BIT208: IT and Business Fraud
Assignment(40%)
Total:40 Marks
Due Date:Week 8, Week 12.
Assignment Overview
Research your topic and write a report analysing the technical, social, legal aspect. Recommend your own solution. Reference original laws (e.g. commlaw) or court cases. Provide all references (PDFs, links, etc). Identify all laws applicable in each region (Australian-Pacific, Europe, America, and Asia).
Your final report must include the following:
• Assignment Cover Page: (Use the cover sheet provided. Include the Title,
• Assignment number, Student Names and IDs, Subject)
• Title page (Name of report who it is prepared for, and authors)
• Executive summary (1 paragraph)
• Table of contents
• Body (Numerous headings and text at the write choice)
• References/ Bibliography
Submission:
Week 2: Topic Chosen (No two students do the same topic)
Week 5: Progress Report (MOODLE) - 0%.
Week 8: Draft Report (MOODLE) – 10%
Week 12: Final Report (TurnItIn) – 30%
See MOODLE for the exact dates and times.
Plagiarism
All used sources must be properly acknowledged with references and citations, if you did not create it. Quotations and paraphrasing are allowed but the sources must be acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism is failure for the assignment. The act of given your assignment to another student is classified as a plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as you have not contributed to the report. Copying from Youtube or other videos is also plagiarism (including transcripts). Citation in a video can be included as credits at the end.
Due Date &Submission
By the due date, you must submit:
1. Name your file with your student number and name.
2. Upload Report to TurnITIn and References to MOODLE.
To upload on TurnItIn, go to http://turnitin.com/
Late submission of assignments will be penalised as follows:
• For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day.
• For assignments more than 5 days late, a penalty of 100% will apply.
Your submission must be compatible with the software (PDF/Word/Video) in Melbourne Polytechnic, Computer Laboratories/Classrooms.
Extensions: Under normal circumstances extensions will not be granted. In case of extenuating circumstances—such as illness—a Special Consideration form, accompanied by supporting documentation, must be received before 3 working days from the due date. If granted, an extension will be only granted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only. Accordingly the student must submit within that time limit.
Penalties may apply for late submission without an approved extension.
Penalties: Academic misconduct such as cheating and plagiarism incur penalties ranging from a zero result to program exclusion.
Marking criteria:
Marks are allocated as indicated on each question, taking the following aspects into account:
Aspects Description
Analysis (if appropriate) Investigation, comparison, discussion
Explanation/justification Description/answer to the question
Presentation Inadequate structure, careless presentation, poor writing
Reference style Proper referencing if required
Plagiarism Copy from another student, copy from internet source/textbook, copy from other sources without proper acknowledgement
Marking Rubric for Exercise Answers
Grade
Mark HD
80%+ D
70%-79% CR
60%-69% P
50%-59% Fail
< 50%
Excellent Very Good Good Satisfactory Unsatisfactory
Analysis
Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent and convincing Adequate cohesion and conviction Argument is confused and disjointed
Effort/Difficulties/
Challenges The presented solution demonstrated an extreme degree of difficulty that would require an expert to implement. The presented solution demonstrated a high degree of difficulty that would be an advance professional to implement. The presented solution demonstrated an average degree of difficulty that would be anaverage professional to implement. The presented solution demonstrated a low degree of difficulty that would be easy to implement. The presented solution demonstrated a poor degree of difficulty that would be too easy to implement.
Explanation/
justification All elements are present and well integrated. Components present with good cohesion Components present and mostly well integrated Most components present Lacks structure.
Reference style Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors
Presentation Proper writing. Professionally presented Properly spoken, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation
Assignments Topics:
Students Topic
Student Name:
Student Number: Australian Anti-Piracy Laws (2015).
- Explain the law and how it will be used
- Explain how it can be misused
- Do you think it will work? Alternative? What are other countries doing?
- Who will it hurt and who will it protect? (In reality, not just who it is intended for)
Student Name:
Student Number: Bitcoins
- Research bitcoins. How it works and how it is used. (e.g. Bitcoin mining)
- Explain its advantages and disadvantages in detail (can it be tracked?)
- Fraud
Student Name:
Student Number: Crippleware verses Freeware versus educational verses Professional
- Explain the difference
- What type of infringements are they trying to mitigate
- Does it work?
Student Name:
Student Number: Freedom of Speech verses Protection of Children
- Explain governments (US, Europe, Asia, Australia-Pacific) approach
- Explain which laws were created
- Did they work?
Student Name:
Student Number: Freedom of Speech versus the China Great Firewall
- Explain what the government is trying to mitigate
- Explain the technical implementation – how to overcome it.
- Does this breach Freedom of Speech in Western Countries
Student Name:
Student Number: Sexting
- Explain what it is
- Technical possibilities to stop it
- Is it a breach of Privacy?
Student Name:
Student Number: Revenge Porn
- Explain what it is
- Technical possibilities to stop it
- What has governments (particular California) done to try and stop it?
Student Name:
Student Number: Online Consumer Profiling versus Privacy Laws
- Explain what it is
- Technical implementation
- Why are people concern?
Student Name:
Student Number: Online Self Regulatory Privacy
- Explain what it is
- Technical implementation (e.g. Privacy seals, Membership, etc)
- Does it work? What is the alternative?
Student Name:
Student Number: Do Not Track List versus the Privacy Laws
- Explain what it is
- Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
- Would it work? What is the alternative?
Student Name:
Student Number: Australian tax online services proposal
- Explain what it is
- What are other countries doing?
- Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
- Would it work? What is the alternative?
- Cloud Services implication?
Student Name:
Student Number: Plagiarism and Copyright
- What is it?
- Does Plagiarism infringe copyright?
- Have there been law cases? Verdict?
- Can a student be charge?
Student Name:
Student Number: Patent Protection of Software and Hardware
- What is it?
- Jurisdiction
- Examples of law suits (e.g. http://www.cnet.com/au/news/apple-v-samsung-patent-trial-recap-how-it-all-turned-out-faq/)
Student Name:
Student Number: Reverse engineering
- What is it?
- Does the current Australian laws provide adequate protection?
- Landmark cases?
- What are other countries doing?
Student Name:
Student Number: Small Business Fraud
- Explain the main types (False invoicing, EFT to personal accounts, Cheque/Payroll Fraud, Skimming)
- Does the current Australian laws provide adequate protection?
- Why does it happen?
- What are other countries doing?
- Long term impact?
- Who is the victim?
Student Name:
Student Number: Legal Issue with Open Source Code
- Explain legal issues with Open Source Code
- Conformity, detection, prevention
- Legal action
- Types
- What are governments doing?
- Which laws applies
Student Name:
Student Number: Cyberbullying and Cyberstalking
- What is it?
- Cases
- Prevention?
- Prosecution?
Student Name:
Student Number: Cyberterrorism
- What is it?
- Cases
- Prevention?
- Prosecution?
- What are governments doing?
- Which laws applies
Student Name:
Student Number: Computer Easter Eggs
- What is it?
- Legal Implication?
- What can companies do?
- What are governments doing?
Student Name:
Student Number: Computer Matching (for fraudulent activities)
- What is it?
- Legal Implication?
- Does it impede the Privacy laws?
- What are other government/countries doing?
Student Name:
Student Number: Web Defacement
- What is it?
- Legal Implication?
- What can companies do?
- What are governments doing?
- Classic Cases
Student Name:
Student Number: Virus/Worms
- What is it?
- Legal Implication?
- What can companies do?
- What are governments doing?
- Classic Cases
Student Name:
Student Number: Trojan Horse/Keyloggers
- What is it?
- Legal Implication?
- What can companies do?
- What are governments doing?