LAB. Assignment – Case Study 1
What is a Case Study
· The purpose of a case study is to walk the reader through a situation where a specific problem is presented, background information provided and a description of the solution given, along with how it was derived.
· A case study can be written to encourage the reader to come up with his or her own solution or to review the solution that was already implemented or to modify an existing solution to make it better.
· The goal of the writer is to give the reader experiences similar to those the writer had as he or she researched and navigated the situation presented to arrive at an acceptable solution.
1. HOW TO WRITE A CASE STUDY
Several steps must be taken before actually writing anything:
1. Describe Situation/Problem: Choose the situation on which to write
2. Background: Gather as much information as possible about the situation
3. Background: Analyze all of the elements surrounding the situation
4. Describe the Solution: Determine the final solution to be implemented
5. Analyze the Results of the Solution: Gather information about why the solution worked or did not work. Evaluate the findings or solution to the situation/problem.
2. For maximum points:
A thorough case analysis thus has several phases
A, define the problem.
B), List assumptions made,
c) Explore alternative solutions including consideration of costs and benefits
d) Develop three alternative action plans
e) Choose one of the plans to implement that can best resolve the issue most appropriately
f) Design accountability structures and processes to assess the outcomes
g) Ensure the resolution is effective and sustained/sustainable.
Source: http://education.cu-portland.edu/blog/curriculum-
instruction/how-to-write-a-case-study-the-basics/
Citation Style
APA style with a cover page is required. See
https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and
_style guide/general_format.html
File Formats (Creativity Counts)
A standard research paper format may be used for this. However, for maximum points, use the latest technological presentation tools or video to present your ideas (PowerPoint, Prezi, iMovie, Adobe Portfolio, Google Drive – Presentation, YouTube, etc.). You are not limited to this list of tools; however, study your desired tool carefully. Make sure that the resulting file is both creative and original, and designed for presentation to a professional audience.
Filename Format:
Case Study1
NAME: First Name Last Name (pptx/docx/…extensions vary by chosen tool) see File Formats section below.
Submission
Upload the resulting file via the Browse My Computer button for this Assignment.
Case to Analyze
Computerized digital forensic records are within reach and easily accessible when events such as the kidnapping and murdering journalist Daniel Pearl occurred. The United States authority was on the threshold of identifying victims (Daniel Pearl), the suspect (abductor), and witnesses who assisted in committing the crime. These days, the unlimited access to the internet and electronic mail (emails) is integrated into the corporeal world, indicating that crime on the internet and emails is snarled to crime in the physical biosphere and continue to threaten the security of vulnerable, innocent citizens across the globe. A computer, internet, and electronic mail (emails) are the object of a crime. A suspect connected to an organization’s secured network system can commit a crime, forge documents, break into other computers, and make such computers the instrument of the crime.
Computers, internet, and electronic mail (emails) are proven assets in digital forensic investigations, analyses, the production of evidence for presentation in the court. These resources are equally vulnerable to criminals and allow the increase in the use of technology by these criminals. Extensive and unrestricted use of computers, the internet, and emails in digital forensic investigation tend to support the production of reliable evidence and digital storage and traces to apprehend and prosecute offenders.
Scenario:
The upsurge in the use of internet, emails and technology by terrorists compelled the United States to enact the USA Patriot Act in 2001 in response to the breach of national security which led to the terrorist attack on the UAS and motivated the European Union to recommend related measures. Electronic mail (emails) ransom notes sent to abductors who murdered the journalist Daniel Pearl were instrumental in identifying and detaining the culprit who murdered Mr. Pearl in Pakistan. In this case, the “threat to life and limb” provision in the USA Patriot Act empowered Internet Service Providers (ISPs) to provide law enforcement unit with information quickly (Casey, 2011).
Question 1.
1.1: Provide a comprehensive narrative on the advantages of how the support of computer, internet, and electronic mails (emails) helped to locate perpetrators of Mr. Pearl’s murder in Pakistan.
1. 2: Define the USA Patriot Act and why it was instituted
1.3: As a forensic investigation, do you ardently support all-encompassing adoption of the USA Patriot Act in Daniel Pearl’s operation?
Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier
Science. Kindle Edition; San Diego: CA.
Academic Integrity/Plagiarism
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation or acknowledgement.
· Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.
Task
1. Use Case Study format to analyze the case. Read carefully, for maximum points section. Look at cases from the text of this class for inspiration.
2. Be sure to address all of the case study elements described herein.
3. Be sure to state your Full Name, Course Name and Number, and Semester on the cover/intro page/slides.
4. Show your creativity and originality. How would you solve this particular case?
2