Evaluate the ethical and legal issues inherent to techniques used to protect potential targets from cyber criminals.

Government Cybercrime Report

For this assignment, you will take on the role of the newly appointed Special Assistant to the President of the United States on issues of cybersecurity for the White House. The President would like you to prepare a detailed report on the current state of challenges facing the United States concerning cybercrime. In the creation of this Report, it is paramount to include information in the form of peer-reviewed and/or scholarly research to support any statements made. You must research a minimum of five peer-reviewed articles and/or scholarly sources beyond those included in this course for this assignment.

In your report, please make certain to include the following headings and content.

Section One: Problems (3-4 pages)

Describe the current nature and extent of the cybercrime problem in the United States.
Explain the ways in which businesses and individuals are affected by cybercrime.
Analyze the limitations of governmental investigation of cybercrime.
Evaluate how individual and business attempts to protect against cybercrime affect investigations.

Section Two: Strategies (3-4 pages)

Examine techniques utilized to protect potential targets of cybercrime.
Recommend an integrated set of strategies to combat the threat of cybercrime and protect the nation’s computers and the public.

Section Three: Rationale (3-6 pages)

Explain the basic legal rights of businesses and individuals who are affected by cybercrime.
Evaluate the ethical and legal issues inherent to techniques used to protect potential targets from cyber criminals.
Assess the technical issues relevant to cybercrime protection.
Analyze the cultural issues that may impact the protection of individuals and businesses against cybercrime.

Section Four: Summary (1 page)

Provide a summary of the major issues and elements identified in the larger report with a focus on two to three key takeaways or messages.

The Government Cybercrime Report

Must be 10 to 15 double-spaced pages 2500 to 3750 words) in length (not including title and references pages) and formatted according to APA style as outlined in the UAGC Writing Center (Links to an external site.).
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least five peer reviewed and/or scholarly sources in addition to the course materials.
The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document all sources in APA style as outlined in the UAGC Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the UAGC Writing Center.
Required Resources
Articles
Brust, R. (2012). Cyberattacks: Computer warfare looms as the next big conflict in international law (Links to an external site.). American Bar Association Journal, 98(5), 40-45.

The full-text version of this article can be accessed through the Academic OneFile database in the UAGC Library. This article explores some of the realities and hidden dangers related to cyberattacks from an international law perspective.
Healey, J. (2011). The spectrum of national responsibility for cyberattacks (Links to an external site.). Brown Journal of World Affairs, 18(1), 57-70.

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines who is responsible for cyberattacks on a national level.
Ristuccia, H. & Baich, R. (2012). Preparing for corporate cyberattacks (Links to an external site.). Corporate Board, 33(196), 11-15.

The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores the increasing external threats that companies may face from outside cyberattacks.
Robb, D. (2014). Could HR Be the Next Target? (Links to an external site.). HR Magazine, 59(7), 50-53.

The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores whether HR departments and professionals are vulnerable to cyberattacks, and includes suggestions for prevention.
Woldt, J. (2016). Prepare now for a cyberattack (Links to an external site.). Credit Union Magazine, 82(1), 24-28.

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses how credit unions can prepare for a cyberattack.
Recommended Resource
Website
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)

This resource site will provide assistance in researching additional sources for the assessments within this course

Discuss one technique individuals, parents, or businesses can use to protect themselves or their children from cyberbullying.

Cyberbullying Presentation

Prior to beginning work on this interactive assignment,read all of the required resources for this week. Review the instructions below and research a minimum of five additional peer-reviewed and/or scholarly sources in the UAGC Library that were published within the last 10 years to help support your statements.

For this week’s interactive assignment, you will be creating a 5-7 minute video speech presentation related to the topic of cyberbullying. (You may use any video capture software of your choice. A Screencast-O-Matic quick-start guide (Links to an external site.) including the ability to capture your webcam is provided for your convenience.) For your video presentation, prepare talking points that respond to each of the following topics.

Explain at least one of the basic legal rights of individuals who are impacted by cyberbullying.

Discuss one technique individuals, parents, or businesses can use to protect themselves or their children from cyberbullying.
Evaluate at least one ethical issue that parents, schools, or workplaces must consider when implementing a new technique to protect their children, students, and/or staff from cyber bullies.

Once you have created your talking points, be sure to practice your presentation to ensure that it will meet the time requirements. (This is meant to mirror the more informal presentations that occur in on-ground masters programs. No official PowerPoint or other type of presentation should be created. The ability to speak candidly to these points is what will be evaluated.) Review the Best Practices for Video Creation document prior recording your video.

Once you have created your video, copy and paste the URL into your initial post. In a separate document, prepare a reference list for your sources in APA format as outlined by the UAGC Writing Center (Links to an external site.), and attach the document to your initial post prior to submission.

Required Resources
Articles
Barlett, C. P. (2015). Anonymously hurting others online: The effect of anonymity on cyberbullying frequency (Links to an external site.). Psychology of Popular Media Culture, 4(2), 70-79.

The full-text version of this article can be accessed through the PsycARTICLES database in the UAGC Library. This article describes a study that examined whether anonymity was related to the frequency of cyberbullying and the severity of its impact.
Bauman, S. (2013). Cyberbullying: What does research tell us? (Links to an external site.) Theory Into Practice, 52(4), 249-256. http://dx.doi.org/ 10.1080/00405841.2013.829727

The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article reviews some of the research on cyberbullying, with a particular focus on gender, age, risk factors, and outcomes.
Coburn, P. I., Connolly, D. A., & Roesch, R. (2015). Cyberbullying: Is federal criminal legislation the solution? (Links to an external site.) Canadian Journal of Crimonology & Criminal Justice, 57(4), 566-579. http://dx.doi.org/10.3138/cjccj.2014.E43

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article explores whether increased federal criminal legislation would have a positive impact in the overall reduction of cyberbullying incidents.
Davison, C. B. & Stein, C. H. (2014). The dangers of cyberbullying (Links to an external site.). North American Journal of Psychology, 16(3), 595-606.

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses the research literature on cyberbullying. The author also makes recommendations to help individuals identify and protect against cyberbullying.
Korenis, P. & Billick, S. B. (2014). Forensic Implications: Adolescent Sexting and Cyberbullying (Links to an external site.). Psychiatric Quarterly, 85(1), 97-101. http://dx.doi.org/10.1007/s11126-013-9277-z

The full-text version of this article can be accessed through the PsycINFO database in the UAGC Library. This paper reviews the literature on the forensic implications of sexting and cyberbullying, particularly in adolescence.
Washington, E. T. (2015). An overview of cyberbullying in higher education (Links to an external site.). Adult Learning, 26(1), 21-27. http://dx.doi.org/10.1177/1045159514558412

The full-text version of this article can be accessed through the Corporate ResourceNet database in the UAGC Library. This article provides an overview of cyberbullying among adults in higher education, as well as an examination of current laws designed to help prevent cyberbullying.
Recommended Resources
Website
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)

This resource site will provide assistance in researching additional sources for the assessments within this course.
Supplemental Material
University of Arizona Global Campus. (n.d.). Screencast-O-Matic quick-start guide (Links to an external site.) [PDF]. Canvas@UAGC. https://student.uagc.edu

This guide will aid you in the use of Screencast-O-Matic.

Explain at least one technique that the United States currently utilizes to protect valuable data from potential cyberattacks from other nations and entities.

Cyberattacks

Prior to beginning work on this discussion,read all of the required resources for this week. Review the instructions below and research a minimum of three additional scholarly sources in the UAGC Library that were published within the last 10 years to help support your statements. Be sure to include a reference list for your articles at the end of your post in APA format as outlined by the UAGC Writing Center.

Cyberattacks are a dangerous innovation in warfare and have become one of the greatest threats to national security since the turn of the 21st century. From a professional, evidence-based perspective, address the following.

Evaluate at least one key ethical and one key legal challenge pertaining to the United States government engaging in cyberattacks against other nations and entities.
Explain at least one technique that the United States currently utilizes to protect valuable data from potential cyberattacks from other nations and entities.
Analyze whether the technique you explained has any legal, ethical, or moral ambiguities.

Required Resources
Articles
Brust, R. (2012). Cyberattacks: Computer warfare looms as the next big conflict in international law (Links to an external site.). American Bar Association Journal, 98(5), 40-45.

The full-text version of this article can be accessed through the Academic OneFile database in the UAGC Library. This article explores some of the realities and hidden dangers related to cyberattacks from an international law perspective.
Healey, J. (2011). The spectrum of national responsibility for cyberattacks (Links to an external site.). Brown Journal of World Affairs, 18(1), 57-70.

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines who is responsible for cyberattacks on a national level.
Ristuccia, H. & Baich, R. (2012). Preparing for corporate cyberattacks (Links to an external site.). Corporate Board, 33(196), 11-15.

The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores the increasing external threats that companies may face from outside cyberattacks.
Robb, D. (2014). Could HR Be the Next Target? (Links to an external site.). HR Magazine, 59(7), 50-53.

The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores whether HR departments and professionals are vulnerable to cyberattacks, and includes suggestions for prevention.
Woldt, J. (2016). Prepare now for a cyberattack (Links to an external site.). Credit Union Magazine, 82(1), 24-28.

The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses how credit unions can prepare for a cyberattack.
Recommended Resource
Website
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)

This resource site will provide assistance in researching additional sources for the assessments within this course

How does law oppress women?

How does law oppress women?

Read the instructions for writing the essay document to know more about what this essay is based on. Refer to the two powerpoints provided below when you write the essay as well.

Discuss whether Ricky had a lawful excuse when he smashed the window.

Criminal Damage

Ricky was sitting having a cup of tea when he noticed his neighbour’s 15yearold car rolling backwards out of the drive. The car was travelling towards two cars parked on the opposite side of the road. Ricky rushed out of his house, caught up with the car, smashed the window and pulled up the handbrake.

Discuss whether Ricky had a lawful excuse when he smashed the window.

Discuss regulatory challenges arising due to the emergence of Special Purpose Acquisition Companies (SPAC) in the Indian corporate environment.

Discuss regulatory challenges arising due to the emergence of Special Purpose Acquisition Companies (SPAC) in the Indian corporate environment

The topic should cover all the basic stuff like the introduction, evolution and key features. In the end like an analysis or an opinion to the same needs to addressed.

And should have a clearly thought out flow relating to the topic from top to bottom

Discuss whether or not you think public schools should require students to recite the pledge.Why or why not?

The Pledge of Allegiance

Religion and politics have traditionally been highly debated topics in our society. Recently, the Pledge of Allegiance has added to this debate.

American citizens have generally recited the Pledge of Allegiance at important ceremonies ranging from presidential inaugurations to the beginning of the school day. The pledge has a great deal of sentimental value to many Americans, but also creates a great deal of controversy for others.

Review The History of Legal Challenges to the Pledge of Allegiance by reading the Supreme Court cases Elk Grove Unified School District v. Newdow and Jane Doe v. Acton-Boxborogh Regional School District, which highlights the debate.

Write a 2–3 page paper in which you:

Summarize the salient points of the Supreme Court case Elk Grove Unified School District v. Newdow and Jane Doe v. Acton-Boxborogh Regional School District.

Explain the decisions of the Supreme Court in these cases in brief.

Discuss whether or not you think public schools should require students to recite the pledge.Why or why not?

Provide three quality sources.

Critically discuss the role of informal value transfer systems (IVTS) in providing access to finance for those who live in developing countries.

The United Nations believes that financial inclusion is “provided by a variety of sound and sustainable institutions”, yet many of the world’s poorest cannot access such institutions. Critically discuss the role of informal value transfer systems (IVTS) in providing access to finance for those who live in developing countries.

Write about the question listed. You may also find it in the file attached.

3000 words
And follow OSCOLA referencing style.
Include 30 resources minimum.

DO NOT include any WEBSITES preferably.

Write about PALESTINIAN TERRITORIES, LEBANON, EGYPT AND OTHER ARABIC MIDDLE EASTERN COUNTRIES IN GENERAL when talking about developing countries.

Write about HAWALA Remittance system and link it to the countries listed above and other IVTS systems and their link to developing countries in GENERAL.

DO A BIBLIOGRAPHY OF THE SOURCES AND FOLLOW (OSCOLA) referencing style in doing that.

RESEARCH GOOD SOURCES because i’m on a masters level so i need very strong sources

Read the question Thoroughly and write the essay with ultimate care and attention

FONT SIZE IS 12 AND THE FONT IS (ARIEL).

READ THE INSTRUCTIONS IN THE FILE ATTACHED CAREFULLY.

FOLLOW the CRITICAL ANALYSIS basis into writing and do no just follow descriptive basis of the anything brought.

INCLUDE POWERFUL ARGUMENTS as i am a master student.

BEAR IN MIND that this essay is about (INTERNATIONAL BANKING AND FINANCE LAW) so it has to follow a LEGAL BASIS. and also bear in mind that this coursework and it is very important to me.

FOLLOW ALL THE INSTRUCTIONS LISTED WITH ULTIMATE CARE.