Reference no: EM133675262 , Length: word count:1000
Assessment: Research Report
Introduction
In this individual assessment, you will select a country and explain the legislated cyber security regulation, laws and ethics. You should provide your opinion on your findings. You are required to reference original laws (e.g. commlaw) or court cases and to provide all references (PDFs, links, etc).
Research and discuss cyber issues concern. Identify and compare your chosen country and applicable laws in each region (Australian-Pacific, Europe, America, and Asia). Recommend what type of policy/procedures an organisation should have in place on the issue (do not write the policy/procedure) Recommend any other initiatives (for example, Counter Ransomware Initiative) that might be applicable.
Your final report must include the following:
Assignment Cover Page: (Use the cover sheet provided. Include the Title,
Assignment number, Student Names and IDs, Subject)
Executive summary
Body (Numerous headings and text at the write choice)
References/ Bibliography
Topics:
You are not limited to topics below.
Australian Anti-Piracy Laws (2015).
Explain the law and how it will be used
Explain how it can be misused
Do you think it will work? Why/Why Not? Alternative? What are other
countries doing?
- Who will it hurt and who will it protect? (In reality, not just who it is intended for)
Bitcoins
Research bitcoins. How it works and how it is used. (e.g. Bitcoin mining)
Explain its advantages and disadvantages in detail (e.g. can it be tracked?)
Fraud
Crippleware verses Freeware versus educational verses Professional
Explain the difference
What type of infringements are they trying to mitigate?
Does it work?
Freedom of Speech verses Protection of Children
Explain various Government (US, Europe, Asia, Australia-Pacific) approaches
Explain which laws were created as a consequence of this issue.
Did they work?
Freedom of Speech versus the China Great Firewall
Explain what the Government is trying to mitigate
Explain the technical implementation - how to overcome it.
Does this breach Freedom of Speech in Western Countries
Sexting
Explain what it is?
Technical possibilities to restrict
Is it a breach of Privacy?
Revenge Porn
Explain what it is?
Technical possibilities to restrict.
What have Governments (particular California) done to try and stop it?
Online Consumer Profiling versus Privacy Laws
Explain what it is?
Technical implementation
Why are people concern?
Online Self Regulatory Privacy
Explain what it is?
Technical implementation (e.g. Privacy seals, Membership, etc)
Does it work? What is the alternative?
Do Not Track List versus the Privacy Laws
Explain what it is?
Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
Would it work? What is the alternative?
Australian tax online services proposal
Explain what it is?
What are other countries doing?
Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
Would it work? What is the alternative?
Cloud Services implication?
Plagiarism and Copyright
What is it?
Does Plagiarism infringe copyright?
Have there been law cases? Verdict?
Can a student be charge?
Patent Protection of Software and Hardware
What is it?
Jurisdiction
- Examples of law suits (e.g. https://www.cnet.com/au/news/apple-v- samsung-patent-trial-recap-how-it-all-turned-out-faq/)
Reverse engineering
What is it?
Do the current Australian laws provide adequate protection?
Landmark cases?
What are other countries doing?
Small Business Fraud
Explain the main types (False invoicing, EFT to personal accounts, Cheque/Payroll Fraud, Skimming)
Do the current Australian laws provide adequate protection?
Why does it happen?
What are other countries doing?
Long term impact?
Who is the victim?
Legal Issue with Open-Source Code
Explain legal issues with Open-Source Code
Conformity, detection, prevention
Legal action
Types
What are governments doing?
Which laws applies
Cyberbullying and Cyberstalking
What is it?
Cases
Prevention?
Prosecution?
Cyberterrorism
- What is it?
Cases
Prevention?
Prosecution?
What are Governments doing?
Which laws apply?
Computer Easter Eggs
What is it?
Legal Implication?
What can companies do?
What are Governments doing?
Computer Matching (for fraudulent activities)
What is it?
Legal Implication?
Does it impede the Privacy laws?
What are other Governments/Countries doing?
Web Defacement
What is it?
Legal Implication?
What can companies do?
What are Governments doing?
Classic Cases