Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Investigating the Legitimate and Illegitimate Uses of Anonymous Technologies

Learning Outcomes

This assignment addresses the following learning outcomes from the module syllabus:

  • Critically evaluate methods and techniques used for cybercrime.
  • Investigate, summarise and review emerging technologies and their use in cybercrime.
  • Discuss cybercrime topics and implications from a multidisciplinary/multi-viewpoint perspective.

Anonymous technologies, the same way as other technologies, can be used for legitimate and illegitimate purposes.

You may choose to investigate one specific class of anonymous technology (e.g., anonymous web browsing, anonymous P2P communication, anonymous emailing service, anonymous content distribution), one specific technique

(i) how the chosen class, technique, or application works. Use references to provide deeper explanations and definitions.

(ii) Discuss how the chosen class, technique, or application has been used by Internet users for legitimate purposes.

(iii) Discuss how the chosen class, technique, or application has been used by cybercriminals (illegitimate purposes).

(iv) Discuss and critically evaluate which measures can be adopted against the chosen anonymous technology used by cybercriminals.

(v) Critically evaluate and discuss the literature, rather than simply regurgitating what you have read.

You have to interpret, reflect and be critical about what you read and about the sources you actually use.

(vi) Contrast and compare the legitimate and illegitimate viewpoints (usages) of the chosen anonymous technology.

(vii) Use in-text citations where neccessary, which should be in Harvard style.

support
close