Paper Structure
Introduction (1/2 – 3/4 page)
- Hook the reader with a real-world example or statistic about your chosen cybercrime
- Clearly define the specific form of cybercrime you will analyze
- Preview the three analytical dimensions (technical, social, legal) that structure the paper
- End with a thesis statement that frames your argument (e.g., “While [crime] may appear to be purely technical in nature, understanding its prevalence requires attention to the social motivations of offenders and the persistent limitations of legal enforcement mechanisms”)
Technical Dimension (1 – 2 pages)
- Explain how the cybercrime is technically executed in clear, non-technical language
- Describe the tools, vulnerabilities, or techniques involved
- If applicable, discuss the evolution of the crime (e.g., how techniques have become more or less sophisticated)
- Avoid overly detailed “how-to” content; focus instead on the strategic aspects of how the crime works
- Key question to address: What technical factors make this crime possible or attractive to perpetrators?
Social Dimension (1 – 2 pages)
- Identify and analyze the motivations, demographics, or social contexts of perpetrators
- Consider both individual-level factors (psychology, skill, intent) and structural factors (economic opportunity, community norms, organizational pressures)
- Discuss how the crime affects victims and communities
- If relevant, analyze the role of online communities or subcultures in facilitating the crime
- Key question to address: Who commits this crime, why do they commit it, and what social or organizational conditions enable it?
Legal Dimension (1 – 2 pages)
- Identify relevant federal and/or international laws that criminalize this activity
- Discuss how law enforcement agencies attempt to investigate, prosecute, and prevent this crime
- Analyze significant prosecutions, legal cases, or policy responses
- Identify challenges in enforcement (e.g., jurisdiction, anonymity, attribution, international cooperation)
- Consider gaps between the scope of the criminal activity and the capacity of legal systems to address it
- Key question to address: How do legal systems attempt to control this crime, and what are the practical and jurisdictional obstacles to effective enforcement?
Synthesis and Conclusion (1/2 – 3/4 page)
- Bring together insights from the technical, social, and legal dimensions
- Discuss how understanding all three dimensions provides a more complete picture than focusing on technology alone
- Reflect on implications for policy, prevention, or future enforcement strategies
- Conclude with a forward-looking statement about emerging challenges or changes in this form of cybercrime
Citation and Source Requirements
- Minimum of 8 scholarly sources (books, peer-reviewed journal articles, government reports, or credible investigative journalism)
- At least 3 sources must be from peer-reviewed academic journals in criminology, computer science, law, or related fields
- Use APA 7th Edition format for in-text citations and reference list
- Acceptable sources include:
- Academic books and journal articles
- Government reports and law enforcement publications (FBI, DOJ, Secret Service, INTERPOL)
- Industry reports and security research (e.g., from cybersecurity firms) when supplemented with academic sources
- High-quality investigative journalism from reputable outlets
- Not acceptable: Wikipedia, course lectures, personal blogs, or unattributed online sources
References
Chan, C.-k., Wang, X., & Yang, X. (2024). Prevalence and relationships of dating application usage, cyber-fraud and mental health among emerging adults in Hong Kong. Psychiatry Research Communications, 4, Article 100197.
BBC News. (2025, January 29). How Tinder Swindler Simon Leviev scammed his way around the world.
VG. (2019). Tindersvindleren [Special report in English].
Garaad, N. (2023). The Tinder Swindler: Analyzing public sentiments of romance fraud using machine learning and artificial intelligence. Journal of Economic Criminology, 2, Article 100023.
Lopez, K. (2022, February 3). The true story of the Tinder Swindler and where Simon Leviev is now. Esquire.
Newsweek. (2022, February 16). LLD Diamonds Simon Leviev response: Netflixs Tinder Swindler exposes Shimon Hayut.
Of, by and for the smartphone: Tinder Swindler investigation captures millions of readers. (n.d.). Global Investigative Journalism Network.
Organized Crime and Corruption Reporting Project. (2025, February 3). Tinder Swindler arrested in Georgia, placed in extradition custody.
People Staff. (2025, January 14). Where is Simon Leviev now? People.
Redling, E. (2023). Modern dating and performance: Creative blendings of practices and platforms. Journal Name, Volume(Issue).
Times of Israel. (2022, February 7). Tinder Swindler seduces way to top of Netflix charts.
Delano Cole van der Linde, LLB LLM LLD. (Year). Online Dating Fraud Under the Common Law and the Cybercrimes Act. Obiter, 45(2).

Leave a Reply
You must be logged in to post a comment.