Description
Expected to read the 5 papers attached thoroughly, understand the presented problems and their proposed solutions finally you have to summarized these paper in a given template as attached .
The deliverable of the project should include:
- A report in a paper format with the following sections:
- Abstract: summary of problem statement presented in the papers.
- Introduction: discuss the chosen papers proposed solution. These should be illustrated using text and diagrams.
- Taxonomy: classification of the papers proposed solution and comparison between them.
- Discussion: The students have to criticize the proposed solution they also have to propose a possible solution or alternative for some of the weaknesses of the chosen papers where ever that is possible.
- References: The citation should follow the IEEE style
- Your article cannot go beyond 11 pages inclusive references

Explanation & Answer

Attached.
1
Meta-Analysis on Cyber-Crime forms,
Legislation, and Existence in the Society
Mary A. et al.,, Rouchen L., Shenaz B., & Raghav H. R., Hadeel A., Kathleen A et al., Veena K., &
Meena K.
Abstract--Basic guidelines for the identification of a technical
existence of cyber-crimes such as fraud, hacking and related
malware in the computer system. Privacy and child abuse
materials are also applied in cyber enticement and exploitation of
children. Computer-assisted frauds analysis of offense and
offenders and cases that can amount to arrest are important in
understanding cybersecurity issues. This analysis will also focus
on digital abuse and contextual violence that have been faced as a
result of using modern technology in communications and other
entertainment uses.
Gender stalking victimization will also be highlighted through
a malty-theoretical framework assessment. This will be achieved
through theories of the utility of self-control, social learning
skills, and the control balance aspects. Cybersecurity requires
additional awareness that can enable technology users to detect
phishing and respond accordingly to the realized finding. The
paper will then produce a conclusion on the findings from the
five sources that will be analyzed for cybercrime issues.
KEYWORDS
Cyberpsychology; cybercrime; social impacts, hacking:
privacy; child abuse materials; frauds, offender; offense
convictions, jurisdiction outcomes; digital abuse domestic
violence; stalking; victimization; self-control; social control;
social learning; control balance gender; lie detection; identity
theft; crime data and genuine data
understanding of the offender, the offense extent and
imprisonment penalties that will be appropriate to the case.
This understanding involves scholar analysis from previous
cries and prediction of the future with considerations to
technology changes.
Attention has been drawn to hacking, identity theft and online
frauds that are technologically facilitated. This brings the
understanding of non-physical forms such as threatening
phone call, Cyber-stalking and location tracking that may be
deemed as harassment to a specific user. On the other hand, a
malty-theoretical framework has been developed for assessing
the victimization issues following theories of the utility of
self-control, social learning, and the control balance theories.
Studies reveal that the number of technology uses is on the
rise and was recorded at 40% by the end of 2016. This
presents the need to increase self-awareness among
individuals to be able to detect phishing and other unethical
practices in their computer systems. Performance evaluation
involves identification of theft, intrusion detection and lie
detection techniques in the system as well as analyzing
specific profiles of the uses. Meta-analysis on the five
documents provides an understanding of cybercrimes. This
will help in preparing for future technological advancements
and securing individual privacy.
II. PROPOSED SOLUTIONS
I. INTRODUCTION
T
HIS document provides a cross-analysis of the
contemporary news and roles played in cybercrimes and
other forms. The meaning of cyber fraud is an important
aspect to be understood as well as the social impacts and
preparations for the future of society. From the increased use
of technology, uncensored content may get their way to
children resulting in child abuse or related enticements to
practice irresponsible sexual behavior.
Fighting computer-assisted crimes have inspired studies on
related crimes and how they can be curbed under Law
Enforcement agencies (LEAs). Understanding types of...
