How governance must walk the high wire to ensure security

Assignment Help Business Law and Ethics
Reference no: EM131034363

Assignment: Internet Governance in 2025

Your work in this assignment will be based on an article which begins:

"IGF participants broke into three different rooms to discuss three different, possible potential-future scenarios for the Internet in 2025. In this session, the brief description given to the discussants noted that "Government Prevails" scenario imagines a future affected by man-made and natural challenges and disasters - wars, civil strife, an aging world and interventionist governments.

This scenario assumes that while "the ICT industry, media companies and NGOs" are the leading players on the Internet stage today [some people might disagree with this assumption], by 2025 governments and inter-governmental organizations will have come to rule the Internet as a result of actions taken to protect particular interests from negative exposure."

For this assignment, please read the full article and answer the questions below. You will find the full article at the following link:

igfusa.wordpress.com/2011/07/18/internet-governance-forum-usa-2011-potential-future-scenario-discussion-government-prevails/

You should also follow any other links or additional references that you find within the article.

Once you have read the information, in no less than 350 words discuss your understanding of internet security governance and the challenges of providing security while at the same time respecting privacy.

Explain your understanding of privacy laws and how governance must walk the high wire to ensure security without compromising privacy. Can the two be balanced or must one succumb to the other?

I need response must be at least 400 words in length. In this do not count your header, title or references towards your 400 words.

Reference no: EM131034363

Questions Cloud

Describe an algorithm to find the largest : Describe an algorithm to find the largest 1 million numbers in 1 billion numbers  Assume that the computer memory can hold all one billion numbers
What really determines the bandwidth of a cabling : What really determines the bandwidth of a cabling type is how fast a transmitting device, such as a NIC, can generate ______________ signals on the medium?
What is the largest possible value for n : A computer has 6 tape drives, with n processes competing for them. Each process will need two drives. What is the largest possible value for n, and the system still remain deadlock fre
The hardening checklist will take the form of a table : One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist.  Essentially, it is a document that serves as a guide to configuring a desktop / system security.  Please develop this guide for ..
How governance must walk the high wire to ensure security : Explain your understanding of privacy laws and how governance must walk the high wire to ensure security without compromising privacy. Can the two be balanced or must one succumb to the other?
Research paper will focus on issues and concerns : Research paper will focus on issues and concerns with Patch Management.  With the advent of many types of software and systems, patch management is major nightmare.
Describes central provisions of privacy laws : Describes central provisions of privacy laws - Presents the key provisions of the Australian Consumer Law
Identify the ordering systems that was adapted : Identify the Ordering Systems that was adapted. Track the sales performance of the company for one year and summarize the Forecast Accuracy.
The internet''s immune system : Watch the following Ted Talk Video titled "Hackers: The Internet's Immune System | Keren Elazari | TED Talks":  https://www.youtube.com/watch? v=erCAp_Bd0AQ

Reviews

Write a Review

 

Business Law and Ethics Questions & Answers

  Deontological ethics in organizations

Deontological Ethics in Organizations

  Protection of critical infrastructure and key resources

Your director is not aware of the involvement of the Department of Homeland Security (DHS) with private enterprise and has requested an information paper that provides her with an explanation about why this is important and how the DHS engages pri..

  Tim the toolman

Tim the Toolman and his assistant Al host a cable television do-it-yourself program together. Although from the show it would appear that the two of them have a partnership, in actuality Tim runs this as a sole proprietorship. Al, although extremely ..

  Which specific ideas or arguments from the authors have read

What is the most important lesson this course has taught you about science or technology? Which specific ideas or arguments from the authors we have read have taught you this lesson? Exactly why do you consider this lesson an important one

  Define and compare at least two of the ethical theories

Define and compare at least two of the ethical theories described by Baase. What are their strengths? In what areas do they lack? Do these theories hold up within our modern, technological society?

  Case assignment - accounting fraud at worldcom

Explain how these two accounting treatments increased WorldCom's net income and what effect did these accounting treatments have on the company's balance sheet?

  Discuss the ethical challenges posed by decentralization

Discuss the ethical challenges posed by decentralization and community-oriented policing. Provide examples of any relationship between unethical behavior and COPPS

  Why is perception important

As a criminal justice practitioner, why is "perception" important

  Does police discretion enable police discrimination

Evaluate how discretion may or may not allow for one's individual preju to influence the manner in which a person is dealt with a police encounter. Does police discretion enable police discrimination

  Write a minimum of two 2 pages comparing and contrasting

write a minimum of two 2 pages comparing and contrasting the tenant rights and duties of two states one state should

  Davis''s request attorney leigh ansell prepared

Davis's request, attorney Leigh Ansell prepared, and Davis acknowledged, a durable power of attorney appointing Ansell to act as Davis's attorney-in-fact. Ansell was authorized to sign "any . . . instrument of . . . deposit" and "any contract . . . r..

  Discuss the tort action of interference with contractual

in the summer of 2012 jpmorgan chase the biggest u.s. bank announced trading losses from investment decisions made by

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd