Draft 1 Essay Example

  • Category:
  • Document type:
  • Level:
  • Page:
  • Words:


Summary Draft Presentation

Draft Table of Contents

2Abstract 1.0.

2Introduction of the Study 2.0.

2State of Art in United Arabs Emirates 3.0.

3Methodology for Data Collection 4.0.

3Theoretical Framework 5.0.

4Literature Review 6.0.

4Summary of the Research Questions 7.0.

4Aims and Objectives 8.0.

5Research Design and Methods 9.0.

5Gaps Identified 10.0.

5Rationale and Importance of the study 11.0.

6Contribution to New Knowledge 12.0.

6Result and Discussion 13.0.

6Conclusion 14.0.

  1. Abstract

This research is concerned with the infiltration of information and communication technologies (ICTs) while has been providing a range of benefits to individuals. As a result, the attention of the study is on cyber victimisation in United Arabs Emirates (UAE). Based on different theoretical models, the research is further concerned with the general understanding on the impact of cyber victimisation on victims as well as related technical, legal, professional and educational responses to cyber victimization. The abstract further provides an avenue through which the study assesses a number of law enforcement authorities in UAE and how these laws have put strategies of combating a broad range of computer related victimisation ranging from intrusions to property theft.

  1. Introduction of the Study

The research uses this section to introduce the research problem. Additionally, the introduction introduces the thesis statement which is cyber victimisation and the conceptualisation of a legal and regulatory framework to understand cyber victimisation in the UAE. The thesis statement helps in providing readers with the rational of the study. Consequently, this section introduces validated set of legal recommendations that can guide the improvement of the UAE’s legal system to understand cyber victimization to help understand the reason why the research topic is worthy of study.

  1. State of Art in United Arabs Emirates

Incidences of cyber-crime in UAE have been on increase. Currently, global penetration of networked communications has exposed different areas of society in UAE to the threats of cyber victimisations. Today, individual organisations and governments are victimised through the use of information and communications technologies. As it stands, there is need to assess avenues of combating cyber victimization in UAE since all members of society are subjected to victimisation in different ways and often these practices are online versions of traditional forms of crimes. As it stands, UAE experiences high cases of cybercrime against business, organisations and government institutions has major financial and economic impacts. On an individual level people are victimised both psychologically and financially. Psychological impacts represent a significant and pervasive problem for cyber victims and can result in depression, fear and anxiety, emotional trauma, and even suicide.

  1. Methodology for Data Collection

In order to attain research objectives and research questions, the research adopted a Delphi technique to gather data on legal strategies and regulatory approaches for preventing and combatting cybercrime. That is, the method combines expert opinion in a structured and iterative manner with the purpose of reaching a group consensus on addressing a complex problem. Additionally, an agreement was obtained through the synthesis of successive rounds of questionnaires interspersed with controlled feedback reports provided to panel members between rounds to guide the group toward the primary goal.

  1. Theoretical Framework

This section introduces two critical research theories:

  • Space Transition Theory and

  • Routine Activity and Self-Control Theory

The two theories have been introduced in the study to help in the conceptualization of the research topic. For instance, the first theory explains patterns and behaviors of cyber-crime offenders. The second theory on the other hand gives reasons why people are likely to engage in cyber-crime.

  1. Literature Review

This section gives readers collection of literatures regarding cyber victimisation and strategies that have been in place to deal with the crime. Initially, an overview of cybercrime is provided including a definition and outlining the different types of cybercrime.

  1. Summary of the Research Questions

The research identifies three distinct questions that are related to the purposes of the study. They have been identified to help the study focus and be clear to its objectives. These questions are:

  • What are the patterns of cyber victimisation in UAE?

  • How effective is the existing legal and regulatory approaches in the UAE to identify and address cyber victimisation?

  • What kind of legal and regulatory approaches can be proposed to identify and address cyber victimisation framework in the UAE?

  1. Aims and Objectives

Based on the population sample and scope of the study, the research identified the following aims and objectives:

  • Assess legal and regulatory approaches dealing with cyber victimisation in the UAE

  • Produce comprehensive legal guidelines for identify cyber victimisation in the UAE

The two points provided comprehensive legal guidelines for identify cyber victimisation in the UAE.

  1. Research Design and Methods

The research designs are premised on three critical aspects:

  • Exploratory and qualitative in approaching the thesis statement

  • Underpinned by an interpretivist perspective

  • Evaluation of proposals selection process

The designs and methods provide baseline of assessing cyber victimisation and incidences of computer related extortion and misuse.

  1. Gaps Identified

The main in the study incomprehensive model that can identify, define and categorise the key forms of cyber victimisation. Based on the gap, the research creates integration of space transition theory which has actually failed other studies in understanding the relationship between ability to commit physical space crime and the propensity of committing cybercrimes.

  1. Rationale and Importance of the study

  • The study will help in the understanding of the various processes victims undertake while reporting cases of victimization

  • It provides a platform for conceptualistion of statistics on reported cases and the nature of such cases

  • It suggests approaches that can be used to control incidences of cyber victimisation in United Arab Emirates

  1. Contribution to New Knowledge

The research brings three distinct contributions to new knowledge to the already existing information. These can be summarized as follows:

  • Categorisation of measures implemented nationally and internationally on incidences of cyber crime

  • Provide a regional understanding of cyber victimisation in cultural context of the UAE and understanding of appropriate systems and mechanism

  1. Result and Discussion

The research at its current state is yet to finalise on the results and discussions of the result findings.

  1. Conclusion

The research at its current state is yet to finalise on the conclusion that will be based on results and discussions of the result findings.