Demonstrate an understanding of basic legal processes

Assignment Help Basic Computer Science
Reference no: EM131232241

Homework 1- Chapter5 and Research Paper Outline

Learning Objectives#1: Identify and analyze legal, ethical, social, and security issues related to network and stand-alone computer systems;#2Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law; and #3: Explain how regulations such as the Telecommunications Act of 1996 and industrial standards impact national and global computer interaction.

1. Suppose a denial-of-service (DoS) attack shuts down two dozen major websites, including your email server, Amazon.com, Google.com and Facebook. The attack is traced to one of the following perpetrators. Discuss if different penalties are appropriate depending on which perpetrator it is. Explain why and how these penalties would be different.

A. A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S. economy.

B. An organization publicizing its opposition to commercialization of the web and corporate manipulation of consumers.

C. A teenager using hacking tools he found on a website.

D. A hacker group showing off to another hacker group about how many sites it could shut down in one day.

2. Research paper outline.

A. Select any legal or ethical computing topic for your final research project.

B. Using Word, create a topic outline (I. A.1.a.).

i. The topic outline should include an Introduction, a Comparison of Viewpoints from literature on your topic, a Description of the Methods you plan to use to locate your research, a list of appropriate laws, an Opinion Summary, and a beginning List of References - you will be adding more as you write your research paper (use APA citation style formatting)

ii. Use a right-aligned header that contains your name and the date, and a footer that contains a centered page number

iii. Do NOT use justified paragraph alignment

Homework 2- Chapters6, 7, 8 and 9 (File #1)

Research Paper (File #2)

Learning Objective #2 Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law.

NOTE: Make sure your opinions are backed up with legal cases and or other references. Use APA citation style for these quoted or paraphrased references.

File #1 - Responses to the following questions

1. One ethical argument against offshoring jobs is that employee health and safety requirements are not as strong in some countries as they are in the United States. Evaluate this argument.

2. Many college students register for online classes rather than taking the same courses in a classroom. Discuss both advantages and disadvantages (to the students and to society in general) of students getting degrees solely from online education.

3. Software developers are sometimes advised to "design for failure." Give some examples of what this might mean.

4. As part of your job responsibilities, you oversee the installation of software packages for large customers. A recent order of laptops for a local school district requires webcam software to be loaded. You know that this software allows for remote activation of the webcam. Which laws and ethical considerations should you bear in mind?

File #2 Research paper (part of your Attendance/Discussion/Participation points)

Based on the outline you submitted as part of Project 4, submit your completed final research paper as a separate file from the answers you provided for the above questions. Do NOT click the SUBMIT button until both files have been uploaded.

If you need guidance in general on writing a research paper, a good source can be found at https://www.ruf.rice.edu/~bioslabs/tools/report/reportform.html.

• While there is no assigned length for this paper, be sure that your workcovers your topic's requirements, plus foot/endnotes and bibliography, using standard one-inch margins, 12-point font and double spacing.

• It must cover the topic effectively and present a well-developed thesis, supported by evidence from primary and secondary sources, not just your own opinion.

• Your work must in some way demonstrate an understanding of the development of scholarship on the topic-that is, the paper itself must incorporate in the text and notes an adequate discussion of the scholarly works on the subject.

• Every sentence with information from a source must give credit to the source. Otherwise, it is plagiarism.

• Proofread everything carefully.

• Be prepared to present your topic briefly to the class (in-class) or as a discussion (online students only).

Reference no: EM131232241

Questions Cloud

Create a strong working client-consultant partnership : How can one create a strong working client-consultant partnership? What tools and techniques might you use to establish the bond of trust in your relationships with clients
What are the steps in analyzing an ethical dilemma : What are the four elements that specify the types of behaviors that are judged underethical criteria? Which groups traditionally have been exempt from legal and moralculpability? Why?
What is the maximum conversion time : What is the maximum conversion time? - How many clock pulses are required to produce an output of 0100100100?
Define and analyze the regulations convoy trucking needs : Define and analyze the regulations Convoy Trucking needs to comply with as the company begins to service the new customer by transporting and storing hazardous materials
Demonstrate an understanding of basic legal processes : Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law. Use a right-aligned header that contains your name and the date, and a footer that contains a centered page number.
How the court did or should resolve your example : Based on your experience, the video, or a news story, relate a time when you believe that the law affected a business. Describe the events, the law, and how the court did or should resolve your example. What sources of law would have created or ..
How many clock pulses are required to produce an output : What is the maximum conversion time? - How many clock pulses are required to produce an output of 0100100100?
Analyze the affordable care law : For your project, analyze the Affordable Care Law in a 9-10 page paper not including the title or references pages. In your analysis you will need to address the following: How all three branches of government were involved in its creation, and the..
Design a lan for a very successful cpa firm : Design a LAN for a very successful CPA firm with five departments in one building and a total of 560 employees -  It wants to make sure that it can easily expand its LAN in the future without exorbitant costs and moving a lot of equipment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The privacy protection act

The Privacy Protection Act (PPA) as it relate to computer forensics

  Evaluate the level of impact of it-enterprise architecture

Evaluate the level of impact of IT / enterprise architecture on information management (e.g., the flow of information throughout the company / organization, etc.) within a company or industry of your choice

  What software developers and programmers use

Software developers and programmers use _____ to develop the logic of a solution prior to coding the solution.

  Algorithm to place cell phone base station along road

You wish to place cell phone base stations at certain points along road, so that every house is in four miles of one of base stations.

  Problem regarding the projected overhead rate

Assume next year's manufacturing overhead is estimated to be $2,000,000. Sales are projected to be $50,000,000, and machine hours are projected to be 200,000. What is the projected overhead rate?

  Which is more realistic

What is the difference between the constrained write and the unconstrained write assumptions? Which is more realistic?

  Create an android project that contains two pages

Create an Android project that contains two pages. The button on the first page would open the second page.The first page contains a label, which states your name (Juan Ruiz) and a button states "Click to see my favorite animal".

  Multiplication of two 4-bit numbers

Multiplication of two 4-bit numbers (as shown in Figure 1) can be implemented as a Wallace tree multiplier (as shown in Figure 2) by using carry saver adders.

  Simple way of detecting common mis-typings of card numbers

Credit card numbers have what is called a check digit. This is a simple way of detecting common mis-typings of card numbers. The algorithm is as follows:

  How skill set an it sales manager or who think broader skill

How does the skill set of an IT Sales Manager differ from that of the technical manager? Who do you think has the broader skills set

  Determine whether replication would be the right approach.

You are a database administrator for your company. With the acquisition of SNHU Appliances, your database is running very slowly. Your management has asked you to look into options to optimize the database. You think replication might be a good solut..

  Explaining constraint programming

It is about constraint programming. We have party organizations for being social. Every participant has their own preference list for parties, every party organizers has their own preference list for giving parties, too.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd