1) Choose a current or emerging technology.
2) Describe the specifications of your chosen technology and the capabilities of it.
3) Explore the various ways the technology can be and is vulnerable to cybercrime.
4) Discuss whether any criminological or cybercrime-specific theory is useful in determining likely offenders and/or victims, and who those offenders and/or victims might be.
5) Explain responses to the types of cybercrime your technology is vulnerable to. Include legislative, law enforcement, societal, private industry, technological etc. As well, discuss the ethics of current responses.
6) Argue whether those responses are adequate. If they are, express why. If they are not, make recommendations that you feel would help prevent cybercrimes with this technology in the future.