Appendix E
Critical Analysis Forms
Fill out one form for each source.
|Source 1 Title and Citation: The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime |
|Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |
|Crime. Ed. Louise Gerdes. Detroit: Greenhaven Press, 2009. Opposing Viewpoints Resource Center. Gale. Apollo Library. 12 Dec. 2009 |
|. |
| | |The European Council-sponsored a multilateral treaty specifically addressing|
|1 |Identify the principal issue presented by the |the requirement for investigation and prosecution of the computer network |
| |source. |crimes. This treaty promotes a type of global law enforcement for computer |
| | |network-based crimes covered under the treaty. |
| | |One example of bias is the authors one sidedness point-of-view considering |
|2 |Identify any examples of bias presented by the |all cyber activate related to Cybercrimes or network-based crimes illegal. |
| |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |
| |determined this. |professionals to fix and repair holes in the security system. Whereas, |
| | |cracking; which is similar to hacking, is a process use by individuals |
| | |intending to do harm to others. |
| |