Discussion 5 | CRJ 631 Security & Protection for Cybercrime | Ashford University

 Protection from Cybercrime

Prior to beginning work on this discussion, please read all of the required resources for this week. Review the instructions below and research a minimum of five additional articles in the UAGC Library that were published within the last 10 years to help support your statements. Be sure to include a reference list for your articles at the end of your post in APA format as outline by the UAGC Writing Center (Links to an external site.).

Cybersecurity is not only an issue for governments and large corporations, it also impacts us as individuals. From a criminal justice professional perspective, provide a professional opinion about the issues related to security and protection from cybercrime.

From a personal perspective, address the following.


Required Resources


Finklea, K. & Theohary, C. A. (2015). Cybercrime: Conceptual issues for congress and U.S. Law Enforcement (Links to an external site.)Congressional Research Service.  Retrieved from https://www.fas.org/sgp/crs/misc/R42547.pdf

  • This article provides a comprehensive overview about issues for congress and national law enforcement to consider in the security and protection of cybercrime.
    Accessibility Statement does not exist
    Privacy Policy (Links to an external site.)

Kelly, B. B. (2012). Investing in a centralized cybersecurity infrastructure: Why “hacktivism” can and should influence cybersecurity reform (Links to an external site.). Boston University Law Review, 92(5), 1663-1711.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides a comprehensive overview and analysis about the need for cybersecurity reform.

Lohr, S. (2010, January 17). Companies fight endless war against computer attacks (Links to an external site.).  New York Times.  Retrieved from http://www.nytimes.com

Macmanus, S. A., Caruson, K., & McPhee, B. D. (2013). Cybersecurity at the local government level: Balancing demands for transparency and privacy rights (Links to an external site.). Journal of Urban Affairs, 35(4), 451-470. http://dx.doi.org/10.1111/j.1467-9906.2012.00640.x

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines what is needed to better balance privacy protection and transparency in cybersecurity policy making.

Verini, J. (2010, November 10). The great cyberheist (Links to an external site.). New York Times Magazine. Retrieved from http://www.nytimes.com

Recommended Resource


MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
  • Describe the data you currently have that you consider important.
  • Explain a minimum of two techniques you currently utilize to protect your valuable data from being a target of cyber crime.
  • Describe what you could do to better protect yourself from cyber crime.

From a professional, evidence-based perspective, address the following.

  • Explain the basic legal rights of individuals and companies who are affected by cyber crime.
  • Explain the ways in which questions about cybersecurity are out of your hands. (In other words, what can’t you do to protect yourself?)
  • Analyze the risks inherent to corporations that cannot be controlled or limited through any protective actions.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more