What risky activities do you partake in when you are on-line? How do those actions relate to routine activity theory?

Q#1- What risky activities do you partake in when you are on-line? How do those actions relate to routine activity theory?
Q#2- Do we need cybercrime-specific theories or are traditional criminological theories adequate
Chapter 10:
Q#1- Maintaining evidence integrity is one of the most important steps in the digital forensic investigation. Provide some examples of how the integrity of evidence can be discredited during a digital forensic investigation. What are some ways that law enforcement can ensure that evidence integrity is maintained during a digital forensic investigation?
Q#2- What are some of the problems law enforcement investigators face when collecting digital evidence from a crime scene?
Chapter 11:
Q#1- It is extremely important that digital forensic examiners are able to verify the authenticity of the digital evidence. Explain whether the courts should be concerned with the use of hash algorithms for verifying the authenticity of digital evidence.
Q#2- Provide two examples of how confirmation bias could influence the integrity of a case. What are some ways we can limit the influence of forensic confirmation bias?
Chapter 12:
Q#1- There are a number of exceptions to the warrant requirement for a search and seizure. Identify five different exceptions to this rule and create a different scenario for each that would involve the search and seizure of electronic evidence.
Q#2- Identify the four criteria for determining whether digital forensic expert testimony is admissible in court according to the Daubert standard. Assess each of these criteria and explain whether or not digital forensic evidence should be admissible in court.
Chapter 13:
Q#1- How could innovations, like Unmanned Aerial Vehicles (UAVs) or drones, be used by cybercriminals to effectively collect information or offend? How could law enforcement agencies around the world use these devices to disrupt cybercriminals generally?
– Based on everything you have read throughout this book, what do you think the future of cybercrime offending and offenders will look like?