Skip to main content

Logbook

Date

Plans

Mon 20th February

Discuss all options for the topic of the vlog

Wed 22nd February

Done our research on the chosen topic + discuss structure + separate work

Sun 26th February

Finalize script 

  • Dille: Introduction statement - interview videos

  • Renée: statistics, surveys, and news headlines on cybercrimes.

  • Lotus: Prepare interview questions, writing and structuring script

  • Amandine: statistics around the world and news headlines on cybercrimes 

Mon 27th February

Combine script and structure + start filming

  • Lotus: Presenter in the vlog, making changes to the script while filming, discussing and changing structure and content of vlog.

  • Amandine : one of the interviewee in the vlog

Wed 1st March

Finalize filming + teams interview

Thu 2nd March - 4th March

Edit vlog through Canva 

  • Dille: cut all videos, transitions, newspapers, interviews, etc.

  • Renée: implement statistics, surveys, and news headlines on cybercrimes

  • Amandine: implement statistics, surveys, and news headlines on cybercrimes

4th March - 6th March 

Topics of our blogs: 

  • Dille: lack of social awareness on the dangers but also possibilities of online vigilantism. 

  • Renée: ethical hackers as new actors in the private policing sphere: Is it an effective solution?

  • Lotus: Policing revenge porn: social, practical, and legal boundaries.

  • Amandine: The struggle of combating child pornography through public policing

6th March 

Upload everything on our website

Comments

Popular posts from this blog

A double-edged sword: the potential benefits and risks associated with the use of online platforms in fighting crime. Written by: Dille Wienese

  "Technology is a tool that can allow us to create a better future, but it is not a silver bullet." -        Tim Cook, CEO of Apple Inc.   On the 18 th of March 2019, the Netherlands was shaken by a devastating attack that occurred on a tram in Utrecht. The incident resulted in the loss of four lives and left several others injured or traumatized. The perpetrator, Gökmen T., was apprehended on the same day after a manhunt and has been sentenced to life in prison (Korvinus, 2021). Following the attack, the danger level was raised to an unprecedented level of 5, which is the highest level possible. Meanwhile, group chats of my family and friends started circulating pictures of possible suspects, hints, and motives of the shooter. Although I did not think much of it then, I now realize that such speculation can have dire consequences for innocent individuals suspected of a crime. Afterward, an innocent man who was detained in connection with the Ut...

The struggle of combating child pornography through public policing. Written by: Amandine Ducros

  The rise of child pornography in the modern era     The new growth of information technology has introduced a new form of criminality to the criminal justice system : cyber crime (Marcum, Higgins, Freiburger & Ricketts, 2010). Cyberspace has no physical geography, no territorial boundaries exist (Wells, 2000). Cyber child porn, like cyber crime, is difficult to control because by its very nature its disrespects national boundaries ( Schell, Martin, Hung, & Rueda , 2 007 ), making the task of the police force even more complicated. Indeed, information communication technology facilitates abuse and exploitation of children online, especially child pornography (Jalil, 2015). Child pornography can be defined as the sexually explicit pictures or films involving younger people under the age of 18  (Marcum, Higgins, Freiburger & Ricketts, 2010) and is available on the Internet in many different formats : pictures, videos, sound files, stories (Burk, Sowerbut...

Vlog

Our video on cybercrime awareness is an informative and engaging resource that helps viewers understand the importance of staying safe online. With the rise of technology, it's becoming increasingly common for individuals to fall victim to cybercriminals who use various tactics to steal personal information and wreak havoc on our digital lives. In the video, we provide viewers with practical tips and advice on how to protect themselves from cybercrime, such as creating strong passwords, avoiding phishing scams, and being cautious when sharing personal information online. Please subscribe if you want to stay tuned for similar videos Reference List - Vlog Butler, S. (2023, March 2). Cyber-attack on WH Smith targets personal staff details . The Guardian. Retrieved March 6, 2023, from https://www.theguardian.com/business/2023/mar/02/cyber-attack-on-wh-smith-targets-personal-staff-details   Global, E. Y. (2019, April 9). Cybercrime: What does the most damage, losing data or trust? EY....