Reference no: EM133723934 , Length: word count:1000
Assessment: Research Report
Introduction
In this individual assessment, you will select a country and explain the legislated cyber security regulation, laws and ethics. You should provide your opinion on your findings. You are required to reference original laws (e.g. commlaw) or court cases and to provide all references (PDFs, links, etc).
Research and discuss cyber issues concern. Identify and compare your chosen country and applicable laws in each region (Australian-Pacific, Europe, America, and Asia). Recommend what type of policy/procedures an organisation should have in place on the issue (do not write the policy/procedure) Recommend any other initiatives (for example, Counter Ransomware Initiative) that might be applicable.
Your final report must include the following:
Assignment Cover Page: (Use the cover sheet provided. Include the Title,
Assignment number, Student Names and IDs, Subject)
Executive summary
Body (Numerous headings and text at the write choice)
References/ Bibliography
Topics:
No two students can do the same topic. You are not limited to topics below.
Topic
Australian Anti-Piracy Laws (2015).
Explain the law and how it will be used
Explain how it can be misused
Do you think it will work? Why/Why Not? Alternative? What are other
countries doing?
- Who will it hurt and who will it protect? (In reality, not just who it is intended for)
Bitcoins
Research bitcoins. How it works and how it is used. (e.g. Bitcoin mining)
Explain its advantages and disadvantages in detail (e.g. can it be tracked?)
Fraud
Crippleware verses Freeware versus educational verses Professional
Explain the difference
What type of infringements are they trying to mitigate?
Does it work?
Freedom of Speech verses Protection of Children
Explain various Government (US, Europe, Asia, Australia-Pacific) approaches
Explain which laws were created as a consequence of this issue.
Did they work?
Freedom of Speech versus the China Great Firewall
Explain what the Government is trying to mitigate
Explain the technical implementation - how to overcome it.
Does this breach Freedom of Speech in Western Countries
Sexting
Explain what it is?
Technical possibilities to restrict
Is it a breach of Privacy?
Revenge Porn
Explain what it is?
Technical possibilities to restrict.
What have Governments (particular California) done to try and stop it?
Online Consumer Profiling versus Privacy Laws
Explain what it is?
Technical implementation
Why are people concern?
Online Self Regulatory Privacy
Explain what it is?
Technical implementation (e.g. Privacy seals, Membership, etc)
Does it work? What is the alternative?
Do Not Track List versus the Privacy Laws
Explain what it is?
Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
Would it work? What is the alternative?
Australian tax online services proposal
Explain what it is?
What are other countries doing?
Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
Would it work? What is the alternative?
Cloud Services implication?