{"id":310,"date":"2022-04-21T00:56:05","date_gmt":"2022-04-21T00:56:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cwhee002\/?p=310"},"modified":"2022-04-21T00:56:06","modified_gmt":"2022-04-21T00:56:06","slug":"journal-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cwhee002\/2022\/04\/21\/journal-11\/","title":{"rendered":"Journal #11"},"content":{"rendered":"\n<p>The overlap between criminal justice and cyber-crime seem to wax and wane depending on how a typical crime is described. For instance, some cyber-crimes are considered to be a white-collar crime, but not all white-collar crimes are considered cyber-crimes. Cyber-crime can be described as a crime or any wrongdoing with the use of a computer. Whereas a white-collar crime can be considered by the definition by Edwin Sutherland as \u201ca crime committed by a person of respectability and high social status in the course of his occupation.\u201d Then you have regular crimes that go against federal or civil law such as theft or burglary. If by Sutherlands definition of \u201ca person of respectability and high social status in the course of his occupation\u201d commits a burglary but used his cell phone or computer to communicate with an accomplice, where does this crime then fall? Again, as I mentioned in the beginning, it depends on how the crime is described, and then ultimately who interprets the law of the crime at hand. One criminal offense can easily cross the lines of different disciplines within the criminal justice arena. In today\u2019s day and age, it is ever apparent that the majority of citizens use their cell phone every day. Of those everyday citizens, there is a percentage of them who may contact another via text message, email, or social media. These same individuals\u2019 cross paths and they speak to each other face to face. One of these individuals may turn the other in for harrassment, bullying, or anything else. The same falls true in how the \u2018crime\u2019 in interpreted or mainly how the individual researchers interpret the crime in their studies when the time comes. This same overlap described between criminal justice and cyber-crime, present the same overlap within disciplines discussed in class. Cybersecurity is its own discipline that sets to impede cybercrime by stopping it when encounter. Computer engineering and computer science are other disciplines that can overlap into cybersecurity where engineers and computer scientist develop and implement various technological aspects to curb cybercrime. This can take effect in firmware that is coded and then designed into new computers or various hardware. The more and more technology evolve, the more different disciplines begin to meld and overlap with one another.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The overlap between criminal justice and cyber-crime seem to wax and wane depending on how a typical crime is described. For instance, some cyber-crimes are considered to be a white-collar crime, but not all white-collar crimes are considered cyber-crimes. Cyber-crime can be described as a crime or any wrongdoing with the use of a computer&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cwhee002\/2022\/04\/21\/journal-11\/\">Read More<\/a><\/div>\n","protected":false},"author":22925,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/posts\/310"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/users\/22925"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/posts\/310\/revisions\/311"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwhee002\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}