Case study

 

All Subjects

All Subjects

Guaranteed Success

quality-guaranteed-at-professional-essay-writing-service

First Class Honors

First Class Honors

Case study

Case study .  Students are to select one of the case studies (Child exploitation Playpen case, Data breach US Office of Personnel Mgt, Hacking  Alexsey Belan, Romance fraud  Audrey Elaine Elrod, Cyber terrorism  Ardit Ferizi

Students then apply BOTH an individual and situational theory from the list provided on the course Learning@Griffith site to the case study.

The basic requirements are that the case study must:

(a) Provide a brief overview of the case

(b) Introduce and demonstrate a conceptual understanding of the selected theories/perspectives

(c) Apply the theories/perspectives in a manner that clearly demonstrates the applicability of each theory/perspective for understanding how and why the case occurred

(d) Drawing upon the theories/perspectives offer suggestions for prevention strategies applicable to the case and that type of cybercrime more broadly

Criteria & Marking: 

Case study

More detailed marking criteria will be provided on the course Learning@Griffith site.

Case Overview

– Describes key features of the case

Theory Description and Review

– Describes and explains the selected theories
– Reviews the selected theories

Application of Theory

– Applies theories to the case

Implications of Theory for Prevention

– Provides theory-driven prevention strategies
– Provides support for prevention strategies

Presentation

– Complies with academic writing and structure
– Presentation and referencing

Assessment Item 1: Case Study

 Theory Choice:

Case study

Choose ONE theory from Column A and choose ONE theory from Column B

 

Column A – choose ONE theory Column B – choose ONE theory
General Theory of Crime (GTC) Routine Activities Approach/Theory
Social Learning Theory Lifestyle Exposure Theory
Space Transition Theory Opportunity Model of Victimology
  1. Case Study Choice:

Choose ONE case study from the list below

  • Case Study 1: Child exploitation ‐ Playpen case
  • Case Study 2: Data breach ‐ US Office of Personnel Mgt
  • Case Study 3: Hacking ‐ Alexsey Belan
  • Case Study 4: Romance fraud ‐ Audrey Elaine Elrod
  • Case Study 5: Cyber terrorism ‐ Ardit Ferizi

Order 100% Plagiarism free Essay Now

Guaranteed Success

Why Choose US

quality-guaranteed-at-professional-essay-writing-service

Order Now

professional-essay-writing-services-take-action-button

Discounted Rates

essay-writing-discounted-services

Secure Gateway

pay-with-paypal-the-most-secured-payment-gateway