Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

VIDEO CASE QUESTIONS 1. Does the Tucson data-mining project inappropriately viol

ID: 3586507 • Letter: V

Question

VIDEO CASE QUESTIONS 1. Does the Tucson data-mining project inappropriately violate the privacy of Internet users, or is it an acceptable tradeoff to more intelligently combat terrorism? Explain your answer 2. Were the local police justified in their handling of Holm? Why or why not? For whichever view you take, briefly describe the opposing viewpoint 3. Name the nine US Internet providers that were cooperating with the PRISM program. 4. Why did the Internet companies provide the government with information on their 5. Is the PRISM program a danger to American democracy? Why, or why not? For each, describe some of the information which they could uniquely provide. users? ND/ CHAPTER4, CASE3 DATA

Explanation / Answer

1) Terrorists are utilizing the internet to communicate their plans because they think they have a lower chance of be caught. However, anti-terrorist agencies are fighting back with new software technology that enables them to identify and apprehend potential terrorists. The downside is that these new ways to catch the bad guys are sometime jeopardizing the privacy of innocent people. .

The Tucson Data mining project is one of these new technologies that will help fight terrorists by profiling online activity. The program detects certain word length, punctuation, syntax, and content, and displays information about the personality type of an individual graphically to determine if the author is violent or militant, inexperienced and seeking advice, or an opinion leader holding sway over many more people. To be quite honest, people need to watch what they say and write over the internet because once it’s uploaded it is always going to be somewhere in cyberspace. Since, terrorists are using the internet as a tool to spread their evil; the need to develop ways to fight back using technology is a must.

The Tucson Data Mining Project project inappropriately violates the privacy of internet users and it is un accceptable tradeoff to more intelligently combat terrorism, because it can detect potential yerrorist activities, find out their attack method and locate the main leader who operate all the activities.

On the other hand, Tucson Data Mining project can read or expose public or private conversations between groups or individuals, which violate the privacy of internet users.

2) No, local police didn't justify in their handling of Holm. Besides, they failed to prove him guilty and provide any sort of evidence that makes Holm guilty. Moreover, the court said the arrest of Holm was illegal which shouldn't be done by police.

AS PER THE CHEGG GUIDELINES, IN CASE OF MULTIPLE QUESTION, EXPERTS CAN ANSWER ONLY THE FIRST QUESTION AND LEAVE THE OTHERS, BUT I ANSWERED TWO. SO, IF U WANT TO ASK MULTIPLE QUESTION, PUT THEM AS A SINGLE QUESTION AND MAKE SUBPARTS OF IT.

THANK YOU.