GLB Ethics and Law

profilehari143

 

  1. Strong arguments can be given as to why encryption tools are needed to safeguard communications in cyberspace, yet these tools can be used by terrorists and criminals to protect their communications in cyberspace. (a) In the wake of September 11, can a case be made for not allowing ordinary users to employ strong encryption tools in Internet communications? (b) Can we still claim to live in a free society if plans for government interception of email communications, as provided for in the Homeland Security Act (http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/terrorism/hsa2002.pdf), are be implemented?  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. In the discussion of Internet anonymity, some forms of anonymous behavior in cyberspace can have profound ethical implications. Imagine that there is a very close political election involving two candidates who are running for a seat in a state legislature. The weekend before citizens will cast their votes, one candidate decides to defame his opponent by using an anonymous remailer service (which strips away the original address of the sender of the email) to send a message of questionable truth to an electronic distribution list of his opponent’s supporters. The information included in this email is so defamatory that it may threaten the outcome of the election by influencing many undecided voters, as well as the libeled candidate’s regular supports, to vote against her. (a) Does the “injured” candidate in this instance have the right to demand that the identity of the person using the anonymous remailer (who she suspects for good reasons to be her opponent in this election) be revealed? (b) Why or why not? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. Is the expression “ethical hacker” an oxymoron?  (a) Do you agree that some individuals should be allowed to be “certified” as hackers to work on behalf of industry or for the interest of other organizations?  (b) Do the kinds of activities permitted by certified hackers in the CEH program raise any moral issues?  Explain. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses.
    • 4 years ago
    • 8
    Answer(2)

    Purchase the answer to view it

    blurred-text
    • attachment
      questionsandanswerslaw.docx

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      Solution.docx