Assignment 4: The Future of Digital Crimes and Digital Terrorism
Worth 250 points
In the United States, a number of law enforcement agencies, including the Secret Service, the Federal Bureau of Investigation (FBI), and the Department of Homeland Security among others have taken on roles to fight computer crimes and terrorism.
Use the Internet or library to research articles on the efforts of law enforcement agencies to combat digital crimes and digital terrorism, as well as the roles of such agencies in the future of the combat in question.
Write a four to five (4-5) page paper in which you:
1. Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
2. Explain the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Next, propose one (1) strategy that the U.S. could use in order to mitigate the challenges in question.
3. Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism.
4. Give your opinion of the key future trends in digital crime and digital terrorism. Next, provide one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism.
5. Use at least four (4) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
The specific course learning outcomes associated with this assignment are:
· Describe future trends in digital crime and terrorism.
· Describe law enforcement roles and responses.
· Explain the procedures in the investigation of computer-related crime.
· Describe the technologies and processes involved in digital forensics.
· Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, or war.
· Use technology and information resources to research issues in information technology in criminal justice.
· Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style convention.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric
Points: 250
Criteria
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the overall impac ...
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
1. Assignment 4: The Future of Digital Crimes and Digital
Terrorism
Worth 250 points
In the United States, a number of law enforcement agencies,
including the Secret Service, the Federal Bureau of
Investigation (FBI), and the Department of Homeland Security
among others have taken on roles to fight computer crimes and
terrorism.
Use the Internet or library to research articles on the efforts of
law enforcement agencies to combat digital crimes and digital
terrorism, as well as the roles of such agencies in the future of
the combat in question.
Write a four to five (4-5) page paper in which you:
1. Describe the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
2. Explain the existing challenges that result from the
independent nature of the law enforcement agencies within the
U.S. with regards to computer crimes and terrorism. Next,
propose one (1) strategy that the U.S. could use in order to
mitigate the challenges in question.
3. Explain the fundamental manner in which the U.S. could
align the efforts of federal agencies in order to better protect
the nation against digital crimes and terrorism.
4. Give your opinion of the key future trends in digital crime
and digital terrorism. Next, provide one (1) overall strategy that
the U.S. could use in order to combat digital crime and digital
terrorism.
5. Use at least four (4) quality references for this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
2. Your assignment must:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; references must follow
APA or school-specific format. Check with your professor for
any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required page length.
The specific course learning outcomes associated with this
assignment are:
· Describe future trends in digital crime and terrorism.
· Describe law enforcement roles and responses.
· Explain the procedures in the investigation of computer-
related crime.
· Describe the technologies and processes involved in digital
forensics.
· Explain the ethical concerns that information technologies
raise in society and the impact of information technologies on
crime, terrorism, or war.
· Use technology and information resources to research issues in
information technology in criminal justice.
· Write clearly and concisely about information technology in
criminal justice topics using proper writing mechanics and
technical style convention.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric
Points: 250
Criteria
Fair
70-79% C
Proficient
80-89% B
Exemplary
3. 90-100% A
1. Describe the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
Weight: 20%
Partially described the overall impact (e.g., economic, social,
etc.) of utilizing information technologies in combatting digital
crime and digital terrorism.
Satisfactorilydescribed the overall impact (e.g., economic,
social, etc.) of utilizing information technologies in combatting
digital crime and digital terrorism.
Thoroughlydescribed the overall impact (e.g., economic, social,
etc.) of utilizing information technologies in combatting digital
crime and digital terrorism.
2. Explain the existing challenges that result from the
independent nature of the law enforcement agencies within the
U.S. with regards to computer crimes and terrorism. Next,
propose one (1) strategy that the U.S. could use in order to
mitigate the challenges in question.
Weight: 25%
Partially explained the existing challenges that result from the
independent nature of the law enforcement agencies within the
U.S. with regards to computer crimes and terrorism. Partially
proposed one (1) strategy that the U.S. could use in order to
mitigate the challenges in question.
Satisfactorily explained the existing challenges that result from
the independent nature of the law enforcement agencies within
the U.S. with regards to computer crimes and terrorism.
Satisfactorily proposed one (1) strategy that the U.S. could use
in order to mitigate the challenges in question.
Thoroughly explained the existing challenges that result from
the independent nature of the law enforcement agencies within
the U.S. with regards to computer crimes and terrorism.
Thoroughly proposed one (1) strategy that the U.S. could use in
order to mitigate the challenges in question.
3. Explain the fundamental manner in which the U.S. could
4. align the efforts of federal agencies in order to better protect
the nation against digital crimes and terrorism.
Weight: 20%
Partially explained the fundamental manner in which the U.S.
could align the efforts of federal agencies in order to better
protect the nation against digital crimes and terrorism.
Satisfactorilyexplained the fundamental manner in which the
U.S. could align the efforts of federal agencies in order to better
protect the nation against digital crimes and terrorism.
Thoroughly explained the fundamental manner in which the
U.S. could align the efforts of federal agencies in order to better
protect the nation against digital crimes and terrorism.
4. Give your opinion of the key future trends in digital crime
and digital terrorism. Next, provide one (1) overall strategy that
the U.S. could use in order to combat digital crime and digital
terrorism.
Weight: 20%
Partially gave your opinion of the key future trends in digital
crime and digital terrorism. Partially provided one (1) overall
strategy that the U.S. could use in order to combat digital crime
and digital terrorism.
Satisfactorily gave your opinion of the key future trends in
digital crime and digital terrorism. Satisfactorily provided one
(1) overall strategy that the U.S. could use in order to combat
digital crime and digital terrorism.
Thoroughly gave your opinion of the key future trends in digital
crime and digital terrorism. Thoroughly provided one (1)
overall strategy that the U.S. could use in order to combat
digital crime and digital terrorism.
5. 4 references
Weight: 5%
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
5. quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
5-6 errors present
3-4 errors present
0-2 errors present
Level Two
Supply Chain Management
Lean
Learning ObjectivesTo understand what we mean by the term
leanTo understand key concepts associated with lean To
appreciate the various tools associated with lean
Question.....
How can businesses become 'leaner'?
DefinitionAccording to Slack (2010) lean is the elimination of
all waste in order to develop an operation that is faster, more
dependable, produces higher quality products and
services.Antony (2011) sees lean as ‘determining the value of
any process by distinguishing value-added activities or steps
6. from non-value added activities or steps and eliminating waste
so that every step adds value to the process’.
Watch…..
http://www.youtube.com/watch?v=wfsRAZUnonI
What is Lean
Value from the customers perspectiveContinuous
improvementElimination of wasteVisual
House of Lean
Key Lean Authors Womack, Jones & Roos Taiichi OhnoPeter
HinesBichenoMondenShingo
Lean and Waste (Muda)Toyota’s Chairman Fujio Cho identified
waste in:Waste from overproduction Making more than is
required by the customer, or to make it earlier than
required.Waste of waiting timeAny delay between when one
process step/activity ends and the next step/activity
begins.Transportation waste Movement of work between
departments or offices that do not add value of the product or
service.
7. Lean and Waste ContinuedInventory wasteMore materials or
information on hand than is currently required.Processing waste
Adding more value to a service or product than customers want
or will pay for.Waste of motion While ‘transportation’ refers to
the movement of the work, ‘motion’ involves movement of
workers.Waste from product defects Any aspect of the service
that does not conform to customer needs.
Lean Tools & Techniques5sValue Stream MappingTakt
timePoke YokeYamazumi boardA3 reporting
5sBased on good housekeepingIt is a method of simplifying
operations and processesCreates a proper environment for
standardised work5S’s is a series of logical stepsImproves
searching and fetching
5s ContinuedSort (Seiri) – Eliminate what is not needed and
keep what is needed. Straighten (Seiton) – Position things in
such a way that they can be easily reached whenever they are
needed. Shine (Seiso) – Keep things clean and tidy; no refuse or
dirt in the work area. Standardize (Seiketsu) – Maintain
cleanliness and order – perpetual neatness. Sustain (Shitsuke) –
Develop a commitment and pride in keeping to standards.
Value Stream Mapping
A snapshot picture of all processes that occur within a business.
Value adding (VA) vs Non value adding (NVA)Focuses on
8. what the ideal could look like whilst trying to solve current
problems
Value Stream Mapping – Current State Example
Value Stream Mapping – Future State Example
Takt TimeAims to match the pace of production with customer
demand.T = Ta/ TdExample:If a work centre had an available
time of 720 minutes per day (12 hours) and customer demand
was 600 units per day then 1.2 units must be produced every
minute.
Poke YokeShingo – Toyota Production SystemJapanese term for
‘mistake proofing’.Designed to prevent human errorsMistakes
can be caught quickly.Defects cost more the further they go
along the process
Yamazumi Boards
Allows us to examine value and non value adding elements of
the process, whilst also taking into account productive but NVA
elements.
9. A3 Reporting
Basic communication tool that tells a ‘story’Thinking succinctly
about problems and solutions
The Importance of Visual Aids
Encourages the involvement of everyone.Critical information at
the point of useStandardisation
SummaryLean has developed from JIT into a philosophy that
looks to do more with less. Its visual nature means that mistakes
cannot be hidden awayTools and techniques used within lean
can be applied to non manufacturing setting – they may just
need adapting!
To DoReadingRefer to weekly reading listOnline task Details on
moodle
Today.....We now:Understand what we mean by the term
leanUnderstand key concepts associated with lean Appreciate
the various tools associated with lean
References & Further Reading
Antony, J. (2011) ‘Six Sigma vs Lean: Some perspectives from
10. leading academics and practitioners’. International Journal of
Productivity and Performance Management 60 (2), 185 – 190
Slack, N., Chambers, S., Johnston, R. (2010) Operations
Management. 6th edn. Harlow: Prentice Hall
Womack, J., Jones, D. (1996) Lean Thinking: Banish Waste and
Create Wealth in Your Corporation. New York: Simon &
Schuster
Level Two
Supply Chain Management
Lean In Context
Learning ObjectivesTo review the concept of leanTo examine
lean in different contextsTo appreciate current research in the
area of lean
Review of Lean Manufacturing
What is LeanValue Customers perspectiveNVA and
VAElimination of waste (7 Wastes)Continuous Improvement
Visual control
Results Of Your 7 Waste Walks………
11. The Concept of Lean Thinking
Lean Thinking
Lean manufacturing looks to improve the processes whereas
lean thinking looks to change mindsets and culture. Wider than
the idea of lean manufacturing Organisation rather than just the
process
Lean ThinkingWomack and Jones (1996) suggest 5 principles of
lean thinking:Specify what creates value from the customers
perspectiveIdentify all steps across the whole value streamMake
those actions that create value flowOnly make what is pulled by
the customer just-in-timeStrive for perfection by continually
removing successive layers of waste
Putting Lean In Context
Contextual Lean Examples
ManufacturingAirportsHealthcareEducation
Manufacturing
Toyota Production System (TPS)Automotive Transition to wider
manufacturersNumerical data
12. AirportsIssues:Queues - check-in desks, security etcWaiting at
departure loungesDelayed departures Behind the scenes
Airports Lean '
Solution
s'Changing layoutStandardisation (case sizes,
processes)Resolving bottlenecksLuggage delivered to final
destination or express lanesPassport control on board aircraft
EducationIssues:Student Queues – enrolmentWaiting – marking,
emails, class etcSourcing informationQuality across the board
EducationLean '