Would you expect to see changes in individual behaviours

Assignment Help Computer Engineering
Reference no: EM132218433 , Length: word count : 3000

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.

Read:

Lau, Y. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.

This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks:

Assume that an Australian State Government has reviewed the Singapore Government's Smart Nation Plan and has decided to implement their own Smart State Plan.

This will initially consist of a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. in their CBD to monitor citizens behaviour and address street crime.

1. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government's Smart Sensor Network by looking at:

a. The types or categories of people affected by this proposal,

b. What behavioural changes you might expect to see from normal citizens,

c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.

The next part of the Government's plan is to deploy a Smart WiFi Network which will consist of a series of sensor boxes to act as WiFi hotspots throughout the city.

This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi.

2. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government's Smart WiFi Network by looking at:

a. The types or categories of people affected by this proposal,

b. What behavioural changes you might expect to see from normal citizens using their mobile devices in the CBD,

c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.

d. What are the implications for you If you had sensitive information on your mobile device that you did not want to share?

The Smart State Plan will also enrol all citizens with a Digital Identity to ensure that they can correctly be identified and access services provided by the state both electronically and physically.

3. If you were visiting the State Capital after the Smart State Plan has rolled out, do you think that the use of a digital identity would assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.

4. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.

Each question is worth 25 marks and your overall score will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words.

Reference no: EM132218433

Questions Cloud

Define important characteristic of communities and biomes : Biodiversity is an important characteristic of communities and biomes. Efforts to preserve biodiversity, though intended to reduce human influence.
What are some of the groups that need accounting information : What are some of the groups that need accounting information? What kind of accounting information do they need? Why? Think of a company you've done business.
Summarize the article in two paragraphs : For your discussion post, your first step is to summarize the article in two paragraphs describing what you think are the most important points made.
Write a short driver program to show the features of code : Redefine the calculation of the area to calculate the surface area and add a member method to calculate the volume.
Would you expect to see changes in individual behaviours : Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
Discuss the methods for achieving each of the conditions : Do you think that the subtle use of language, such as the word chairman applied to a woman or stewardess instead of the gender-neutral flight attendant.
Determine an inventory policy for wine that yields : When working assume that a restaurant serves an average of 5,000 bottles of wine per year.
Calculate the channel capacity : MITS5003: Calculate the signal power received at control centre from one sensing device. Calculate the channel capacity.
How many subtopics are in the industry you selected : Select one of the industries that interests you, and briefly explain why. Identify how many subtopics are in the industry you selected.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd