fter reviewing the content in Week #3’s folders, submit a thorough initial discussion board post on your understanding of how perpetrators may conduct tool cybercrimes to victimize their targets. Give strong examples. You may certainly refer to the
Massachusetts Attorney General’s
web site found in the Reading, Viewing, Listening folders, as well as video content in the
“419” Nigerian Scam documentary
(two-part series). Susan Brenner, author of our assigned text
Cybercrime: Criminal Threats from Cyberspace
, also discusses tool cybercrimes in Chapter 5 – another valuable resource to learn from case examples. Feel free to utilize outside sources as well. Just be sure to credit them in your post(s) if you choose to do so.
For full participation credit, your initial discussion board post must be submitted by 11:59 p.m. on Wednesday (5/27). At least two peer responses to your classmates must be posted by 11:59 p.m. on Saturday. The grading rubric for both initial and reply posts can be found in the Syllabus & Information course link in the Grading Rubrics folder.