Approved-online-essay-writers

ITNET305A-Emerging Technologies Security Essay – IT Computer Science Assignment Help

Assignment Task


Task 

AssessmentmDescription 
Students are required to write an essay on one of the provided topics. Students may nominate their own topic with prior approval from the teacher. You must state your view clearly, supported by strong arguments and credible references.
Content and Structure:
1. Machine Learning and Artificial Intelligence.
2. Autonomous Vehicles.
3. Internet of Things and Privacy.
4. Privacy, Censorship and Freedom.
5. Cybercrime, Cyber Terrorism and Cyber Activism.
6. Cyber War and Electronic Warfare.

A-Plus Writing Help For University Students

Get expert assistance in any academic field. All courses and programs covered.

Get Help Now!


Essay Topics:
1. Machine Learning and Artificial Intelligence
The World Economic Forum identified top 9 ethical issues in artificial intelligence. One of which is “How do we protect against unintended consequences?”

Are we overreacting? What are some possible unintended consequences in the development of machine learning and AI, and what are possible options to protect against such unintended consequences?

2. Autonomous Vehicles
Below is a chart of air accident fatalities over 1918 – 2016 compiled by the Aircraft Crashes Record Office.: 

chart of air accident fatalities over 1918 – 2016 compiled by the Aircraft Crashes Record Office

At the pioneering stage of aviation, we see fatalities increases rapidly and as (painful) lessons are learnt, fatalities decreased and air travel is the safest way to travel nowadays. (Note that number of aircraft and air traffic increases steadily over the time period, hence the fatalities per flight or per KM travelled is in fact much more impressive than projected in the chart) 
With the advent of autonomous vehicles, is it likely that we are going to experience an upward trend in accident at the beginning as we learn? Is the
analogy between early aviation and early autonomous vehicle even appropriate?
What is the acceptable level of fatalities should the society accept before declaring either “Autonomous Vehicles are Safe!” or “Autonomous Vehicles
are not safe yet, and we have no way to make it safe without costing additional lives. So, let’s pull the plug”? 


3. Internet of Things and Privacy
A Panopticon Prison is a type of prison designed by the English philosopher and social theorist Jeremy Bentham in the late 18th century.
The concept of the design is to allow all inmates to be observed by a single guard without the inmates being able to tell whether or not they are being watched. Although it is physically impossible for the single watchman to observe all cells at once, the fact that the inmates cannot know when they are being watched means that all inmates must act as though they are watched at all times, effectively controlling their own behaviour constantly. With Internet of Things gaining interest, and people willingly put monitoring devices (such as Google Home/Amazon Echo and Alexa) into their homes, is there a risk that one day we ended up living in a new kind of Panopticon Prison? If privacy is a concern, why is IoT gaining interests? And How would IoT affect the World in the next ten years?


4. Privacy, Censorship and Freedom
Over the years, the world has seen various kind of whistleblowers. They often have very different motives and operate at different levels, both inside and outside of the organisation. For example, Frederick Winterbotham, who wanted to write a memoir of his wartime achievements and, as he was dying, was not bothered about prosecution, he revealed the Allies’ success in breaking German and Japanese cipher systems during that war, which led to many further books on World War 2 SIGINT (Signal Intelligence). Regarding privacy and phone tapping, we have Peg Newsham who revealed that the NSA had illegally tapped a phone call made by Senator Strom Thurmond. Closer to home, and the most substantial recent source on the organisation and methods of U.S. and allied SIGINT was put together by New Zealand journalist Nicky Hager following the New Zealand intelligence community’s failure to obey an order from their Prime Minister to downgrade intelligence cooperation with the USA. In more recent times, the most prominent case concerning our privacy and the government surveillance was the case of Edward Snowden. Who is Edward Snowden? What did he do? Is what he did justified? Is he a hero, a traitor or a terrorist? Why? 


5. Cyber Crime, Cyber Terrorism and Cyber Activism
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. The most notable group of hacktivists is perhaps the “Anonymous”.
Are there any other differences between hacking and Hacktivism? Are the hackers’ actions justified by who they choose to target, for example consider
Ashley Maddison, the Whitehouse, Sony. What about ISIS or sites showing child pornography? If you think that hacktivism is never justified, explain
your rationale. If you think actions of hacktivism is sometimes justified, how then should the law deal with hacktivists in cases like these?


6. Cyber War and Electronic Warfare
Carl von Clausewitz, Prussian military theorist, and the author of “On War”, famously said that “War is the continuation of politics by other means” (with many aphorisms). With cyberwar defined as: “nation states attacking each other via the internet”, it is an important weapon for political conflicts, espionage, and propaganda. This definition of cyberwar seems to fit well in the Clausewitzian theory of war.
However, von Clausewitz also said that “War is nothing but a duel on an extensive scale”. Since the first state-to-state cyberattack in 1999,
cyberattacks have not caused large scale injury, loss of life and destruction of property. To this day such direct damage to life and physical property has not been attributed to cyberattacks. So, with this view, Cyberwar is not a war. It is not a duel if no one gets hurt.
With this conflicting view in mind, is cyber war a “war”, and would a cyber war lead to actual use of force? If so, how? If you think that Cyber Warfare would not lead to the actual use of force, what changes or development in the future might have the potential to lead cyber war into a physical war? What is the international community doing, or what SHOULD they be doing to prevent a cyber war to become a physical war? 

This ITNET305AIT Computer Science Assignment has been solved by our IT Computer Science Expert at TV Assignment Help. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. 

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Welcome to our Online Essay Writing Agency. Securing higher grades costing your pocket? Order your assignment online at the lowest price now! Our online essay writers are able to provide high-quality assignment help within your deadline. With our homework writing company, you can order essays, term papers, research papers, capstone projects, movie review, presentation, annotated bibliography, reaction paper, research proposal, discussion, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch

We write papers within your selected deadline. Just share the instructions

PLACE YOUR ORDER