...Surveillance Awareness Project A proposal prepared by Team Underachievers Shea Polansky Gabriela Cde Baca Jacob Nevarez Elliot Nicholas For Dr. Natasha Jones University of New Mexico 2014-10-21 Team Underachievers Memo TO:Dr. Natasha Jones FROM:Team Underachievers DATE:2014-10-7 SUBJECT:Proposal PURPOSE:To acquaint you with our proposal Dear Dr. Jones, Edward Snowden’s leaks about the National Security Agency’s mass surveillance programs created a global debate about privacy, security, and safety. The NSA has the capability to read email, snoop on private social network conversations, observe phone call records, and track the physical locations of citizens not charged nor suspected of any crime, without so much as a warrant. Worse, the demographic most affected this level of snooping on our digital lives, the 18-24 year-old college crowd, is the least knowledgeable and most politically apathetic about the issue. This is a recipe for disaster, and this proposal seeks funding for an awareness campaign that will address it. This campaign will raise awareness about mass surveillance and the Snowden disclosures. We will use posters and flyers to dry attention to the issue. We will use the University of New Mexico as a testing ground, using before and after surveys to gauge effectiveness. If the campaign proves successful, we will recruit volunteers and raise a second round of funding to bring the campaign to college campuses across...
Words: 3481 - Pages: 14
...taylor | Course and Section Number | Program of Study | Man1030 | business | Introduction to Business MAN1030 Week 2 Individual Work The Challenges to Ensure Your Organization Acts Ethically and is Socially Responsible Assignment Instructions | To complete this assignment: 1. Select question 1, 2, or 3 below and answer it in the space provided. 2. Reflect on the information presented in this week’s lesson and provide an insightful response to each question writing no more than two paragraphs. 3. An example of an excellent response is given for you. | Save and Submit to Dropbox | 1. Save your work as a Microsoft Word 2010 (.docx) file that includes your name, course code, and title in the file name. For example: JaneSmith_MAN1030_Week2.docx. 2. To submit your assignment, go to the Dropbox and click "Submit Assignment." 3. Click on the drop-down menu to select the Week 2: Individual Work basket in the Dropbox. | Objective:Describe the importance of business ethics and social responsibility. EXAMPLE:Find a current article about ethics in business. After reading the article, write a response in which you summarize the article and, in your own words, assess the article. | Example answer:I found an article discussing NSA spying on Verizon, and whether it was ethical for Verizon to disclose that it was providing NSA with all phone records. If the government requests data, I believe that Verizon should be more transparent. Their contracts...
Words: 532 - Pages: 3
...Fourth Amendment guarantees “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” The NSA’s surveillance programs violates the Fourth Amendment by collecting telecommunication data and storing it in a database. The US PATRIOT Act and the Foreign Intelligence Surveillance Act allows the NSA to continue to run these controversial surveillance program today. The United States should end or reform...
Words: 948 - Pages: 4
...NSA Surveillance Program Eric D. Reeves ITT Tech Online MG517 – Ethical and Regulatory Environment Dr. Carrie A. O'Hare June 9, 2013 Abstract/Executive Summary The American people are reaping what they sow. They were so eager to have any semblance of security after 9/11, that they allowed the Patriot Act to be rammed through Congress and signed into law all in a matter of days despite warnings from critics that it could be used to infringe upon citizens’ rights. NSA Surveillance Program has been in the news over the past week. It was revealed Wednesday June 5, 2013 in The Guardian that the NSA had requested the phone records of millions of Version’s customers regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction: This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and...
Words: 2521 - Pages: 11
...------------------------------------------------- The Government and “The Cloud” DéAna Colón Project-Based Information Systems, 90.480.032, TP5 Table of Contents Table of Contents 2 Introduction 3 US Privacy Rights 3 Loss of Companies’ Products/Services 4 Government’s Cloud-Data Security 6 Negative Impact on International Relations 7 Loopholes 8 Conclusion 9 Sources 10 Figure 1: Cisco's Projected Revenue Chart 5 Figure 2: Key Stakeholders and Responsibilities for FedRAMP 7 Introduction With the technological advances made, cloud-based data storage has become a staple in businesses worldwide. Storing data using a web-based content management system offers a limitless amount of off-site storage, allowing companies to save larger amounts of data longer. The United States government currently has the unwarranted authority to read emails or access cloud-based data that has been stored for six months or more. Both positive and negative aspects are realized with this controversy. On a positive perspective, many feel the government accessing the data could be beneficial. Probing may help the government prevent terrorism in the United States. It may also provide the information needed to better forecast the country’s economic future. A disparaging concern is that companies feel the government is violating privacy rights. In addition, possible data leaks may result in a company’s loss of product or services. Ultimately, it must be decided whether the...
Words: 2612 - Pages: 11
...Contrary to what many people may think, online private data and cellphone meta-data is susceptible to snooping by not only government agencies and corporations, but also hackers willing to risk a prison sentence. In 2013, NSA whistle blower Edward Snowden revealed previously unknown details of global surveillance programs run by the United States' NSA in close cooperation with three partners: Australia, the United Kingdom, and Canada. The documents leaked by Mr. Snowden revealed details about the NSA secretly tapping into Yahoo and Google data centers to collect information from millions of accounts worldwide. The shocking evidenced released by Mr. Snowden reveals that lawmakers and politicians should take greater control over how and why they are using their surveillance technologies, and question whether or not the fight against terrorism justifies the use of these surveillance programs on citizens as well. Furthermore, it is important to ensure that there be continued innovation in internet security in order to create services and products which can counter-act the use of these programs on ordinary citizens who don’t want their data accessible to anyone but themselves. Spying agencies are able to cripple the civil liberties and the right to privacy of citizens, therefore it is imperative that the government protect the rights of citizens through reforms on Surveillance Acts, but it is also equally pertinent for citizens take initiative and push for new reforms and innovation...
Words: 1527 - Pages: 7
...As the world’s largest non-alcoholic beverage company, Coca-Cola generates petabytes of data from various sources. Multi-channel retail data, customer profile data from loyalty programs, social media data, supply chain data, competitor data, sales and shipment data from bottling partners as well as transaction and merchandising data. Coca-cola collects vast amounts of data and they take a refreshing approach in exploiting that data and deriving value from it. Chief Big Data Insights Officer, Esat Sezer, explains that Coca-Cola takes a strategic approach instead of a tactical approach with big data. They use the vast amount of available data sets to change the way they approach IT. They have embraced big data technologies and as such were able to create a shared services centre for their financial transactional activities as well as an employee service centre for HR activities. They moved from a decentralized approach to a centralized approach, where the data is combined centrally and available via the shared platforms across the organization. In addition, Coca-Cola has almost 70 million Facebook followers and big data enables Coca-Cola to connect to these followers better and be able to grow the brand advocacy. Coca-Cola also leverages Point of Sales data from companies like Walmart (Walmart alone is responsible for $ 4 billion in Coca-Cola sales annually) to build customer profiles, create centralized iPad reporting across the company and enable Collaborative Planning, Forecasting...
Words: 2706 - Pages: 11
...Eco-30043 Economic and Business Forecasting Assignment 2012/13 A year ago you were hired as an entry-level assistant business analyst by an advertising agency. Last week, top management requested a review of household consumption behaviour in the United Kingdom. They are particularly interested in whether the recent financial crisis and the economic recession that followed, have permanently altered consumption patterns in the country. The chief analyst, and head of your department, holds a briefing with the entire team in order to assign tasks. You have been asked to do what you have been doing since day one, which is secondary data collection. Confident in your abilities, you see this as an opportunity to gain a more substantive role within the department. You argue that you can provide a thorough and sophisticated analysis of consumer expenditure, complete with reliable forecasts for the foreseeable future. You suggest preparing a report on the analysis of only a subset of goods and services to showcase your technical and analytical skills. The chief analyst agrees to consider your work. If the report you present is at par with the required standard, both in technical detail and analytical discussion, you would be assigned a more prestigious role in the larger scale project, which could lead to a promotion within the department to a more senior level. You are forwarded the data file report1213.dta, which contains, among other, information on UK household expenditure on certain...
Words: 1070 - Pages: 5
...Christina Selden Week 8 12-7 1. This grant has the characteristics of an exchange transaction rather than a contribution. It is not donor restricted and therefore would be reported in an unrestricted fund. 2014 No entry 2015 Research expenses (direct) 4 Cash (or accounts payable) 4 Grants and contracts receivable 6 Revenue from sponsored research 6 Cash 6 Grants and contracts receivable 6 2. 2014 Pledges receivable (from NSA) 6 Revenues from contributions 6 2015 Research expenses (direct) 4 Cash (or accounts payable) 4 Due from restricted fund 6 Resources released from restrictions 6 Cash 6 Due from restricted fund 6 Cash 6 Pledges receivable (from NSA) 6 Resources released from restrictions 6 Cash 6 3. The grant revenue from the SGMA was recognized only as the research was carried out. It is an ordinary commercial cost plus contract. The restricted contribution from the NSA was recognized when the pledge was made. 4. CAA would not recognize revenue from NSA’s contribution until it had completed the research. 12-8 Cash 30,000 Revenues from contributions 30,000 Resources released from restriction 21,000 Cash 21,000 Equipment 21,000 Resources released from restriction 21,000 Depreciation expense 7,000 Accumulated depreciation ...
Words: 1171 - Pages: 5
...abril! Like · Comment · Share · 133 Darryl Lovendino 7 April at 10:01 · Wahahahahah Darryl Lovendino's photo. Like · Comment · Share Karl Chrolo Lovendino, JuJo BaJojo, BO OO and 9 others like this. Darryl Lovendino Write a comment... News Feed Darryl Lovendino shared Waka Flocka Flame's video. 9 March · 7,919,334 Views Waka Flocka Flame uploaded a new video. Like · Comment · Share Solo Kun Hahahaha naimaine ko po kayooo XD 9 March at 10:31 · Like Darryl Lovendino Write a comment... Darryl Lovendino shared Trust Me, I'm a "Psychologist"'s photo. 7 March · Trust Me, I'm a "Psychologist"'s photo. Trust Me, I'm a "Psychologist" tweet it @trustpsychology See translation Like · Comment · Share · 1 Darryl Lovendino shared a link. 2 March · iOS · Drugs As Tools For Spirituality "The program is a voyage chart, a series of signals, which, like the pilot’s radio provides the basic orienting information required for the “trip.” - Timoth... YOUTUBE.COM Like · Comment · Share Darryl Lovendino Write a comment... Darryl Lovendino 21 February · New look mogs. Edward Darryl Lovendino's photo. Like · Comment · Share · 104 News Feed In a relationship with Jun Ji-Hyun From Seoul, Korea Born on 9 July 1994 (20 years old) Followed by 1,892 people FRIENDS · 936 Min Sung Jung Son Joana San...
Words: 901 - Pages: 4
...Week 2 homework Visual Basic- Name can't exceed 255 characters You must use a letter as the first character. You can't use a space, (.),(!), @, &, $, # in the name. Python- Must begin with a letter (a - z, A - B) or underscore (_) Other characters can be letters, numbers Case Sensitive Can be any length Java-The name can be of any length. All variable names must begin with a letter of the alphabet, an underscore, or ( _ ), or a dollar sign ($). Similarities 1. Must begin with a letter of the alphabet. 2. There are certain keywords that cannot be used. 3. The length of the name can be any reasonable length. Differences 1. Visual basic has Graphical User Interface while most of the languages such as c and c++ doesn't have 2. It has IDE i.e. other languages design there programs on editor and run program on dos prompt but in case of visual basic all tasks are done under same environment. 3. Visual basic is an event driven language. p.71 Short Answer 1. Ask Questions 2. Pseudocode is a kind of structured English for describing algorithms 3. Input received, Process happens, Output produced 4. Easier to understand and manipulate Workbench 1. Console.WriteLine("Enter Height:"); String number1 = String.Empty; number1 = Console.ReadLine(); 2. Console.WriteLine("Enter Color:"); String number1 = String.Empty; number1 = Console...
Words: 251 - Pages: 2
...News! 1. 6/6/2013 Doug Gross. * Barack Obama believes that there should be internet access in all schools. He wants to provide funds to around 99% of public schools for them to be able to have internet, even in libraries. He says that he wants all American students to be connected online in five years. Usually, adults don’t go for this type of thing they want children to not be so ‘connected’ to the internet. They want kids to not spend so much time on computers, but he almost wants just that to happen. People are becoming way too dependent on computers and the internet, which even libraries are eventually only going to be used just for that. Although Obama is more so moderate, this idea is clearly making him to be a liberal. He wants the change and wants to continue to further the change on technology. 2. 6/8/2013 Maureen Dowd * In this article, she quotes the book 1984. She is talking about how Bush felt about 9/11 and some of the after effects. It turns out that, for seven years the N.S.A was taking information from our phone calls. This all started while Bush was president through a program called prism. Prism would let the F.B.I. and N.S.A. into many social media websites and was able to access all of our information. These people were trying to spot out terrorists, and will go to any means necessary. According to Obama, they necessarily can’t hear the conversations; they are just able to learn about who we call. They also are saying that they don’t...
Words: 4728 - Pages: 19
...This Week in Sex: Bisexual Men Have Unique Needs, Casual Sex Is Good for Some, Later Childbirth Linked to Longer Life by Martha Kempner June 27, 2014 - 11:50 am A new study suggests that reactions to casual sex are mostly about the individuals who are having it and how authentic they are being to their own sexual mores. (Couple in bed via Shutterstock) This Week in Sex is a weekly summary of news and research related to sexual behavior, sexuality education, contraception, STIs, and more. The Public Health Community and the Needs of Bisexual Men A new study in the Journal of Preventative Medicine argues that the public health community has not paid enough attention to the unique needs of bisexual men. In Beyond the Bisexual Bridge, author William Jeffries suggests that men who have sex with men and women (MSMW) are often seen as transmitters of sexually transmitted infections (STIs) including HIV, and, more to the point, as the way in which certain diseases or epidemics jump from gay men to heterosexuals of both sexes. By looking at them as disease vectors and not a population with their own sexual health issues, however, Jeffries believes that we are making bisexual men more vulnerable to STIs. Only about 2 percent of the male population identifies as MSMW but, according to the study, their sexual health needs and experiences are different from those of heterosexual or straight men. They are more likely to have early sexual debut, forced sexual encounters, and sex in...
Words: 3174 - Pages: 13
...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...
Words: 7224 - Pages: 29
...Whistleblowing: Necessary Evil or Good Thing Maureen Haley University of North Carolina – Asheville April 16, 2014 This paper was prepared for Management 484-001, taught by Professor Donald D. Lisnerski Whistleblowing: Necessary Evil or Good Thing Is whistleblowing a necessary evil or good thing? Can whistleblowing be avoided? Can the whistleblower be protected? “A whistleblower is an employee who discovers corporate misconduct and chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such disobedience...
Words: 3746 - Pages: 15