Assignment Completion Method:
Your assignment will involve two important phases, which
will require you to:
Part A:
Answer the following questions:
- Question 1: What is a Firewall and how do they protect a business? (~250 Words)
- Question 2: Phishing is a type of scam. What is the purpose of phishing emails? List and describe four basic steps can you use to avoid phishing scams? (~250 Words)
- Question 3: Discuss the relationship between surveillance and privacy. Identify and describe what safeguards exist to protect the individual? (~250 Words)
- Question 4: Describe ‘social commerce’ and discuss three potential benefits to customers and 3 potential benefits to the business. (~250 Words)
Part B:
Use the Toulmin’s Model of Argument to analyse the supplied
Assignment Case Study (see the Assignment Case Study section below) and provide
your opinion on the strength or weakness of the argument with relation to the
Claim that we have provided. (~ 600
words).
You MUST use these instructions to complete the ‘Your
Opinion’ section of Part B:
To apply the model to test the validity/strength of a CLAIM
the reader must examine each sentence in the article and categorise them as a
Toulmin element or as an unnecessary extra e.g. ‘opinion’, ‘hearsay’,
‘definitions’ etc. Once all sentences have been categorised then the elements
should be examined in sequence.
- What is the CLAIM? We have provided this for you already.
- Is there any DATA to support the CLAIM? If so how much? The quantity and quality of DATA can suggest the strength of the CLAIM.
- Is there a WARRANT (Explicit or Implicit)? Explicit WARRANTS are often stronger because the author can direct the reader to accept the CLAIM. Implicit WARRANTS leave the reader’s opinion open to interpretation and this may go against the author’s intended purpose.
- Is there BACKING? If so how much? The quantity and quality of BACKING can suggest strength of the WARRANT and thus may increase the strength of the CLAIM.
- Is there a REBUTTAL? The quantity and scope of the REBUTTAL may reduce the strength of the CLAIM and thus dissuade the reader’s acceptance of the CLAIM.
- Is there a QUALIFIER? If so, to what extent does it reduce the scope of the CLAIM because this will impact on the strength of the CLAIM?
Your Opinion – this is a personal perception based on your
interpretation of the article. The presence, quality and quantity of the
different Toulmin elements must be applied to make this critical assessment.
Learning Objectives:
In the process of this assessment task you will:
Gain an understanding of:
·
Protecting and managing business information
resources from unauthorised online
access;
·
The deceptive aspects and mitigation strategies
to counter against socially engineered online scams;
·
The fundamental counter‐balance between
surveillance and individual privacy;
·
The benefits of a ‘social commerce’ approach for
customers and business.
·
Gain a fundamental understanding of Toulmin’s
Model of Argument;
·
Learn to apply the argument model for critical
analysis of a case study; and,
·
Demonstrate your critical thinking skills as
applied to the argument Claim.
Assignment Case Study:
Claim: >>> Australian anticrime authorities can’t
protect Australian businesses against cybercrime
Internet‐enabled crime is the greatest challenge to
law‐enforcement in the 21st century, particularly in terms of differing
trans‐border jurisdictions, the risk to our national security, privacy,
business data and the potential impact it could have on the economy overall. Hence
it seems surprising of the 20,329 staff members in the New South Wales Police
Force there are only 95 working in the cyber and fraud division. Based on this
you would have to ask the question; Is Detective Superintendent Arthur Young,
Commander of the NSW Fraud and Cyber Crime Squad, equipped to deal with threat
from internet‐related crime?
Young acknowledges, "There's no commander that would
say they've got enough resources to combat this issue, but that's something
we're working towards.” Young also declared "I don't think you can ever be
fully prepared however, we've got some good systems in place to do what we want
in terms of mostly identifying and preventing a lot of the cybercrime." The
NSW Crime Commission's latest annual report states that uncrackable smart phones
are hindering criminal investigations with at least two murder investigations
in Sydney recently being affected.
In response to the technological issues Superintendent Young
also usually seeks collaboration from private companies, such as Apple and Google.
Young would also like to see the punishments associated with cybercrime
increased to match other crimes such as robbery because currently they are
disproportionate. Given the Internet is borderless, transnational crime is also
something Young has to deal with. When it comes to solving trans‐border
cybercrime, the NSW Police has a good relationship with the FBI, US Homeland
Security and Britain's Scotland Yard. Yet, relationships with some other
overseas anticrime agencies need improving if we are to be more effective in
combatting trans‐border cybercrime.
With respect to local cybercrime, Superintendent Young says
advancements are constantly being made to prevent cybercrime hence we are not
losing the race just keeping pace! Young further hopes that sometime in the
near future business organisations will be required by law to divulge publicly
if they have had a data breach noting “if companies don't report breaches, how
do we know it's actually occurring?" Alarmingly, Young said "I think
one of the challenging things for law enforcement in NSW or globally is the
fear of investigating cybercrime or fraud‐related crime because it is difficult
to prove so it is often ignored."
"Dates of births are one of the greatest sought‐after
pieces of personal information that ID criminals are looking for. Robert Chan
from the National Crime Authority (NCA) acknowledged community education on
cybercrime avoidance performed by various anticrime bodies is helping to reduce
cybercrime occurrence. Mr Chan also noted at the recent Australian ‘Unity
Against Cybercrime Conference’ (UACC) a working party of anticrime organisation
heads was established to develop a unified approach for the detection of and
the defence of Australian Businesses against cybercrime.
No comments:
Post a Comment