¶ … high school student named Marco, who claims he has just received an e-mail from another student threatening to commit suicide. Marco is not sure where the student sent the e-mail from. Write a brief report on how you would proceed, including what you should do first in this situation. The first step is to involve the law enforcement. They...
¶ … high school student named Marco, who claims he has just received an e-mail from another student threatening to commit suicide. Marco is not sure where the student sent the e-mail from. Write a brief report on how you would proceed, including what you should do first in this situation. The first step is to involve the law enforcement. They will need to employ computer technicians who would check about the origin and authenticity of the email.
The steps will go as follows: They will first need to establish the authenticity of the email which means they will need to make sure that the email actually came from the student who is threatening to commit suicide. Once the identity is verified, the law enforcement will have to immediately contact the disturb student's family to inform them of the situation. The law enforcement plays the most important role in such cases because teenage suicide is a serious problem in the U.S.
today and law enforcement will take everything that's required to nip the problem in the bud. 4. The disturb student will then require psychiatric help with the assistance of school counselors and family. 5. The student, Marco, who played an important role in this situation by informing the authorities, must be rewarded for his efforts.
This needs to be done to show other students that if they notice anything unusual about their friends' behavior or if someone sends them such messages, they need to immediately inform the law enforcement or 911 or just the school authorities. 6. Computer forensic team comes into this situation only when the family of the disturb student wants them to check the student's computer, emails and phone messages to find out the reason for his mental condition.
In most such cases, there is a possibility that the student is either being bullied or is facing a hard time in his relationship. Students are very sensitive to bad relationships or ridicule at this age and hence they need to be treated with sensitivity. There is likelihood that the computer or phone would contain messages that can give a clue about the circumstances of the student. 7. If the family allows, the computer forensic experts can seal the computer and take it for detailed inspection at their lab.
I will then check everything from his emails to his documents to his phone messages to determine what the student is going through and what are his circumstances that caused him to think of suicide. 8. If it appears that student is not being bullied and there is no other outside source for his mental condition, then the student might actually be suffering simply from a psychiatric problem that needs the assistance of a professional. 9.
The experts can then inform the family about the child's actual problem and what needs to be done from there on. 10. Since computer forensic experts are not medical experts, they can only try to reach as close to the possible cause of the problem as the evidence allows, the rest will still need to be determined by the psychiatrists. A mother calls you to report that her 15-year-old daughters has run away from home.
She has access to her daughters' e-mail account and says that her daughter has several e-mails in her inbox suggesting that she has run away to be with a 35-year-old woman. Write a brief report on how you should proceed. The problem of young girls running away from home is not very uncommon and hence the law enforcement knows how to proceed in this scenario.
However being a computer forensic expert, I will first determine if what the mother thinks is indeed true and if it is, how we must proceed from here. I will first gain access to the email address and check all emails. I will then also check the computer documents to see if any exchange of pictures took place. This would help us determine the nature of relationship between the girl and the woman.
We will also get a chance to see what other activities was she involved in and we will find out if she might have been involved with someone other than the woman. Once it is established that this 35-year-old woman was the only person who can be seen as a suspect, then we.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.