Verified Document

Scam Types: Mapping The Terrain Literature Review

A Peer Review of the Reality of Cybercrime Paper

In the Introduction to the Reality of Cybercrime Arce (2011) states that "The threat of cybercrime is of growing concern in our society…" (p. 1). This provides an attention-getting technique that is highly effective. The entire introduction follows suit and lays the foundation for the analysis. The reader has automatic buy-in due to the personal nature of how Arce relates the topic to the average daily consumer of digital media. For example, s/he states that "It is our responsibility as a society to prepare ourselves by taking the necessary countermeasures in order to prevent these types of attacks from occurring and unfortunately when they do occur, punish those to the fullest extent the law permits" (p. 1) the only suggested improvement for the introductory paragraph is to work on basic editing. For example, terms like 'full scale" and "law maker" need to be revised as "full-scale" and "lawmaker."

The purpose of the paper is made clear and well stated and the paper is cohesive and sticks to the purpose throughout. In the following four...

Parts of this document are hidden

View Full Document
svg-one

2-4). Most of the methods mentioned are aimed at catching attackers. One system, the Cyberterrorism First Responder is directed towards programmers and helps prevent future cybercrime (p.3). The body of the paper is well organized and demonstrates the writer's command of the researched material. Arce does a very good job of explaining cybercrimes that the audience is probably familiar with, but also those that the audience may not readily think of such as child exploitation, spamming and cyberstalking (p.4). The body of the paper could be improved upon in transitioning from paragraph to paragraph and through some editing for grammatical and APA formatting errors and revision sentences using passive voice.
The conclusion adds to the topic by restating the writer's purpose and by arguing in favor of systems for fighting cybercrime. No suggestions for improvement of the conclusion. It is impressive and…

Sources used in this document:
cited in Arce, 2011, paras. 2-4). Most of the methods mentioned are aimed at catching attackers. One system, the Cyberterrorism First Responder is directed towards programmers and helps prevent future cybercrime (p.3). The body of the paper is well organized and demonstrates the writer's command of the researched material. Arce does a very good job of explaining cybercrimes that the audience is probably familiar with, but also those that the audience may not readily think of such as child exploitation, spamming and cyberstalking (p.4). The body of the paper could be improved upon in transitioning from paragraph to paragraph and through some editing for grammatical and APA formatting errors and revision sentences using passive voice.

The conclusion adds to the topic by restating the writer's purpose and by arguing in favor of systems for fighting cybercrime. No suggestions for improvement of the conclusion. It is impressive and powerful as-is.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cybercrime Modern Scam: A Summary of the
Words: 1182 Length: 4 Document Type: Article Review

Cybercrime Modern Scam: A Summary of the Seven Most Threatening Scams of our Generation Intended Audience Cybercrime: Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types:

Cyber Crime Purpose & Audience
Words: 3159 Length: 7 Document Type: Literature Review

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Eric Purcell's "Cyber Crime --
Words: 605 Length: 2 Document Type: Peer-Reviewed Journal

Terence Watkins' "The Seven Scam Types: Mapping the Terrain of Cyber Crime: A Literature Review." This literature review is much more in-depth in that it connects each piece of literature wile giving relevancy to lie to the arguments contained. The author of this review was able to use his own insight to create a picture of the cyber crime taking place without jumping to subjective moral or ethical conclusions or

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now