Please use your text and any other pertinent sources to back up your answers with statistics and/or evidence.Only use scholarly, relevant, recent sources (books and journals), no wiki sites, no websources, no “nd” sources and nothing anonymous. <<Students may also use press releases on government/law enforcement websites that have a date of publiction within the past 5 years for additional supporting material.>> Cite your references in text and in APA format at the end of each of the responses/answers to questions they were used to support.
100 words per question
1.Explain the 5 methods of Identity Theft.Which do you think is the most difficult to prevent?
2.What behaviors in your life make you a target for identity thieves?Are there certain demographic groups that are more likely to become victims?
3. What are the 5 forms of cyber bullying from electronic communication?Which are you most at risk for?
4.What can we do to protect young people from damaging harassment online?Other than formal legislation, what steps can take to prevent cyber bullying?
5.What are the 5 motivations of hackers? Please explain them and determine which is the least credible and why.
6.According to Rogers, what are the 7 categories of hackers?Which are the most dangerous and why?
7.What was the first piece of legislation to address hacker activity?Do you feel that the argument by hackers that information should be free and accessible to all internet users is credible? Why or why not?
8.Does the First Amendment apply to terrorism groups and their online presence?Explain, why or why not?
9.Do you believe that the freedom of the Internet should be inclusive of these groups that offer coursework online to recruited members, or should they be banned from online forums?
10. Explain what Cyber Terrorism is and discuss a few forms it can take. Is Cyber terrorism a viable threat?Who is affected by Cyber terrorism? What can the government do to protect our infrastructure from being affected by Cyber terrorism?


0 comments