Describe the use of biometric technologies

Assignment Help Computer Engineering
Reference no: EM132246606

Question: Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your essay as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For the essay you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. The citation should be in APA format. It should be 2-3 pages.

1. Using argument components discussed in Chapter 3, assess arguments for and against the use of biometric technologies for security, especially in airports and large stadiums.

(a) Should biometric technologies such as face-recognition programs and iris scanners be used in public places to catch criminals? Since 9/11 there is much more support for these technologies than there was when biometrics were used at Super Bowl XXXV in January 2001.

(b) Granted that such technologies can help the government to catch criminals and suspected terrorists, what kinds of issues do they raise from a civil liberties perspective?

(c) Compare the arguments for and against the use of biometric technologies in tracking down criminals to arguments discussed in Chapter 5.

(d) Do you support the use of biometrics in large, public gathering places in the United States? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

2. In looking at the case of Internet entrapment involving a pedophile that was discussed in this chapter

(a) which arguments can be made in favor of entrapment or "sting operations" on the internet?

(b) From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences, but can it be defended on constitutional grounds in the United States?

(c) Justify your position by appealing to one or more of the ethical theories described back in Chapter 2. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

3. (a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful?

(b) Why would cyberstalking be classified as a cyberrelated crime, according to this distinction?

(c) Among cyberrelated crimes, is it useful to distinguish further between cyberexacerbated and cyberassisted crimes?

(d) Why would cyberstalking be categorized as a "cyberexacerbated" rather than a cyberassisted crime?

(e) Why not simply call every crime in which cybertechnology is either used or present a cybercrime?

(f) Would doing so pose any problems for drafting coherent cybercrime legislation? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

Reference no: EM132246606

Questions Cloud

Describe specific ways you will have considered the selected : What aspects of culture are key to consider when implementing your Strategic Plan? Provide your rationale.
Prepare all approprite journal entries : During Browne Company's first year of operations, credit sales totaled $200,000, Prepare all approprite journal entries relative to uncolectible accounts
What benefit will customers expect : How will you make money based on your costs and desired profits? Will you have different prices for different customers?
Prepare the journal entries to record the sale : Prepare the journal entries to record the sale and subsequent payments assuming Maxiant Corporation uses the gross method of accounting for receivables
Describe the use of biometric technologies : Compare the arguments for and against the use of biometric technologies in tracking down criminals to arguments discussed in Chapter 5.
What is quality and its importance to project success : What is quality and its importance to project success.
Estimate the stand-alone selling price : Estimate the stand-alone selling price of the software using the adjusted market assessment approach
Produce a personal budget based on the results : CONSUMER ARITHMETIC - MONEY, MEASUREMENT and RELATIONS - Produce a personal budget based on the results of your mathematical research
Discuss how whistleblowing could affect a companys future : What moral obligation, beyond the scope of your job, do you have to your employer? Explain your answer.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd