Evolution of Cybercrimes

User Generated




The Internet has changed lives in fundamental and positive ways. It also has opened the door to new types of cybercrime, which can run the gamut from identity theft to organizing terrorist plots. As each new type of crime comes to light, usually through a case that draws national attention, law enforcement and government respond using increasingly sophisticated surveillance technology. Law enforcement’s use of technology to prevent and combat cybercrime has prompted even greater "advances" in criminal activity with the use of encryption, anonymizers, and proxy servers.

Select one of the cybercrimes presented in this course: cyber-bullying, cyber-stalking, cyber-hate, cyber-predators, or a type of white-collar crime that utilizes technology. Examine the evolution of that cybercrime and consider how advances in technology have influenced its evolution.

The Assignment (2–3 pages)

  • Describe the type of cybercrime you selected.
  • Explain the evolution of the cybercrime, including when it gained national attention and any circumstances or case that might have prompted the national attention.
  • Explain how advances in technology have influenced the evolution of that cybercrime.

Two or three pages with at least three references....

It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the readings.

To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create SUBHEADINGS to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.


  • Course Text: Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 8, "Sex Crimes, Victimization, and Obscenity on the World Wide Web" (review)
  • Article: Basu, S., & Jones, R. (2007). Regulating cyberstalking. Journal of Information, Law and Technology, (2).
  • Article: Creepy crawlies: Cyber-stalking. (2011). The Economist, 399(8730), 63–64.
  • Article: Franken, Blumenthal introduce mobile privacy legislation. (2011). Telecommunications Reports, 77(13), 12–13.
  • Article: Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99–118.
  • Article: Roberts, L. (2008). Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An analysis on cyber stalking. International Journal of Cyber Criminology, 2(1), 271–285.

Web Resource

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Excellent! Definitely coming back for more study materials.


Similar Content

Related Tags