Essay 7 | Computer Science homework help

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Order a Similar Paper HERE Order a Different Paper HERE

 

Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your essay as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For the essay you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. The citation should be in APA format. It should be 2-3 pages.

 

1.  Using argument components discussed in Chapter 3, assess arguments for and against the use of biometric technologies for security, especially in airports and large stadiums. (a) Should biometric technologies such as face-recognition programs and iris scanners be used in public places to catch criminals? Since 9/11 there is much more support for these technologies than there was when biometrics were used at Super Bowl XXXV in January 2001. (b) Granted that such technologies can help the government to catch criminals and suspected terrorists, what kinds of issues do they raise from a civil liberties perspective? (c) Compare the arguments for and against the use of biometric technologies in tracking down criminals to arguments discussed in Chapter 5. (d) Do you support the use of biometrics in large, public gathering places in the United States? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

2.  In looking at the case of Internet entrapment involving a pedophile that was discussed in this chapter (a) which arguments can be made in favor of entrapment or “sting operations” on the internet? (b) From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences, but can it be defended on constitutional grounds in the United States? (c) Justify your position by appealing to one or more of the ethical theories described back in Chapter 2. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

 3.  (a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful? (b) Why would cyberstalking be classified as a cyberrelated crime, according to this distinction? (c) Among cyberrelated crimes, is it useful to distinguish further between cyberexacerbated and cyberassisted crimes? (d) Why would cyberstalking be categorized as a “cyberexacerbated” rather than a cyberassisted crime? (e) Why not simply call every crime in which cybertechnology is either used or present a cybercrime? (f) Would doing so pose any problems for drafting coherent cybercrime legislation? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)