Discussion 2 | CRJ 621 Cybercrime Investigation | Ashford University

Get your original paper written from scratch starting at just $10 per page with a plagiarism report and free revisions included!










Hire A Writer

   International Issues and Cyber Crime

Prior to beginning work on this interactive assignment, review the Issues Monitor: Cyber Crime – A Growing Challenge for Governments (Links to an external site.), The Geographical Distribution of Cybercrime (Links to an external site.), and The Top Countries for Cybercrime (Links to an external site.) online resources. Review the instructions and research a minimum of two additional sources on your assigned country to support your work in your presentation.

As you have learned, cyber crime is an international issue the implications of which are only beginning to be realized. For this interactive assignment, you will be assigned a country to research and for which to create presentation. Your presentation will provide information about cyber crime in the assigned nation and the threat to the world at large this represents.

Five nations will be examined: Brazil, China, Germany, Russia, and the United Kingdom. Please see the list below to determine which country you will be assigned for your presentation.

  • Last names beginning with the letters A through D
    Examine the country of BRAZIL


You will create a five minute maximum screencast presentation of a PowerPoint on your assigned country. For the screencast portion, you may use any screen casting platform you wish. (Quick-start guides for Screencast-O-Matic and Jing are provided for your convenience.)


Create your PowerPoint presentation including the following elements:

  • Explain the internal and external cyber crime activity for your assigned country.
  • Evaluate the international threat the actions occurring in the assigned country have on the world at large.
  • Analyze the internal, domestic efforts at thwarting cyber crime in your assigned country including information on how cases are built against perpetrators.


Required Resources


Brenner, S. W. (2006). Cybercrime jurisdiction (Links to an external site.). Crime, Law and Social Change, 46(4), 189-206. http://dx.doi.org/10.1007/s10611-007-9063-7

  • The full-text version of this article is available through the ProQuest database in the UAGC Library. This article examines the concept of jurisdiction and the difficulty of applying traditional notions of jurisdiction to cyber crime allegations.

Greenberg, A. (2007, July 16). The top countries for cybercrime (Links to an external site.). Forbes. Retrieved from http://www.forbes.com/2007/07/13/cybercrime-world-regions-tech-cx_ag_0716cybercrime.html

  • This short article explains the rankings of international cyber crime nations and how the notion of sovereignty impeded international cyber crime investigations.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Hernacki, A. T. (2012). Vague law in a smartphone world: Limiting the scope of unauthorized access under the Computer Fraud and Abuse Act. American University Law Review, 61(5), 1543-1584.

  • The full-text version of this article is available through the ProQuest database in the UAGC Library.  This article examines whether or not modern laws are specific enough to provide notice to potential defendants defining cyber crime and whether or not the vagueness of computer laws can provide a meaningful defense to those accused of cyber crimes.

KPMG International. (2011). Cyber crime – A growing challenge for governments (Links to an external site.) [PDF]. Issues Monitor, 8, 1-21. Retrieved from https://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/cyber-crime.pdf

  • This article argues for the need for governments to collaborate globally to effectively combat international cyber crimes.

Web Page

Pate & Johnson. (n.d.). Computer hacking and cyberstalking (Links to an external site.). Retrieved from http://www.pagepate.com/experience/criminal-defense/federal-crimes/federal-computer-crimes/
This short, one page attorney web page provides basic information about defenses to cyber crime allegations.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)

Recommended Resources


Brenner, S. W., Carrier, B., & Henninger, J. (2004). The Trojan horse defense in cybercrime cases (Links to an external site.). Santa Clara Computer & High Technology, (1), 1. Retrieved from http://digitalcommons.law.scu.edu/chtlj/
The full-text version of this article is available through the EBSCOhost database in the UAGC Library. One defense for cyber crime allegations stems from a defendant alleging that any harmful cyber crime activity from her or his computer was caused by malware that the defendant did not know existed within her or his computer. Basic notions of criminal liability concerning actus reus and mens rea are called into question with the “Trojan Horse Defense.”

Web Pages

Europol. (n.d.). The geographical distribution of cybercrime (Links to an external site.). Retrieved from https://www.europol.europa.eu/iocta/2015/distribution.html

  • This website provides an interactive map detailing the major, international sources of cyber crimes. Use this map to find additional information on the assigned countries for the interactive assignment.

Garrreynolds.com. (n.d.). Top 10 slide tips (Links to an external site.). Retrieved from http://www.garrreynolds.com/preso-tips/design/

  • This online resource provides helpful information on creating an engaging and interesting PowerPoint presentation.


MSCJ Resources (Links to an external site.) (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

Supplemental Materials

University of Arizona Global Campus. (n.d.). Jing quick-start guide (Links to an external site.) [PDF]. https://content.bridgepointeducation.com/curriculum/file/989618ed-43cf-4b24-b10a-1832a64024d8/1/Jing_Quick-Start_Guide.pdf

  • This guide will aid you in the use of Jing.

University of Arizona Global Campus. (n.d.). Screencast-O-Matic quick-start guide (Links to an external site.) [PDF]. https://content.bridgepointeducation.com/curriculum/file/62ef7e2a-3f35-4806-9cf5-d85877fca23a/1/Screencastomatic_Quick-Start_Guide.pdf

  • This guide will aid you in the use of Screencast-O-Matic.

University of Arizona Global Campus. Where to get free images. https://login.uagc.edu

  • This guide will aid you in finding copyright free images for your projects.

Stay Anonymous
With Our Essay Writing Service

The aim of our service is to provide you with top-class essay help when you ask us to write my paper; we do not collect or share any of your personal data. We use the email you provide us to send you drafts, final papers, and the occasional promotion and discount code, but that’s it!

Order Now