.

Tuesday, April 30, 2019

Digital Evidence ethics and computer forensics Essay

digital Evidence ethics and computer forensics - Essay ExampleThe perpetrators can be the staff in the companies or even the student. When it comes to ethical issues, mortal or the culprit may need to run away from the issue saying that he or she has non move any rudeness since no electric shaver has gotten access to the poppycock. As per the joint act, a child in this issue is somebody who is degree centigrade the term of 18 years while child pornography is any form of material that shows or that suck up a child doing something that is related to sex. It includes exposure of a childs orphic split much(prenominal) as the genitals or the pubic areas. In addition, an adult disguised to be a child involving himself or she in a sexual trade is in addition considered a crime. Digital images of a current child or a fictitious child engaging the same conduct is also considered a crime Case study In 2007, there was a case in uplifted court in United States concerning a uni versity student who was distributing phonographic material within and outside the campus. In the case the student was charged with possessing materials that can be harmful to the children or even an adult who is not dexterous with the content of the material. According to the joint act, a child in this case is somebody who is blow the age of 18 years while child pornography is any form of material that shows or that depict a child doing something that is related to sex. It includes exposure of a childs private parts such as the genitals or the pubic areas. In addition, an adult disguised to be a child involving himself or she in a sexual conduct is also considered a crime. Digital images of a real child or a fictitious child engaging the same conduct is also considered a crime Case study In 2007, there was a case in high court in United States concerning a university student who was distributing phonographic material within and outside the campus. In the case the student was charge d with possessing materials that can be harmful to the children or even an adult who is not pleased with the content of the material. According to the joint act, a child in this case is somebody who is blow the age of 18 years while child pornography is any form of material that shows or that depict a child doing something that is related to sex. It includes exposure of a childs private parts such as the genitals or the pubic areas. In addition, an adult disguised to be a child involving himself or she in a sexual conduct is also considered a crime. Digital images of a real child or a fictitious child engaging the same conduct is also considered a crime. Source National Juvenile Online Victimization Study http//www.missingkids.com/en_US/publications/NC144.pdf Ethical issue The ability of an individual to aviate within the web pages and the links that are related to a website give him a chance to full follow you. Underlying this belief is the perception that virtual crimes are actio ns in cyberspace, with its shared virtual community of interests and virtual citizens, and consisting of a mixture of real identities, alter egos, clones and even virtual beings. Hence, it is fundamentally different from crimes committed in the physical world. As such, the application and standards of criminal laws for the virtual community should be markedly different from those commonly applied in the courts of the physical world. Though their views appear futuristic and far-fetched at this point in time, the potential for its full or partial adoption may be foreseeable. Already, there are hard talks of the creation of cyber-courts to administer and dispense cyber-justice, which may entail punishments that are unique to the medium and that may not have a real world equivalent (Rittinghouse 2009) Investigation technique Finding secure evidence was quite cumbersome because the internet use provides to the person who has the intention to stalk. The agencies that enforce laws need to reassessment the law in order for them to come up with new tools and mechanism to combat this crime. The more closet and disturbing idea is that the person committing these crimes has the resource for example the skills and expertise on the internet use and he or she is determinant to frustrate or rather humiliate the victims. Research has shown that such perpetrators can resolve to do so because of vengeance. Research has shown that stalkers are more experience in terms of age culture and professional background. The gender also has

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.