Preview

CaseEF GroupC2 Team10

Good Essays
Open Document
Open Document
1421 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CaseEF GroupC2 Team10
Team members: Yang SONG, Yue MEI, Zixun WANG, Yuexin QIU
Case E
1. Does the Tucson data-mining project inappropriately violate the privacy of Internet users, or is it an acceptable tradeoff to more intelligently combat terrorism? Explain your answer.
Although the Tucson data-mining project may inappropriately violate the privacy of Internet, it is an acceptable tradeoff to more intelligently combat terrorism users because it is so far, one of the best way.
The Tucson data-mining project try to use word length, punctuation, syntax, and content, etc, to identify the personality types of anonymously authors, which allows the system to specifically target those with potential threats such as militant leaders and their active followers. In other words, if someone avoid using sensitive words on the Internet, the system won’t interfere their daily life. Also, after the 911 terrorist attacks, anti-terrorism has become such an important topic of keeping world peace. By using the Tucson data-mining project, which can create a profile almost as unique as a fingerprint, to track potential threats, the government can more effectively and objectively distinguish the terrorists from the innocents, and thus, prevent the subversive behavior in advance. As it is for the wellbeing of the world, individual has a responsibility to play. In this sense, the data-mining project is an acceptable tradeoff.

2. Were the local police justified in their handling of Holm? Why or why not? For whichever view you take, briefly describe the opposing viewpoint.
The local police were not justified in their handling of Holm.
The police arrested Holm only because terrorists used his articles and he has spoken to a terrorists on two occasions. However, the police didn’t hold any direct evidences showing that Holm has planned, implemented or gave advices about any potential terror threats. In addition, the police didn’t hold the authority to put Holm under supervision for 12 months and even in prison

You May Also Find These Documents Helpful

  • Good Essays

    Dr. Stokes: Case Study

    • 676 Words
    • 3 Pages

    3) What was the punishment he received, if any? Do you feel the final outcome was justified?…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    6. Describe the trials. Were they fair or unfair? Please include at least 3 supporting facts to back up your description. The Scottsboro boys…

    • 2025 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Unclassified paper submitted to the faculty of the National Intelligence University in partial fulfillment of the requirements for MCR 601…

    • 2024 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    ENC 102 WA3

    • 452 Words
    • 2 Pages

    These questions and many others, are aim to examine every aspect of the incident. Based on the answer provided by the…

    • 452 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    12 Angry Men

    • 611 Words
    • 3 Pages

    1.How do you think you might have acted as a juror in this case ? How would you had interacted ?…

    • 611 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Johnson, R. (2011). Data Classification/Handling and Risk Management. Security policies and implementation issues (p. 278). Sudbury, Mass.: Jones & Bartlett Learning.…

    • 1134 Words
    • 5 Pages
    Best Essays
  • Good Essays

    In today’s society, technology has made countless advances skyrocketing towards the future. Thus the arguments about whether or not security is needed for this amount of power. There are many good aspects of the internet; including social media, messaging, games, and even dating. But, with these things, comes bad that we don't know much about; including catfishing, tracking, and also spying. With the click a button, everything done online can be seen by anyone.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Good Essays

    No, the NSA Does Not Spy on Everyone, Everywhere: Why the National Security Agency’s Data Surveillance Programs are Both Legal and Necessary…

    • 1237 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Felony Murder Rule

    • 338 Words
    • 2 Pages

    Examine the felony murder rule: discuss some of the problems associated with it. What problems do you think were involved in the case of Brandon Hein?…

    • 338 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The creation of a national database applied by the Homeland Security Department would permit the states to communicate and distribute intelligence collected on different terrorists and criminal behaviors. Following the catastrophic events of September 11, 2001, just about every state implemented fusion centers to share intelligence on terrorist threats; conversely, a database resourceful enough has not been implemented to communicate the intelligence. The fusion centers can gain data and share the intelligence with the Department of Homeland Security but it cannot correspond with any other centers countrywide. Thus, if one state such as California gains intelligence on a potential terrorist group living nearby, the intelligence is transmitted to the Department of Homeland Security, but neighboring states are uninformed about the activity. The drawback with executing the system to synchronize information countrywide is that the fusion centers would have to gain funding from the federal government.…

    • 561 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Since the September 11, 2001 attacks on the United States, many of the counterterrorism measures taken by President George W. Bush and his administration have been questioned concerning their legality, morality and practicality. Chief among the issues being debated is that of warrantless wiretapping and data mining inside of the United States. This unprecedented use of executive power has been directed by the National Security Agency since 2001.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In this research, data has been collected from various sources to show that the PATRIOT Act of 2001 does in fact have merit where National Security is concerned and does not necessarily infringe upon individual privacy unless there is good cause for the Federal agencies involved to use the methods outlined in the law to gather information on suspected acts of terrorism and other terrorist related crimes.…

    • 2585 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The Census Bureau is the leading source of quality data about the Nation’s people and economy. It collects, analyzes and disseminates such data through surveys, decennial data collection activities, Federal, state and local sources and many private organizations, to its citizens and private and public organizations alike. In the process, the Bureau collects a lot of personally identifiable information (PII) through these sources. Therefore, the protection of these data and systems for collecting and processing is highly critical. Securing information resources should include controls and safeguards to offset possible threats and vulnerabilities both from external and internal sources. Additionally, controls to safeguard and ensure the confidentiality,…

    • 260 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The convergence of computer resources connected via a global network has created an information tool of unprecedented power, a tool in its infancy. The global network is awash with data, uncoordinated, unexplored, but potentially containing information and knowledge of immense economic and technical significance. It is the role of data mining technologies arising from many discipline areas to convert that data into information and knowledge. It is our premise therefore that data mining technologies lie at the heart of the information revolution providing the mechanism for creating information and knowledge.…

    • 4120 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Abstract— Data mining techniques are very important in the cloud computing paradigm. The integration of data mining techniques with Cloud computing allows the users to extract useful information from a data warehouse that reduces the costs of infrastructure and storage. Security and privacy of user’s data is a big concern when data mining is used with cloud computing. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. An important security concern is privacy attacks based on data mining involving analyzing data over a long period to extract valuable information. In this dissertation our main objective is to provide information with the help of which we can make data secure from unauthorized users. As uses of data come on front we have to face concept of data mining. Data Mining is a field where accuracy matters a lot. Data mining techniques and applications are very much needed in the cloud computing paradigm. The implementation of data mining techniques through Cloud computing will allow the users to retrieve meaningful information from virtually integrated data warehouse that reduces the costs of infrastructure and storage.…

    • 3913 Words
    • 13 Pages
    Better Essays

Related Topics