Enable Greeting Card System –wapenable Device User To Send Greeting Card To Other Wap Enable Device
- The Effects Of Computer Application In The Modern World
- Design And Implementation Of Video And Photo Editing
- Design And Implementation Of A Computerised Traffic Offence Documentation System. (case Study Of Federal Road Safety Commissioner, Enugu)
- Design And Implementation Of A Software For Examination Supervision Scheduling For An Institution Of Higher Learning A Case Study Of Imt Enugu
- Design An Implementation Of A Computer Based Seaport Billing System (a Case Study Of Nigerian Port Authority Lagos)
- Design And Implementation Of A Computerized Accounting System Of An Academics System (a Case Study Ofimt Enugu)
