We're the ideal place for homework help. If you are looking for affordable, custom-written, high-quality and non-plagiarized papers, your student life just became easier with us. Click either of the buttons below to place your order.

Order a Similar Paper Order a Different Paper


  1. Include a title page for your own paper. This includes the “Running Head” in the page header, the title of your paper, and your name. If you don’t know how to edit a header in Word, Google for instructions on how to edit a header in the version of Word you are using and follow the instructions. Also add the university and class info as well as the date authoring the paper.
  2. Write a 150-250 word abstract for your the paper (on p. 2 of the Term Paper). The abstract should be a brief summary of your paper.
  3. Next you need a Table of contents page.
  4. Next you will start the paper. The 4 page starts counting from this page. All prior pages are pages for “metadata” information about the paper – and not part of the body of the paper.
  5. For each major section of the paper, you will need to add sub-headings. You may need as many subheading as needed, but each section must have a minimum of three sub-headings. Be sure to be descriptive in your sub-heading names, so that the content following the subheading is informative.
  6. More info on the body of the paper: Write the introductory paragraphs of your term paper (following the table of contents page) underneath the title of your paper. The introductory paragraphs should be at least one page long. These paragraphs should provide the reader with an overview of what you are covering. Your full 4 page term paper is due at the end of Week 7. In addition to the 4 pages of the paper itself, you must include a title page (abstract and table of contents pages) and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name, as well as the university info and the date paper was written.
  7. Your paper must be on a computer related crime which can be solved by using computer forensics. You must detail the procedures used in discovering and investigating the evidence. Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own.
  8. The last section of your paper is the list of references in APA Style format. Name the header “References” then list the references in alphabetical order of the authors’ last name. Include a minimum of 3-5 outside sources cited and referenced in the paper. Your references page must be written in APA citation style..

Originality can not exceed 15% on TurnItIn or will not be accepted.

Attached is the outline of my paper so this information has to be used


Outline: Argumentative Paper on Computer Related Crimes and Computer Forensics

Temeika Williams

American Military University


Professor Yongge Wang

November 14, 2021

Outline: Argumentative Paper on Computer Related Crimes and Computer Forensics

I. Introduction

a. Thesis: Computer forensics needs to be used in big organizations to solve critical crimes committed by using computers like employees internet abuse, intellectual property theft, investigation of fraud activities, and forgeries related matters achieved through computers to reduce losses incurred.

II. Body paragraph 1: Employees’ use of the internet in an unhealthy way has contributed to computer-related crimes in the workplace.

a. Supportive Evidence: “…cyberbullying occurs through different ways from aggressive and threatening behavior to social ostracism with severe effects on the general well-being of people whose identity are centrally based on social media ties” (Oksanen et al., 2020).

i. Explanation: This quote alludes that internet use in the workplace without control can cause vital computer crimes related to bullying, which is aggressive behavior threatening social ostracism.

ii. So What? : The quote demonstrates the need for organizations to develop and use computer forensics in the workplace to monitor and control the use of the internet that can increase computer crimes related to workers’ internet use.

III. Body paragraph 2: Another computer-related crime that needs to be solved through computer forensics in big data organizations is the issues of data forgeries and fraud activities committed by internal and external personnel in the workplace.

a. Supportive Evidence: The world is going through a significant data cohort, creating a profound paradigm shift in addressing growing cyber threats related to data forgeries and fraud due to an increase in the data files, which has promoted computer crime increase (Mishra, 2020).

i. Explanation: This quote shows that as organizations experience an increase in the size of data stored in the online systems, the challenge of handling and analyzing those increases causes many computer crimes like data forging and other fraud activities to occur, threatening data cohort.

ii. So What? : Showing that data forgeries and fraud are critical computer crimes, organizations dealing with bid data like financial institutions should ensure the use of computer forensic applications and systems to control and manage all their data transactions in relation to forensics laws and regulations.

IV. Body paragraph 3: Finally, organizations dealing with big data are responsible for enhancing their cyber security through the use of computer forensics to control all computer crimes related to intellectual property thefts.

a. Supportive Evidence: “…potential financial benefits have continued to favor data bleaching and collection which has high potentiality on increasing physical damage to critical infrastructure” (Tao et al., 2019).

i. Explanation: This quote shows that the computer-related crime of intellectual property theft has been promoted by some individuals robbing companies’ ideas, inventions, and creative expressions shared on their computer systems.

ii. So What? : This quote supports the claim that the intellectual property theft issue contributes to computer crime to most organizations dealing with bid data through explaining how ideas, inventions, and creative expressions of the company are robbed and therefore addressing the need for computer forensic in solving the issue.

V. Conclusion

a. Rephrased Thesis: Computer-related crimes are causing organizations severe losses due to poor management and control of all potential and vital company information. Therefore, corporates need to apply forensic principles in their data management to solve the issues of computer crimes.

b. Strong Closing: The use of computer forensics in the workplace is vital in solving the computer-related crime before the case mounts to an uncontrollable level.


Mishra, P. (2020). Big data digital forensic and cybersecurity. In Big data analytics and computing for digital forensic investigations (pp. 183-203). CRC Press.

Oksanen, A., Oksa, R., Savela, N., Kaakinen, M., & Ellonen, N. (2020). Cyberbullying victimization at work: Social media identity bubble approach. Computers in human behavior109, 106363.

Tao, H., Bhuiyan, M. Z. A., Rahman, M. A., Wang, G., Wang, T., Ahmed, M. M., & Li, J. (2019). Economic perspective analysis of protecting big data security and privacy. Future Generation Computer Systems98, 660-671.

Do you need academic writing help? Our quality writers are here 24/7, every day of the year, ready to support you! Instantly chat with a customer support representative in the chat on the bottom right corner, send us a WhatsApp message or click either of the buttons below to submit your paper instructions to the writing team.

Order a Similar Paper Order a Different Paper