Tuesday, May 19, 2020

The Morality Of Drones Morality - 1955 Words

The Morality of Drones Moral, by definition, from the Webster Dictionary, concerns the principles of right and wrong behavior and the goodness or badness of human character (Webster Dictionary, 2015). Recently, drones have been put on a moral watch list by governments around the world and the people they preside over and rightfully so (Arria, 2012). Drones, being equipped with Hellfire missiles that possess the ability to travel at high speeds, carry a large amount of baggage. It is understandable why some people see these killer robots as extremely troubling (Arria, 2012). The United States’ presence via drones in countries whom they are not at war with raise questions in regards to the legality of the U.S.’s operations (Eickenberg,†¦show more content†¦Surprisingly, some political scientists, moral philosophers, and weapons specialists conclude the use of unmanned, armed aircrafts offer moral advantages over almost any other tool of warfare (Dozier, 2013). â€Å"I had ethical doub ts and concerns when I started looking into this,† stated Bradley J. Strawser, a former Air Force officer and an assistant professor of philosophy at the Naval Postgraduate School (Eickenberg, 2013). Strawser concluded, after researching a concentrated study of remotely piloted vehicles, that using drones to go after terrorists is not only ethically acceptable, but may also be ethically necessary. This is due to the drones abilities to efficiently identify enemy combatants and strike with absolute precision (Eickenberg, 2013). Strawser questioned, â€Å"You have to start by asking, as for any military action, is the cause just† (Eickenberg, 2013)? Therefore, Strawser went on to further back up his opinion by stating, â€Å"all the evidence we have so far suggests that drones are better at both identifying the terrorist and avoiding collateral damage than anything else we have† (Eickenberg, 2013). From the standpoint of a military professional who has explored bo th the negative and positive aspects embodying drones, the positives simply outweigh the negatives. Drone operators possess

Wednesday, May 6, 2020

It Ain’T Yeezy. Rapper Turned Fashion Designer Kanye West’S

It ain’t Yeezy Rapper turned Fashion designer Kanye West’s style depicts every aspect of strength I would argue that his style structure is based on a creative view point and I admire his eye for uniquely chic, classy and rough clothing themes. I would love to hone in on the Egyptian era of dress, I would argue that Egyptians themes are elaborate and creatively matched to the divine expertise of design. The theme that I would like to present Kanye West is the era of which clothing would be described as elaborate and exhumes authority and power the Egyptians had. I want to present these recommendations because I respect the work of Kanye and would be thrilled to provide a new perspective of clothing designs. After strenuous research I†¦show more content†¦Kanye’s clothing is very expensive, and this is why so many people try to mimic the style of Kanye’s brand. The price of one shirt from Kanye’s line cost roughly a whopping $405, in 2015 a fan challenged West o n prices of his clothing line. West did not lower the prices of his clothing due to successful sales. Kanye did come across a hiccup with season two of his line in 2015, critics did not like his approach of a lounge like type style. Kanye responded with these simple words â€Å"sweatshirts are f**king important.† And I do believe that the Egyptian theme presented will explore a different aspect of what West is already accustomed to, by adding a different type of focal point. The Egyptian period for the beginning of civilization it is important and calls for a back track, in Egypt worn with few variations by both men and women were evolved the original types of covering for the human body the tunic, the robe, the skirt accompanied by shawl or cape. The beginning of the nineteenth century A. D. it is to be remembered that man did not really adopt the present uniform attire given by civilization. Modern interpretations of Egyptian costume have an air that does not depict Egyptians correctly and in reality the Egyptians were conservative in costume as well as every other aspect. The fashion seemed to remain the sameShow MoreRelatedThe Impact Of Music On The Music Industry2439 Words   |  10 Pageskey figure in music. Unless that key figure is Kanye West. From his arduous and near-fatal beginnings to self-proclaimed godhood via the Yeezus persona, Kanye West is without a doubt one of the most important and influential musicians this generation, not only in the hip-hop genre, but in the music industry as a whole. Not only is Kanye West an excellent musician, but he is taking his talents and branching out to other industries—most notably fashion—and aiming to revolutionize those industries as

Investing in cyber security infrastructure - Myassignmenthelp.Com

Question: Discuss about the Investing in cybersecurity infrastructure. Answer: Introduction The introduction of digital technology has resulted in a rise in the use of smartphones as well as online services used by people and corporations. The use of smartphones has made it easier to access internet and online services by people. The use of internet-based services varies from assisting in performing operations such as banking, entertainment, communication, shopping and others not mentioned. Modern companies have developed techniques to utilize this platform to offer their product and services directly to the consumers. With this, the use of intermediaries has been drastically reduced resulting in lower operations cost. Despite the advantages brought by internet and smartphones, its increasing popularity is posing a threat to individuals and corporations. There has been an emergence of cybercriminals who attack companies and individuals to gain an unfair advantage. The remedy to this is the need for a cybersecurity software. In this research will concentrate on identifying a nd evaluating the challenges that cybersecurity has brought to the modern companies as well as individuals relying on the use of internet-based services. Afterwards, it will give a few recommendations that can assist minimize the issues identified. Project Objectives The primary objective of the research is to evaluate the challenges that the modern companies face regarding cybersecurity as the use of the internet as well as online-based services goes up. Afterwards will conduct a literature review on the topic. The research will use information from companies that have faced cybercrime to understand and expound on the problem. The secondary target will then be to offer recommendations that can help firms enhance their cybersecurity. Project Scope One of the areas the report will cover is the vulnerability of corporations to cyber-attacks as well as the problems they face from the occurrence of cyber-attacks. The report will use various theories that have been designed by researchers on the issue, also, will illustrate several recommendations that canna assists fight cyber-crime. Literature Review The past decade has seen the use of internet and online services grow tremendously among modern firms hence enabling provision of services via online platforms (Lenhart, et al., 2010). The increasing popularity has been a significant contributor to the growth of internet use as it also attracts companies online. Modern businesses rely on online platforms to perform several operations like recruitment, conducting surveys as well as customer interaction (Holm, et al., 2013). The use of internet has given small-scale entrepreneurs an equal opportunity to interact with the potential clients. There are firms like Uber, Facebook, and others whose entire services are provided online while others use the platform to improve the quality of their operations (Edelman Geraldin, 2015). The use and popularity of internet have enabled these firms to gain a competitive advantage. Due to the rapid growth of the use of the web, there is need to increase the capital allocated to cyber security (Howard Mazaheri, 2009.). Cybercrimes have also increased with the increase in the use of the internet with online servers most prone to attack as they lack security guidelines. The attacks are directed towards gaining information regarding individuals and companies that can be used to cause financial as well as reputational damage. The number of glo0bal social media users have grown from 1.22 billion in 2011 to 2.26 billion in 2017 this shows the rapid increase in social media popularity a factor which has fueled cybercrimes (Sanchex, et al., 2012.). Considering that the number is estimated to hit 3.02 billion by 2021 and with more users acting as an attraction to companies to the online platforms then cybersecurity is an issue of concern. Corporations like Oreo, old Spice have successfully implemented the social media marketing strategy to gain a competitive advantage in the market. On the other hand, several firms like HBO, Yahoo, BBC, and Sony have been hit with cyberattack issues. The increase in the use of mobile applications is also a contributor to cyber-attacks (Islam Mazumder, 2010.). As smartphones' usage increases so are the expansion of the mobile applications industry. Smartphones usage grew from 1.57 billion in 2014 to 2.32 billion in 2017; this number is projected to be around 2.87 billion globally by 2020, with this company like Facebook and WhatsApp are a potential target of cybercriminals. Most of the people who use social media have little information on cyber-crimes and end up avoiding the security features of the applications due to their complexity (Wright Dawson, 2012). Below are several examples of online security problems faced by modern companies. DDoS As the increase in online users increases internet traffic for firms' cybercriminals take advantage of this to send Distributed Denial of Service (DDoS) with this, the criminals can cause the failure of the company servers and then gain access to the company system to collect confidential information (Zargar Tipper, 2013). Internet of things The internet popularity has increased the number of gadgets connected to the internet. These gadgets are called internet of things. They pose a security challenge as hackers can gain access to one and use it to collect sensitive information to the other connected systems (Covington, 2013). Smartphone Malware Cybercriminals sometimes attack peoples' phones directly as they contain personal information which can be used to blackmail companies and gain access to sensitive data like the case of Plankton and Drone KungFu (Covington, 2009). Hacktivism According to Kelly (Kelly, 2012), the emergence of Hacktivism which involves hacking organizations systems to protest their political agendas is a risk firm face. The aim is to destroy the firm's reputation hence a dangerous trend. Other harmful cybercrime trends involve Ransomware, Machine Learning, Insider threats, Malware as well as Phishing. Justification More and more firms are entering the internet-based service provision, with social media also seeing individuals uploading their personal information online. The enormous number of people and companies in the online platform need information security to guarantee their confidentiality. The rise of cybercrime is a direct threat to this which makes it a threat to the growth of online businesses the research is, therefore, Vitol as it aims to come up with means which will assist minimize cybercrimes. Literature problems The information composing of the literature review is generated from diverse sources; it's, therefore, hard to identify the relevant information without getting buried and to lose focus on the research scope. Gaps The gap in the research is the actual economic damage caused by cyber-crimes as most of the data regarding that is treated as confidential by confirmed firms. Opportunities The literature review has availed a chance to see the impact of the use of internet on social interaction and business operations. Also, it has highlighted some of the most commonly used paths by cybercriminals Hypothesis Cybercrime is limiting the growth of online business Cybercrimes can be contained by appropriate security policies by firms operating online. Research Questions Primary Highlight Cybersecurity challenges facing modern organizations and internet users? Secondary What's the reason behind the increased usage of internet? Reasons why more firms are implementing online marketing strategies/ What's are some of the techniques cybercriminals employ to commit cybercrimes? Illustrate ways of minimizing cybercrimes Research Design and Methodology The research will include both the qualitative and quantitative design. Qualitative design This design will be employed to gain an insight of some of the underlying opinions, reasons, and motivations concerning the research. This will give an insight into the issues and generate the research hypothesis as well as pave the way for the quantitative analysis. To enhance reliability and validity of the information, the data will be collected in a structured manner mainly from interviewing employees concerned with internet security in organizations. In addition, the research will take into consideration the previous reports of agencies on cybercrime issues. The data will be collected from a randomly selected sample of three companies. Apart from the interviews with the concerned company employees, the data collection will be concentrated on articles and reports availed in the company websites and other platforms used for public communication. The variable of concern will be the prevalence of cyber-crimes as well as financial impacts to the firms. Quantitative research The quantitative design will be applicable in quantifying the issues and generating numerical data which can be analyzed to obtain useful statistics. This way the patterns of the problems will be developed. The research will involve a collection of numerical data online from company websites, reports, and journals. To hence obtain a reliable trend the data collection will be restricted to companies which operate globally and have clients all over the globe. Five companies will be selected at random and the numerical data obtained analyzed using statistical instruments; charts, diagrams, and graphs will then be applied in presenting the data. The analysis that will be done is t-test, descriptive analysis, and variance test. Microsoft Excel will be the primary analytical software applied. Research Limitations One of the biggest challenge that the research faces are the availability of too much information on the online platforms. Since time is always a limited resource, it is not possible to access, vary and use all the information available online hence the report may end up ignoring some vital aspects. Also, the availability of too much information means validity and reliability may not be accurately assessed as some information are not easily vetted. The over-reliance on secondary data may mean the research conclusion may end up being backed by information on whose reporter was biased when presenting. The situation is like data obtained from interviews as they are tough to verify. Finally accessing some of the people whose responses might assist make vital judgments may be difficult as highly skilled IT professionals are busy people with minimal time to allocate to surveys and interviews. Time Schedule Month Research goal Task Projected completion date Responsible individuals January 2017 Illustrate and expound on the need for internet security on individuals and companies using internet-based services. Assess the internet usage trend In progress Project assistant manager January 2017 Book time and location for expected interviews In progress Project assistant manager April 2017 Expand on the extent to which companies have suffered cyber attack View company reports regarding experience with cybercriminals May 2017 Project assistant manager May 2017 Understand the economic consequence of cybercrimes -conduct the research interviews -compile the information obtained from online reports June 2017 Research manager June 2017 Understand the actual and verify the pre-generated hypothesis Data analysis Report writing August 2017 Project manager Conclusion In conclusion, the increasing popularity of the internet has attracted millions of people to the platform. This in return is making social media marketing as one of the best strategies companies apply to edge out their competitors in the market. The use of the internet has made it possible for firms to avail their products online an activity which minimizes intermediaries hence reducing the final cost of the products to the consumers. Despite the numerous advantages brought by the introduction of internet in doing business and social interaction, cyber-crime threats have emerged. The increasing number of people and firms turning to the internet have in turn increased the need to enhance cyber-security policies due to the increase in cyber-crime attacks. Modern companies now must face emerging cybercrime issues like Ransomware, DDoS, mobile malware, insider threat, hacktivism and many others. Inadequate security has seen several firms fall victims of cyber criminals HBO, Yahoo, BBC and Sony being some of the examples. For firms to tackle the issues they must upgrade their security policies and accommodate factors like; data encryption, physical security of the servers, secure passwords and others that might be relevant. Its mandatory for firms to understand the importance of cybersecurity and invest inadequate measures to protect the organizations and its clients in case of an attack (IBM., 2016) References Covington, P., 2009. The growing phenomenon of crime and the internet: A cybercrim execution and analysis model. Computer Law Security Review, 25(6), pp. 528-535. Edelman, G. Geraldin, D., 2015. Efficiencies and regulatory shortcuts: How should we regulate companies like Airbnb and Uber. Stan. Tech. L., Volume 19, p. 293. Holm, H., Flores, W. Ericsson, G., 2013. Cyber security for a smart grid-what about phishing?. In Innovative Smart Grid Technologies Europe (ISGT EUROPE), 2013 4th IEEE/PES (pp. 1-5). IEEE., 3(1),pp.15. Howard, P. Mazaheri, N., 2009.. Telecommunications reform, Internet use and mobile phone adoption in the developing world.. World Development, 37(7), pp. 1159-1169. IBM., 2016. An integrated approach to insider threat protection. [Online] Available at: https://www-05.ibm.com/services/europe/digital-whitepaper/security/growing_threats.html[Accessed 12 January 2017]. Islam, R. Mazumder, T., 2010.. Mobile application and its global impact. International Journal of Engineering Technology (IJEST), 10(6), pp. 72-78. Kelly, B., 2012. Investing in a centralized cybersecurity infrastructure: Why hacktivism can and should influence cybersecurity reform. BUL Rev, Volume 92, p. 1663. Lenhart, A., Purcell, K. Zickuhr, K., 2010. Social Media Mobile Internet Use among Teens and Young Adult, New York: Pew internet American life project. Sanchex, A., Levin, A. Del Riego, A., 2012.. Blurred boundaries: Social media privacy and the twenty?first?century employee. American Business Law Journal, 49(1), pp. 63-124.. Wright, J. Dawson, M., 2012. Journal of Information Systems. Technology and Planning, 5(14), pp. 40-60. Zargar, S. Tipper, D., 2013. A survey of defense mechanisms agains distributed denial of service (DDoS) flooding attacks. IEEE communications surveys tutorials, 15(4), pp. 2046-2069.