Discuss some of the approaches to cybercrime

Assignment Help Computer Engineering
Reference no: EM132218438

Task

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy. Read: Lau, Y. (2015).

Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues.

Waltham, MA: Syngress. This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks: Assume that an Australian State Government has reviewed the Singapore Government's Smart Nation Plan and has decided to implement their own Smart State Plan.

This will initially consist of a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. in their CBD to monitor citizens behaviour and address street crime.

1. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government's Smart Sensor Network by looking at:

a. The types or categories of people affected by this proposal,

b. What behavioural changes you might expect to see from normal citizens,

c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.

The next part of the Government's plan is to deploy a Smart WiFi Network which will consist of a series of sensor boxes to act as WiFi hotspots throughout the city.

This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi.

2. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government's Smart WiFi Network by looking at:

a. The types or categories of people affected by this proposal,

b. What behavioural changes you might expect to see from normal citizens using their mobile devices in the CBD,

c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.

d. What are the implications for you If you had sensitive information on your mobile device that you did not want to share?

Reference no: EM132218438

Questions Cloud

Describe experiences with mass media : Describe one or two (1-2) experiences with mass media (movies or television) that affected you positively or negatively, explaining when, how, and why.
What would a utilitarian say is the right action : What would a utilitarian say is the right action in each of the cases? Give the reasoning by referring to Chapter 3 of the textbook, especially John Stuart.
Describe data flows in your company : Identify where you will use data collected from the Web and other sources of information such as sell statistics, user activity or social media data.
Discuss the moral reasoning involved in addressing : This symposium is a chance for you to discuss together the ethical issues and questions that the video raises, your own response to those issues.
Discuss some of the approaches to cybercrime : Discuss some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments.
Define important characteristic of communities and biomes : Biodiversity is an important characteristic of communities and biomes. Efforts to preserve biodiversity, though intended to reduce human influence.
What are some of the groups that need accounting information : What are some of the groups that need accounting information? What kind of accounting information do they need? Why? Think of a company you've done business.
Summarize the article in two paragraphs : For your discussion post, your first step is to summarize the article in two paragraphs describing what you think are the most important points made.
Write a short driver program to show the features of code : Redefine the calculation of the area to calculate the surface area and add a member method to calculate the volume.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd