security and Privacy


I need 200-400 words for each question. Include reference if not your own words

1. Consider Deibert’s assertion, “In short, GhostNet could have been orchestrated and controlled by anyone, anywhere.” What does GhostNet, or access to similar spying capabilities through open-source tools, tell us about the possibility of privacy at present time?

2. In their article, The Right to Privacy, Warren and Brandeis describe the concept of privacy as “the right to be let alone.” What does this description mean? What is Warren and Brandeis’ theory of privacy? Have they adequately defined privacy? Clearly explain your response.

3. In his law review article, The Right of Privacy, Richaed Posner articulated a contradictory definition of privacy than that asserted by Warren and Brandeis. How does Posner define the concept of privacy? Does this definition suggest circumstances under which a privacy claim may be defended? What types of privacy protections might Posner support? Clearly explain your response.

4. In Chapter 5 of Black Code, Deibert describes the Indian government’s response to the July 2008 Mumbai terrorist attacks.Deibert summarizes the Information Technology Rules of 2011, and asserts that they place “extraordinary policing responsibilities on ISPS and other services that operate in cyberspace.”How can this government action be rationalized? Do you agree or disagree with the privacy restrictions resulting from the act? Cite examples and clearly explain your response.

5. In Chapter 1 of Surveillance as Social Sorting, David Lyon discusses the reduction of the need for embodied person, as increasing technology deployment allows “abstract data and images [to] stand in for the live population of many exchanges and communications today.” These traces of personhood left in the digital world help create “everyday surveillance.” Lyon asserts that everyday surveillance depends upon social sorting derived from searchable databases and other similar crumbs of personhood.

How does Lyon’s argument address issues of user authentication? Does Lyon satisfactorily addresses this issue? For example, Lyon cites the use of cookies to report web-surfing habits to a parent company in exchange for access to information. But what happens when a 15 year-old child utilizes a parent’s computer to perform web searches? Does the 15 year-old’s resulting “everyday surveillance” destroy the surveillance pattern for the parent’s digital personhood? How might this impact the practice of social sorting?

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!":

Get started