WORD-PROJECT 2--Project Instructions Project 1 1. Write a 500 word research paper (minimum-including footnotes) titled Computer Ethics (*see additional info below); it should include both computer ethics and computer crime information 2. Use research information provided by instructor plus research you’ve done on the Internet; include notes taken from film and handout; use parenthetical citations and footnotes (explanatory notes). Create an outline for your paper on your resource page.** 3. Header information is the following: your Last Name and page # 4. Change the name and course information to the following: your First & Last Name; Word 2Project 1; Hour; Current Date 5. Create your own Works Cited page from the resources you used to write the paper using proper MLA documentation style 6. Proofread and edit your document 7. Save into your Word Project 2 directory using the filename Word 2-Project 1 8. Print the document; hand write word count information above the title; include footnotes and Works Cited page in word count Include definitions and examples of computer ethics and computer crimes including viruses, worms, Trojan horses, etc. Describe the effect computer crimes have on our global society Explain what impact it might have on you and your family both now and in the future Describe what educational impact computer crimes might have Explain how to prevent it from happening to you NOTE: This assignment is required in order to get a final grade for Computer Apps. You may do your own Google searches for appropriate information. Be sure to cite all your resources. **If you find useful information on a website, please do not print from the website; instead copy and paste the pertinent information to a Word resource document that you can save. Be sure to also copy and paste the URL address where the information came from. Create an outline to plan the writing of your paper (see below for an example). I. Introduction II. Topic Sentence A. Supporting facts or info B. Supporting facts C. Transition sentence III. Topic Sentence A. Supporting facts B. Supporting facts C. Transition sentence IV. Topic Sentence A. Supporting facts B. Supporting facts C. Transition sentence V. Conclusion Computer Crimes Terminology Computer hacking Computer virus Computer worm Trojan horse Identity theft Credit card fraud Computer stalking Plagiarism Spyware Malware Continued Grading Rubric Introduction (+5) Crime definitions (+10) hacker, worm, virus, Trojan horse, stalking, credit card fraud, identity theft, plagiarism, spyware, malware Effect on global society (+10) Impact on you and your family now and in the future (+10) Educational impact (+10) Prevention of cyber crimes (+10) Conclusion (+5) Parenthetical citations (+10) Explanatory notes in footnote style (must have at least two) (+10) Works Cited (+10) Editing (+10) typos grammatical errors proper MLA documentation style Resources: Website Compass Magazine: articles are in the project folder under Cybercrime Research http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html http://www.howstuffworks.com/virus.htm http://ethics.csc.ncsu.edu/ http://library.thinkquest.org/26658/ http://cyberethics.cbi.msstate.edu/ http://www.brook.edu/its/cei/cei_hp.htm http://www.southernct.edu/organizations/rccs/index.html http://www.seop.leeds.ac.uk/entries/ethics-computer/ http://www.cybercrime.gov/index.html http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167 http://cybercrime.planetindia.net/viruses.htm