Can we still claim to live in a free society

Assignment Help Other Subject
Reference no: EM132240604

Question: Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your essay as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For the essay you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. The citation should be in APA format. It should be 2-3 pages.

1. Strong arguments can be given as to why encryption tools are needed to safeguard communications in cyberspace, yet these tools can be used by terrorists and criminals to protect their communications in cyberspace.

(a) In the wake of September 11, can a case be made for not allowing ordinary users to employ strong encryption tools in Internet communications?

(b) Can we still claim to live in a free society if plans for government interception of email communications, as provided for in the Homeland Security Act

Homeland Security Act 2002, Public Law 107-296, SEC. 896. AUTHORITY TO SHARE ELECTRONIC, WIRE, AND ORAL INTERCEPTION INFORMATION, are be implemented? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

2. In the discussion of Internet anonymity, some forms of anonymous behavior in cyberspace can have profound ethical implications. Imagine that there is a very close political election involving two candidates who are running for a seat in a state legislature. The weekend before citizens will cast their votes, one candidate decides to defame his opponent by using an anonymous remailer service (which strips away the original address of the sender of the email) to send a message of questionable truth to an electronic distribution list of his opponent's supporters. The information included in this email is so defamatory that it may threaten the outcome of the election by influencing many undecided voters, as well as the libeled candidate's regular supports, to vote against her.

(a) Does the "injured" candidate in this instance have the right to demand that the identity of the person using the anonymous remailer (who she suspects for good reasons to be her opponent in this election) be revealed?

(b) Why or why not? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

Reference no: EM132240604

Questions Cloud

Identify associated body system affected by kidneys disease : NURSING DIAGNOSIS: PLAN OF CARE - Identify associated Body System(s) affected by disease: immune system, kidneys
Briefly explain which level of requirement holley endorses : Holley presents five different degrees or levels of requirement, ranging from a low/undemanding requirement, all the way up to high.
Discuss stakeholder identification and prioritization matrix : Continuing with the Suburban Homes Construction Project case study found at the end of chapter 6 complete the Stakeholder Matrix.
What types of countermeasures need to be implemented : Start a discussion thread and discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring.
Can we still claim to live in a free society : Can we still claim to live in a free society if plans for government interception of email communications, as provided for in the Homeland Security Act
What is the economic logic of federico minoli turnaround : What is the economic logic of Federico Minoli's turnaround (i.e., explain the details of the strategy employed)?
Warby parker is a new york city eyewear startup : Warby Parker is a New York City eyewear startup that's quickly disrupted the old fashion eyewear business.
Described as follower influencing characteristics : How do education and experience, described as follower influencing characteristics, affect effective followership?
Suggested guidelines to becoming an effective follower : Give examples of how you or someone you worked with employed some of the suggested guidelines to becoming an effective follower.

Reviews

Write a Review

Other Subject Questions & Answers

  Distinction between diplomatic and legislative immunity

xplain the distinction between diplomatic immunity and legislative immunity. Next, support or criticize the premise that diplomatic immunity is vital for Americans abroad

  Create an agent to solve the n-puzzle game

In this assignment you will create an agent to solve the n-puzzle game (i.e. the 8-puzzle game generalized to an n × n array). You may visit mypuzzle.org/sliding for a refresher of the rules of the game

  Write a paper on the cancer registry

Critical thinking topic the Cancer Registry. Before beginning, read the following website: Write a ONE PAGE (DOUBLE SPACED) paper on the Cancer Registry.

  Describe the levels of data measurement

Contrast quantitative data and qualitative data with citation and reference. Evaluate tables and charts used to represent quantitative and qualitative data. Describe the levels of data measurement

  Review of the employees predictors of violence factors

The results of the interview with the employee (a description of your mock interaction with and the mental status examination of the employee).

  Prior to intubation for a surgical procedure

Prior to intubation for a surgical procedure, the anesthesiologist administered a single dose of the neuromuscular blocking agent, succinlycholine, to a 23 year-old male to provide muscular relaxation during surgery and to facilitate the insertion of..

  Derive the probability

On a 2-D regular (not wrapped-around) mesh, a message from a source (Xs, Ys) is to be sent to a destination (Xd, Yd). Derive the probability in terms of Xs, Xd, Ys and Yd

  The history of early childhood education in america

Briefly summarize each event in your own words. Explain how you think each event will impact your work in early childhood education.

  Develop a portfolio based on a research hypothesis

Assessment Task: Develop a portfolio, based on a research hypothesis and collect the data/information in the unit practical sessions

  Who performed better on the given exam

Ron, wouldn't this be indicative of poor understanding of material? If your performance on exam matches your actual knowledge. Who performed better on the exam?

  Instructional methods of presenting learners

Evaluate the instructional methods of presenting learners with factual material versus comrising learners in a dialogical process.

  Which activities did you find the most challenging

Which activities did you find the most challenging? Describe how you improved your knowledge, skills, abilities, and yourself through this course.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd