+1(316)4441378

+44-141-628-6690

Our Services

M7D1

This activity will address module outcomes 1, 2, 3, and 4. Upon completion of this activity, you will be able to:

Differentiate between ethical and legal considerations related to cybersecurity. (CO 5, 6)
Analyze the tension between security and civil liberties and identify challenges related to some key areas of national interest. (CO 5, 6)
Evaluate the expectation of the government in specific cases. (CO 5, 6)
Identify some regulations related to collecting and safeguarding consumer information. (CO 5, 6)
In June 2015, at the Electronic Privacy Information Center (EPIC) Champions of Freedom event, Apples CEO Tim Cook discussed the tensions between privacy and security, but restated his belief that people have a basic right to privacy. Less than a year later, there was a devastating terror attack in San Bernardino, California, and Apple and the FBI found themselves in the center of a debate between privacy and security. This is not the only case that has involved national security on one side and civil liberties on the other. The issues surrounding Snowden also brought up privacy right issues and national security concerns. Was the NSA improperly spying on US citizens? Should you trade security for fundamental freedoms? Is Snowden a hero because he informed the citizens of the United States, or is he a traitor? Though both cases represent legitimate priorities for Americans, the question remains: Can the United States provide both security and privacy to Americans when it seems that these fundamental concerns clash? Are legal and ethical issues at odds?

In this activity, you will examine this dilemma and have a chance to discuss your perspective.

Reference

Panzarino, M. (2015). Apples Tim Cook delivers blistering speech on encryption, privacy. TechCrunch. Retrieved from https://techcrunch.com/2015/06/02/apples-tim-cook-delivers-blistering-speech-on-encryption-privacy/

For this discussion activity, first select one of the following examples to read about and discuss:

Snowden
OR
Apple/FBI
You may use additional source material.

Refer to the following resources for the Snowden example:

U. S. House of Representatives. (2016, September 15). Executive summary of review of the unauthorized disclosures of former national security agency contractor Edward Snowden [PDF file size 750 KB]. Retrieved from https://fas.org/irp/congress/2016_rpt/hpsci-snowden-summ.pdf
Starr, B., & Yan, H. (2013, June 23). Man behind NSA leaks says he did it to safeguard privacy, liberty. CNN Politics. Retrieved from http://www.cnn.com/2013/06/10/politics/edward-snowden-profile/
Refer to the following resources for the Apple vs. FBI example:

Kharpal, A. (2016, March 29). Apple vs. FBI: All you need to know. CNBC. Retrieved from http://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html
Burger, C. (2016, March 2). Forbidden fruit: Apple, the FBI and institutional ethics. The Prindle Post. Retrieved from http://www.prindlepost.org/2016/03/apple-cyber-security/
Examine the following before you start your discussion:

Rainie, L., & Maniama, S. (2016, February 19). Americans feel the tensions between privacy and security concerns. PewResearchCenter. Retrieved from http://www.pewresearch.org/fact-tank/2016/02/19/americans-feel-the-tensions-between-privacy-and-security-concerns/
Now respond to the following questions:

What example did you select?
Describe some of the ethical and legal issues related to your topic.
What are some of the privacy concerns? What are the issues related to national security?
What are some of the broader issues? What is your perspective? Explain.

 

You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.

 

Latest completed orders:

Completed Orders
# Title Academic Level Subject Area # of Pages Paper Urgency
[order_calculator]
Copyright © 2016 Quality Research Papers All Rights Reserved