WORD-PROJECT 2

advertisement
WORD-PROJECT 2--Project Instructions
Project 1
1. Write a 500 word research paper (minimum-including footnotes) titled Computer Ethics
(*see additional info below); it should include both computer ethics and computer crime
information
2. Use research information provided by instructor plus research you’ve done on the Internet;
include notes taken from film and handout; use parenthetical citations and footnotes
(explanatory notes). Create an outline for your paper on your resource page.**
3. Header information is the following: your Last Name and page #
4. Change the name and course information to the following: your First & Last Name; Word 2Project 1; Hour; Current Date
5. Create your own Works Cited page from the resources you used to write the paper using
proper MLA documentation style
6. Proofread and edit your document
7. Save into your Word Project 2 directory using the filename Word 2-Project 1
8. Print the document; hand write word count information above the title; include footnotes
and Works Cited page in word count
 Include definitions and examples of computer ethics and computer crimes including
viruses, worms, Trojan horses, etc.
 Describe the effect computer crimes have on our global society
 Explain what impact it might have on you and your family both now and in the future
 Describe what educational impact computer crimes might have
 Explain how to prevent it from happening to you
NOTE: This assignment is required in order to get a final grade for Computer Apps.
You may do your own Google searches for appropriate information. Be sure to cite all your
resources.
**If you find useful information on a website, please do not print from the website; instead copy
and paste the pertinent information to a Word resource document that you can save. Be sure to
also copy and paste the URL address where the information came from. Create an outline to plan
the writing of your paper (see below for an example).
I. Introduction
II. Topic Sentence
A. Supporting facts or info
B. Supporting facts
C. Transition sentence
III. Topic Sentence
A. Supporting facts
B. Supporting facts
C. Transition sentence
IV. Topic Sentence
A. Supporting facts
B. Supporting facts
C. Transition sentence
V. Conclusion
Computer Crimes Terminology
 Computer hacking
 Computer virus
 Computer worm
 Trojan horse
 Identity theft
 Credit card fraud
 Computer stalking
 Plagiarism
 Spyware
 Malware
Continued
Grading Rubric
 Introduction (+5)
 Crime definitions (+10)
 hacker, worm, virus, Trojan horse, stalking, credit card fraud, identity theft, plagiarism,
spyware, malware
 Effect on global society (+10)
 Impact on you and your family now and in the future (+10)
 Educational impact (+10)
 Prevention of cyber crimes (+10)
 Conclusion (+5)
 Parenthetical citations (+10)
 Explanatory notes in footnote style (must have at least two) (+10)
 Works Cited (+10)
 Editing (+10)
 typos
 grammatical errors
 proper MLA documentation style
Resources:
Website Compass Magazine: articles are in the project folder under Cybercrime Research
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
http://www.howstuffworks.com/virus.htm
http://ethics.csc.ncsu.edu/
http://library.thinkquest.org/26658/
http://cyberethics.cbi.msstate.edu/
http://www.brook.edu/its/cei/cei_hp.htm
http://www.southernct.edu/organizations/rccs/index.html
http://www.seop.leeds.ac.uk/entries/ethics-computer/
http://www.cybercrime.gov/index.html
http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167
http://cybercrime.planetindia.net/viruses.htm
Download