Discuss some of the approaches to cybercrime

Assignment Help Computer Engineering
Reference no: EM132218438

Task

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy. Read: Lau, Y. (2015).

Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues.

Waltham, MA: Syngress. This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks: Assume that an Australian State Government has reviewed the Singapore Government's Smart Nation Plan and has decided to implement their own Smart State Plan.

This will initially consist of a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. in their CBD to monitor citizens behaviour and address street crime.

1. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government's Smart Sensor Network by looking at:

a. The types or categories of people affected by this proposal,

b. What behavioural changes you might expect to see from normal citizens,

c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.

The next part of the Government's plan is to deploy a Smart WiFi Network which will consist of a series of sensor boxes to act as WiFi hotspots throughout the city.

This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi.

2. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government's Smart WiFi Network by looking at:

a. The types or categories of people affected by this proposal,

b. What behavioural changes you might expect to see from normal citizens using their mobile devices in the CBD,

c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.

d. What are the implications for you If you had sensitive information on your mobile device that you did not want to share?

Reference no: EM132218438

Questions Cloud

Describe experiences with mass media : Describe one or two (1-2) experiences with mass media (movies or television) that affected you positively or negatively, explaining when, how, and why.
What would a utilitarian say is the right action : What would a utilitarian say is the right action in each of the cases? Give the reasoning by referring to Chapter 3 of the textbook, especially John Stuart.
Describe data flows in your company : Identify where you will use data collected from the Web and other sources of information such as sell statistics, user activity or social media data.
Discuss the moral reasoning involved in addressing : This symposium is a chance for you to discuss together the ethical issues and questions that the video raises, your own response to those issues.
Discuss some of the approaches to cybercrime : Discuss some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments.
Define important characteristic of communities and biomes : Biodiversity is an important characteristic of communities and biomes. Efforts to preserve biodiversity, though intended to reduce human influence.
What are some of the groups that need accounting information : What are some of the groups that need accounting information? What kind of accounting information do they need? Why? Think of a company you've done business.
Summarize the article in two paragraphs : For your discussion post, your first step is to summarize the article in two paragraphs describing what you think are the most important points made.
Write a short driver program to show the features of code : Redefine the calculation of the area to calculate the surface area and add a member method to calculate the volume.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write an int method named sum that accepts an integer array

Write an int method named sum that accepts an integer array , and the number of elements in the array and returns the sum of the elements of the array .

  Create a detailed use-case description for the main use case

Once you have a prescription, you go to an optical dispensary, where you select your frames and place the order for your glasses.

  What are the five major project fundamentals

What are the five major project fundamentals? List the five criteria for systems project selection. What does COTS stand for?

  Evaluate effectiveness of your program planning technique

Evaluate the effectiveness of your preferred program planning technique, based on its success in the real world.

  Declare a method get dollars of the cash register class

Declare a method get Dollars of the Cash Register class that yields the amount of the total sale as a dollar value without the cents.

  What is the maximum permitted burst length

An asynchronous transmission system employs unsynchronized transmitter and receiver clocks, both of which are controlled by quartz crystals.

  Write a statement that toggles on_off_switch

Assume that x is a string variable has been given a value. Write an expression whose value is true if and only if x is a lower-case letter.

  Case studies of mainframe to client-server engineering

Research the literature and/or Internet sources to find one or more papers that discuss case studies of mainframe to client-server reengineering. Present a summary.

  Write annotated summary of each article

Review at least 4 articles on Balanced Scorecard. Write annotated summary of each article. Use APA throughout.

  Develop a nested multiplication for the product

Modify MatMatDot so that it efficiently handles the case when A is lower triangular and B are upper triangular and both are n-by-n.

  To check a hamming code for a single-bit error

The program checks a Hamming code for a single-bit error based on choosing from a menu of choices.

  Write a method public static square root

Write a recursive helper method public static square Root Guess. Write a method public static square Root(double x) that uses the helper method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd