{"id":13566,"date":"2020-11-24T09:06:22","date_gmt":"2020-11-24T09:06:22","guid":{"rendered":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/"},"modified":"2020-11-24T09:06:22","modified_gmt":"2020-11-24T09:06:22","slug":"cyberspace-privacy-and-security-paper","status":"publish","type":"post","link":"https:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/","title":{"rendered":"Cyberspace privacy and security paper"},"content":{"rendered":"<style type=\"text\/css\"><\/style><p><em>Using the articles you have read for this module, write a 500-word essay on what you believe to be the greater threat to the nation\u2014cyber-crime directed against individuals or terrorist cyber-attacks on national institutions. Provide your opinion, supported by readings, on whether the United States is active enough in countering these threats.<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<h3>Articles ATTACHED BELOW<\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li>Alexander, Keith B, Emily Goldman, and Michael Warner. \u201cDefending America in Cyberspace.\u201d\u00a0National Interest.\u00a0128 (2013): 18-24.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<ul>\n<li>Filshtinskiy, Stas. \u00a0\u201cCybercrime, Cyberweapons, Cyber Wars: Is There Too Much of it in the Air?\u201d\u00a0Communications of the ACM.\u00a056.6 (2013): 28-30.<\/li>\n<\/ul>\n<h3>Articles (Internet)<\/h3>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em><a href=\"https:\/\/docs.google.com\/document\/d\/1FH5IBz4cd8BKlXWmNQLqQ15OyJu3beZGNhWmkLVbMsY\/edit?usp=sharing\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Note on Documentation<\/a><\/em><em>.<\/em><\/p>\n<p>Documentation systems can be very complex\u2014involving elaborate footnotes at the bottom of each page\u2014or simple. For this course a simple documentation system will suffice.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>The two main systems of documentation used in American scholarship are the MLA (Modern Language Association) system, used in most humanities areas, and the APA (American Psychological Association) system, used in most social and behavioral sciences. They differ a little in typography. Some of the science areas also have specialized systems. The examples given in this document are in<a href=\"https:\/\/owl.english.purdue.edu\/owl\/resource\/747\/01\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MLA style<\/a>, although you may choose to use<a href=\"http:\/\/www.apastyle.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">APA style<\/a>\u00a0if you wish. On the important issues of when and where to document, all the systems agree.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Here are the rules:<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li>Direct (word-for-word) quotations from sources must be placed in quotation marks. If the quotation is very long (three lines or more), start it on a new line, indented from both left and right margins, and single spaced; quotation marks should not be used.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li>Follow every quotation with a note in parentheses that, for print sources (whether hard copy or electronic copy), gives the last name of the author and the page number. For example:\u00a0(Smith 142).\u00a0If there is no author, use a short form of the title of the article, journal, or book.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li>For sources obtained from a Web page, cite a short form of the author or article, as for print sources. No page number is needed. If you have only a URL, cite a short form with sufficient detail to identify it from your reference list. For example:\u00a0(osha.gov).\u00a0The full URL and retrieval date will still be needed in the reference list, as explained below.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li>A similar note should follow all indirect or paraphrased quotations, even though you do not use quotation marks. Your wording should clearly indicate what material is from the source.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li>At the end of the paper, a bibliography (list of references or works cited) should list all the sources used in the paper.<\/li>\n<\/ol>\n<ol>\n<li>The entries of print sources are listed in alphabetical order by author (last name, first name) and include the title of the article (in quotes), the title of the book or journal (in italics), the publisher of the book, and the date of publication.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li>The entries for Web page sources are listed in alphabetical order by author (last name, first name)\u2014if known\u2014or the title of the Web page\u2014if the author is unknown\u2014followed by an indication of whether the site is a home page, online posting, etc.; name of any institution or organization sponsoring or associated with the Web site; followed by the date when you accessed the site; and ending with the URL of the source in angle brackets. For example:\n<p>\u201cU.S. Department of Labor\u2019s OSHA Forms Alliance to Reduce Injuries and Illnesses in Maritime Industry.\u201d Region 4 News Release: 09-553-ATL (130). U.S Department of Labor. January 22, 2013. &lt;http:\/\/www.osha.gov\/pls\/oshaweb\/owadisp.show_document?p_table=NEWS_RELEASES&amp;p_id=17954&gt;.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<p><center><a href=\"http:\/\/onlineclassesguru.com\/orders\/ordernow\"><img decoding=\"async\" src=\"https:\/\/encrypted-tbn0.gstatic.com\/images?q=tbn:ANd9GcTyj99p60XCLyLk1htB7-1neRt8-2QdnenNlQ&usqp=CAU\"target=\"_http:\/\/onlineclassesguru.com\/orders\/ordernow\"\/><\/center><p>","protected":false},"excerpt":{"rendered":"<p>Using the articles you have read for this module, write a 500-word essay on what you believe to be the greater threat to the nation\u2014cyber-crime directed against individuals or terrorist cyber-attacks on national institutions. Provide your opinion, supported by readings, on whether the United States is active enough in countering these threats. \u00a0 Articles ATTACHED&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-13566","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberspace privacy and security paper - onlineclassesguru<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberspace privacy and security paper - onlineclassesguru\" \/>\n<meta property=\"og:description\" content=\"Using the articles you have read for this module, write a 500-word essay on what you believe to be the greater threat to the nation\u2014cyber-crime directed against individuals or terrorist cyber-attacks on national institutions. Provide your opinion, supported by readings, on whether the United States is active enough in countering these threats. \u00a0 Articles ATTACHED...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/\" \/>\n<meta property=\"og:site_name\" content=\"onlineclassesguru\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-24T09:06:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineclassesguru.com\/#website\",\"url\":\"https:\/\/onlineclassesguru.com\/\",\"name\":\"onlineclassesguru\",\"description\":\"Cheap Professional coursework and reaction papers help\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineclassesguru.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/#webpage\",\"url\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/\",\"name\":\"Cyberspace privacy and security paper - onlineclassesguru\",\"isPartOf\":{\"@id\":\"https:\/\/onlineclassesguru.com\/#website\"},\"datePublished\":\"2020-11-24T09:06:22+00:00\",\"dateModified\":\"2020-11-24T09:06:22+00:00\",\"author\":{\"@id\":\"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742\"},\"breadcrumb\":{\"@id\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineclassesguru.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberspace privacy and security paper\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742\",\"name\":\"admin_admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/onlineclassesguru.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g\",\"caption\":\"admin_admin\"},\"url\":\"https:\/\/onlineclassesguru.com\/index.php\/author\/admin_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberspace privacy and security paper - onlineclassesguru","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/","og_locale":"en_US","og_type":"article","og_title":"Cyberspace privacy and security paper - onlineclassesguru","og_description":"Using the articles you have read for this module, write a 500-word essay on what you believe to be the greater threat to the nation\u2014cyber-crime directed against individuals or terrorist cyber-attacks on national institutions. Provide your opinion, supported by readings, on whether the United States is active enough in countering these threats. \u00a0 Articles ATTACHED...","og_url":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/","og_site_name":"onlineclassesguru","article_published_time":"2020-11-24T09:06:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin_admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/onlineclassesguru.com\/#website","url":"https:\/\/onlineclassesguru.com\/","name":"onlineclassesguru","description":"Cheap Professional coursework and reaction papers help","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineclassesguru.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/#webpage","url":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/","name":"Cyberspace privacy and security paper - onlineclassesguru","isPartOf":{"@id":"https:\/\/onlineclassesguru.com\/#website"},"datePublished":"2020-11-24T09:06:22+00:00","dateModified":"2020-11-24T09:06:22+00:00","author":{"@id":"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742"},"breadcrumb":{"@id":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/24\/cyberspace-privacy-and-security-paper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineclassesguru.com\/"},{"@type":"ListItem","position":2,"name":"Cyberspace privacy and security paper"}]},{"@type":"Person","@id":"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742","name":"admin_admin","image":{"@type":"ImageObject","@id":"https:\/\/onlineclassesguru.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g","caption":"admin_admin"},"url":"https:\/\/onlineclassesguru.com\/index.php\/author\/admin_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts\/13566"}],"collection":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/comments?post=13566"}],"version-history":[{"count":0,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts\/13566\/revisions"}],"wp:attachment":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/media?parent=13566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/categories?post=13566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/tags?post=13566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}