Cambridge Analysis Case Assignment Essay
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Cambridge Analysis Case Assignment Essay
- Answer to the following discussion question: (Minimum 250 words with 2 APA references)
Please describe an instance of which you are aware in which an act of internet crime took place.
- Respond to the following discussion post which was posted by another student (minimum 100 words) – Zhiwei Zhao
A very clear incident is the facebook data leak.
The US Federal Trade Commission is reportedly investigating social media giant Facebook, whose personal data of 50 million users was accused of being abused by Cambridge Analytica, a British political consultancy.
The “Cambridge Analysis” company is facing the use of personal data to influence the US 2016 presidential election and the UK Brexit referendum survey.
What kind of company is “Cambridge Analysis”? The company’s website boasted that it has supported and conducted more than 100 events on five continents, covering much more than the United Kingdom and the United States.
“Cambridge Analytical” has suspended the position of CEO Alexander Nix. On Channel 4 of British TV on Monday (March 19), a video of a secret filming of a Knicks undercover interview was broadcast on the station. The Knicks exemplified how the company can influence elections by tricks, such as smearing candidates or applying traps or temptations.
The UK-based company denied any wrongdoing. “Cambridge Analysis” has a lot of activity records around the world, let’s take a look at what:
Knicks, CEO of “Cambridge Analysis”, was filmed by undercover reporter on Channel 4 TV
Europe
“Cambridge Analysis” company executives said in a video program broadcast on Channel 4 TV that “Cambridge Analysis” and its parent company “Strategic Communications Lab” have participated in more than 200 elections held around the world, including Czech Republic.
Company director Mark Turnbull said, “We just used an agency to operate a very, very successful project in Eastern European countries, and no one even knows they were there.”
The “Cambridge Analysis” website also stated that the company represented the “Revival Party that was successful in the 1980s” in the 2012 Italian political campaign.
“In the turbulent Italian political arena, the ‘Cambridge Analysis’ company’s reform proposals made the party’s performance exceed the original expectations.”
But the role of the “strategic communication lab” can be traced back further. It claimed to have helped Ukraine launch a color revolution in 2014, bringing pro-Western President Viktor Yushenchenko to power.
An old article published on the “Strategic Communications Lab” website said, “The ‘Strategic Communications Lab’ successfully maintained the cohesiveness of the alliance and ensured a hard-won victory.”
The “Strategic Communications Laboratory” recently stated that the Ukrainian government has hired it to provide “localized publicity campaigns” to help the Ukrainian side regain control of Donetsk in the eastern conflict.
The company said, “The final project report has been handed over to the President of Ukraine. This report will play a key role in future national decision-making.”
The “Strategic Communications Laboratory” stated that during the conflict in eastern Ukraine, it was employed to launch an “erosion and weaken” Donetsk anti-government organization.
- Respond to the following discussion post which was posted by another student (minimum 100 words) – Atilla Genc
With the dynamic nature of technology in the modern world, there seems to be a continuous rise in internet crimes. Internet crime basically refers to any crime in which illegal activity or crime is committed on the internet. (Chan, Ghose & Seamans, 2016). Internet criminals usually target a specific system in an organization
information system to gain access to sensitive information or alter the working of that particular system to suit their ill motives. Internet crimes are conducted by a third party who is not legally allowed to access information or tamper with the information system of an organization or an individual. Organizations and individuals
should therefore be aware of various ways through which their information systems may be prone to unauthorized access and influence.
Internet crime has been on the rise due to increasing computer literacy in most parts of the world. Though internet crime takes many shapes, the most common cases involve hacking, tracking, malware infection, and spying (Stalans, & Finn, 2016). In one of my previous place of work, we experienced a particular incidence of
internet crime. The head of the IT department detected some changes made into a file containing some of the most sensitive information of our organization. The department head informed the management about the case, and investigations on what happened were launched. After the investigation, it was found that the
criminal was a former IT head who had been fired before. It was due to the omission of the IT department and the management because they had forgotten to change passwords and lock employees account after termination. Had they practiced usual practice of locking employee accounts and changing systems passwords,
this incidence could have been avoided.
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow Cambridge Analysis Case Assignment Essay