ISOL 633 Case Study in Computer Forensics: Pharmaceutical Company

User Generated

nhgbenz

Computer Science

Description

1.Please cover all the topics mentioned in the pdf.

2. Please do not deviate from the main topic.

3. Include the number of articles as mentioned in the PDF.

Unformatted Attachment Preview

Case Study: Lab – Case Study in Computer Forensics: Pharmaceutical Company In this lab you will conduct a review of the literature on this topic and complete a literature review on this topic. There are many sites that can assist in the formatting and content of a literature review. Here is an example: http://guides.lib.ua.edu/c.php?g=39963&p=253698 Some of the questions to consider are: 1. What is the business problem/issue formulated by the author? 2. Is it clearly defined? 3. Could the problem have been approached more effectively or from another perspective? 4. Has the author also evaluated the literature relevant to this problem/issue? 5. Does the author agree or disagree with the relevant literature? 6. How does the article contribute to your understanding of the problem or topic? Literature Review Expectations: 1. At least 10 peer-reviewed articles are to be included in the literature review. 2. It should be organized by theme or subject of the article. 3. A minimum of one paragraph is required per article is required. 4. The review must be synthesized, and the articles analyzed for content as it relates to the content of the case study above. 5. Free of grammatical errors. 6. No evidence of plagiarism. 7. Since this is Information Technology related the articles cannot be greater than 5-years old unless it considered a seminal article. 8. The literature review must be run through the plagiarism detector and no more than 25% of the articles should be used by another student. If there is a greater than 25% match in the paper it will receive a point deduction of 50%. If greater than 50% is a match the submission will receive a 0 without an option for resubmission. If there is a match in articles the synthetization and analyzation of the material MUST be original for content. Written Requirements Be sure to use appropriate APA format and cite your Reading or other sources that you used in your literature review. The literature review should contain enough information to adequately answer the business problem provided in the case study and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion. Also review the university policy on plagiarism. If you have any questions, please contact your professor. Directions for Submitting Your Lab Place your literature review in the drobox for the Unit 3 Lab.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached is the complete assignment along its outline. Please feel free to ask for any corrections or clarification. Thank you

Surname 1
Outline
Title page-------------------------------------------------------------------------------------------------------1
Literature review----------------------------------------------------------------------------------------------2
References-----------------------------------------------------------------------------------------------------7


Surname 1
RUNNING HEAD: Unit 7 lab

Name
Course
Professor
February 20, 2019

Surname 2
RUNNING HEAD: Unit 7 lab
Computer forensics and crime: A literature review
Several countries, including the United States of America, have incorporated the use of
technology in the investigation of crimes. This decision has made it easier for the tracking down
of perpetrators and the prevention of any future computer breaches. The term computer forensic
is used to refer to the process of acquiring and evaluating digital information (Desail and
Nayarankar, 2015). It is divided into three major categories that help achieve these functions;
network forensics, data recovery and disaster recovery.
Desail and Nayarankar (2015) present the various challenges faced when carrying out
cybercrime investigations such as the virtual environment, the protection of data and the process
of acquiring data. Seven different case studies concerning digital crimes are presented along with
the appropriate tools that can be used for forensic analysis. The problem was well defined. The
problem-solving approach used was quite appropriate. Every case was analyzed individually.
Relevant literature was evaluated and incorporated into the article. The authors agree with the
supporting literature. Readers are able to understand the problem and the potential solutions
presented by the authors.
Another article by Evans et al, (2015) explores the various models used in the conduction
of forensic investigation then singles out on one; the integrated computer forensics investigation
process model. The authors acknowledge that there is no single fixed way of approaching such
investigations. The problem was well defined and approached appropriately. Various literary
works have been i...

Related Tags