IT 345 week 4 discussion

 

Week 4 Discussion

Welcome to Week 4

This week we will explore intellectual property. Most people do not know what intellectual property is, yet it is extremely important. Intellectual property is not specific to large corporations. Rather, individuals can also generate intellectual property. We also explore challenges of new technologies and how they affect copyright laws.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

You will not be able to see your classmates’ posts until you make your first post.

topic

  • What do you think the impact would be on creative industries, such as music, movies and fiction novels, if copyright laws did not protect intellectual property?

Methodology used on topic

  Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   Cloud migration and data security as key indicator in e-commerce and business success topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine.  

Types of Clouds

 In 500 words  consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics 

Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  

Internet Crime and Virus Hoaxes

Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. How do pedophiles and other child exploiters use the Internet to commit their crimes?

2. What are virus hoaxes? Why are the hoaxes sometimes more dangerous than an actual virus?

Response to peers – Discussion 13 – ERM

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion (Course — Digital Forensic Evidence)

 Mrs. Mary Winkler Murder Case.

Preamble

The modern approach of forensic of investigation is a combination of what we inherited, learned, documented from the past leading to rewarding and challenging life-time investment. Forensic investigation involves searching, penetrating, and analyzing items from several different fields of life, demands well-synthesized record-keeping and hard to accomplish. It is imperative for forensic investigator to understand the basic techniques of collection and preservation of evidence and cannot be completed with comprehensive and fundamental understanding of forensic science.

Pre-Assessment:         Mrs. Mary Winkler Murder Case.

In March 2006, Mrs. Mary C. Winkler, the wife of a Pastor in Tennessee town, shot and killed her husband, Rev. Matthew Winkler, in the back with a 12-guage shotgun while he slept. Throughout the ensuing trial, the suspect Mrs. Winkler, along with family and friends, claimed that her husband had mistreated her, and mistreatment had inspired the shooting. After the shooting, Mrs. Winkler was arrested in Orange Beach, Alabama, where she had fled with her three young daughters, and extradited to Tennessee. On April 20, 2007, Mrs. Winkler was convicted of voluntary manslaughter and a grand jury indicted her on charges of first-degree murder.

When Mrs. Winkler took the stand in her own defense two days before her conviction, she told the grand jury of her alleged abuse at the hands of her late husband, with whom she had frequent arguments. She asserted that the shooting was an accident and that she had actually been trying to reconcile with her husband at the time of the murder and further claimed that although the gun had discharged, she could not remember having pulled the trigger.

She alleged that her flight to Alabama affirmed her determined attempts to get away from her angry husband. Winkler was ultimately convicted of voluntary manslaughter and sentenced on June 8, 2007, to 210 days in prison, 5 months of which she had already served. She spent some time in a Tennessee mental health facility and then served the remainder of her sentence on probation. Eventually, she was awarded custody of her children.  At times, law recognizes, under circumstances most individual can be justification for the taking of human life (Montaldo, 2017).

Scenario 1

Mrs. Winkler, along with family and friends, claimed that her husband had mistreated her, and mistreatment had inspired the shooting

Question 1

1:1     As an investigator, do you passionately believe that Mrs. Winker, is justified in killing her husband?

Scenario 2

Rev. and Mrs. Winkler had three young daughters and she was awarded custody of her children. Based on overwhelming digital evidence in the case.

Question 2

 2:1.            As an investigator, do you ardently support awarding Mrs. Winkler the custody of the family three children?  

2:2.             If you were one of the three children, present an active plan of action to safeguard such dreadful, threatening, and bad-tempered episodes in the family?

Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier

            Science. Kindle Edition; San Diego: CA

Montaldo, Charles (2017). “The Trial of Mary Winkler.” Thought Co: Tennessee.

Digital Forensics Tools&Tech

 

Week Nine Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

IW2D1

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management steps is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

250-300 words with a minimum of 2 references in APA format