Discussion

 

Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Assignment 350 words 3 references

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website: 

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 400 word summary of fair use as this court decision says it.

Student accurately summarizes the effects of this Supreme Court decision. 

technical Report

 You will be the required technical report; a ten-page single-spaced report covering some current aspects in the field of computer science.  You will have to select and submit a topic of your choice for approval, find references for your report, create an outline for the report and submit multiple drafts of the report for feedback.  

Topic- Cybercrimes

                                                                            OUTLINE
CYBERCRIME 

I. Abstract

The key issue facing today’s society is the increase in cybercrime. This paper covers the definitions of cybercrimes growing list of cybercrimes, types, and intrusions of e-crime. It has also focused on the law against those e-crimes. Also, we will give detail information regarding cybercrime and the ways to prevent. We will also discuss about cyber security which plays an important role in the field of information technology. This paper also explains how social media plays a huge role in cyber security and will contribute a lot to personal cyber threats. 

II. Keywords: Cyber-crime, Cyber security, Hacking, child pornography, phishing scams, Malware, Website spoofing, IOT Hacking, Distributed DOS attack, Webserver, Mobile Networks, Encryption of the code.

III. Introduction

The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cybercrime causes loss of billions of USD every year. 

best way to project yourself against cybercrime.

IV. Major steps one should take to prevent Cyber crime

· Keep software and operating system updated

· Use anti-virus software and keep it updated

· Use strong passwords

· Never open attachment in spam emails

· Do not click on links in spam emails or untrusted websites

· Do not give out personal information unless secure

· Keep an eye on bank statements

V. Cyber Security:

Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft. The first thing that comes to our mind is ‘cyber crimes’, whenever we think about the cyber security, which are increasing immensely day by day.

VI. Cyber Security Techniques

· Access control and password security

· Authentication of data

· Malware Scanners

· firewalls

· Anti-virus Software

· Backup and Restore Procedures

· Disaster Recovery Plan

· Risk Assessment Procedures

VII. Conclusion

Cybercrime is becoming harder to stop as new technologies emerge, its impacts widespread and overwhelming financially. It’s important to act now to slow its progress. Through increased awareness, improved laws which target cybercrime and by utilizing biometrics which greatly enhance security, the effects of cybercrime will be mitigated.

Qualitative Data COllection Instrument

 Using the topic and research question you developed in week 1, you will design a qualitative instrument that could potentially answer your topic/research question if it were to be applied to a qualitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies. 

Case study

Please follow the attached CASE study. I need two pages for the following questions with APA format along with zero plagiarism.

1. How would you conduct the study any differently?

2. Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future?