Your Perfect Assignment is Just a Click Away

Starting at $8.00 per Page

100% Original, Plagiarism Free, Customized to Your instructions!


Defense to Cybdr Crime Allegations

Defense to Cybdr Crime Allegations

Defense to Cybdr Crime Allegations

  Defenses to Cyber Crime Allegations

Prior to beginning work on this discussion read the Brenner, Carrier, & Henninger (2004), and Hernacki (2012) articles. Review the instructions and research a minimum of one additional scholarly source to support your work.Traditional notions of due process, legal defense, and fairness apply to cyber crimes just as they apply to any other notion of more traditional criminal allegations. Throughout your readings this week you have learned that there are two fertile areas for a defense to a cyber crime allegation: factual and legal. A factual defense can easily be summed up by the inimitable legal scholar, Mr. Bart Simpson, of the long-running animated television series, The Simpsons. Bart routinely asserts the factual defenses to allegations of wrong doing as, “I didn’t do it; nobody saw me do it; there’s no way they can prove anything.” These are all valid and somewhat comprehensive definitions of a factual defense. A legal defense, on the other hand, deals with the government’s inability to overcome a defense based on the law in areas such as jurisdiction, vagueness of the law(s), double jeopardy, statutes of limitation, etc. Include the following elements in your 400 word initial post:

  • Define and examine both factual and legal defenses to cybercrime allegations.
    • Your examination must include at least one scholarly source beyond this week’s required readings.
  • Explain which of these two types of defense is the most likely to prevail in the greatest number of cyber crime cases and provide a rationale for your choice.
  • Evaluate ways in which future laws can limit defenses to cyber crime allegations.


Required Resources


Brenner, S. W. (2006). Cybercrime jurisdictionLinks to an external site.. Crime, Law and Social Change, 46(4), 189-206.

  • The full-text version of this article is available through the ProQuest database in the UAGC Library. This article examines the concept of jurisdiction and the difficulty of applying traditional notions of jurisdiction to cyber crime allegations.

Greenberg, A. (2007, July 16). The top countries for cybercrimeLinks to an external site.. Forbes. Retrieved from

  • This short article explains the rankings of international cyber crime nations and how the notion of sovereignty impeded international cyber crime investigations.
    Accessibility Statement does not exist.
    Privacy PolicyLinks to an external site.

Hernacki, A. T. (2012). Vague law in a smartphone world: Limiting the scope of unauthorized access under the Computer Fraud and Abuse Act. American University Law Review, 61(5), 1543-1584.

  • The full-text version of this article is available through the ProQuest database in the UAGC Library.  This article examines whether or not modern laws are specific enough to provide notice to potential defendants defining cyber crime and whether or not the vagueness of computer laws can provide a meaningful defense to those accused of cyber crimes.

KPMG International. (2011). Cyber crime – A growing challenge for governmentsLinks to an external site. [PDF]. Issues Monitor, 8, 1-21. Retrieved from

  • This article argues for the need for governments to collaborate globally to effectively combat international cyber crimes.

Web Page

Pate & Johnson. (n.d.). Computer hacking and cyberstalkingLinks to an external site.. Retrieved from
This short, one page attorney web page provides basic information about defenses to cyber crime allegations.
Accessibility Statement does not exist.
Privacy PolicyLinks to an external site.

Recommended Resources


Brenner, S. W., Carrier, B., & Henninger, J. (2004). The Trojan horse defense in cybercrime casesLinks to an external site.. Santa Clara Computer & High Technology, (1), 1. Retrieved from
The full-text version of this article is available through the EBSCOhost database in the UAGC Library. One defense for cyber crime allegations stems from a defendant alleging that any harmful cyber crime activity from her or his computer was caused by malware that the defendant did not know existed within her or his computer. Basic notions of criminal liability concerning actus reus and mens rea are called into question with the “Trojan Horse Defense.”

Web Pages

Europol. (n.d.). The geographical distribution of cybercrimeLinks to an external site.. Retrieved from

  • This website provides an interactive map detailing the major, international sources of cyber crimes. Use this map to find additional information on the assigned countries for the interactive assignment. (n.d.). Top 10 slide tipsLinks to an external site.. Retrieved from

  • This online resource provides helpful information on creating an engaging and interesting PowerPoint presentation.


MSCJ ResourcesLinks to an external site. (

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

Supplemental Materials

University of Arizona Global Campus. (n.d.). Jing quick-start guideLinks to an external site. [PDF].

  • This guide will aid you in the use of Jing.

University of Arizona Global Campus. (n.d.). Screencast-O-Matic quick-start guideLinks to an external site. [PDF].

  • This guide will aid you in the use of Screencast-O-Matic.

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.