Deepfakes use AI technology in a number of fairly different ways that impact how

Deepfakes use AI technology in a number of fairly different ways that impact how we think about its effect on a person’s privacy. We’ll consider two significantly different uses of AI in this exercise.
The first approach uses AI technology to make small changes to a video captured of a person in a particular situation. The key point here is that the person in the resulting AI-doctored video was actually in that particular situation doing many, but not all of the things shown.
A good example of this approach is the use of AI to create better dubbing of a film into a foreign language (i.e., not the language spoken in the original shoot). The approach works as follows: Given the original film with an actor saying her lines in one language and a video of another actor performing the script in another language, the AI system produces a resulting film where the original actor’s lips are seamlessly replaced with those of the other actor. It would also replace the original actor’s soundtrack with that of the other actor.
You might use this same technology to create a funny video of your family dog saying something, in the way that today’s memes caption a picture or short video of a dog with a humorous saying. You’d need only the video of your dog, a video of you saying the humorous line, and the earlier described dubbing software.
Now let’s consider a different approach. This time, instead of using AI technology to make small changes to a video of a person in a particular situation, we use the technology to make it look like the person was in a completely different situation. The key point here is that the person in the resulting AI-doctored video was never in that situation doing any of the things shown.
An example of this alternative approach is what is done to create revenge-porn videos. The approach works as follows: Given a video of some person in a compromising situation and a collection of videos or digital images of the target person, the AI system produces a video where the target person’s face is seamlessly placed on the head of the actual person in the compromising video. The system may also make changes to the video’s soundtrack to make it even more believable.
Now let’s flip things. Spend a few minutes thinking about harmful uses of the first approach and harmless uses of the second.
Reflect on the ease or difficulty of what we just asked you to do. Categorize the benefits and harms as accruing to an individual or to society. Record your thoughts in the text box below. What you write will NOT be shared with anyone else.

This assignment will cover what is considered the largest cybersecurity scandal

This assignment will cover what is considered the largest cybersecurity scandal in modern history, the massive release of confidential NSA surveillance tactics via Wikileaks and Edward Snowden. Along with Chelsea Manning, these releases brought words like “whistleblower” into everyday language and changed the public conversation about national security, immigration and terrorism, and the relationship of the tech industry to government. Some of you will remember this happening at the time and some may be learning of this event for the first time. This scandal opened hugely critical questions for not only the cybersecurity community and privacy experts but for the general public around protection from major national threats and the costs of that protection. Some of you will feel this level of surveillance is very worthwhile while others will be troubled by what was uncovered by this scandal. There are no correct reactions here, in fact, many people move across many kinds of reactions over time. We will use this opportunity to catalog some of your new questions about cybersecurity and privacy that arise as you learn more about the scandal and we will use the remainder of the semester to think through the mechanics of cybersecurity that make this level of surveillance possible and how they have advanced in the years since.
We will also consider where the players of this case stand today: Laura Poitras continued to make another documentary specifically about Julian Assange and Wikileaks and went on to found the Intercept with Glenn Greenwald, an online publication dedicated to investigative journalism on corruption and corporate interest. Glenn Greenwald was fired from the Intercept last year, amidst a series of events that deem him an extremely controversial figure who may in 2021 be somehow MORE controversial than Snowden himself!
To this point, the course has focused on our definitions of privacy and how it is protected, how the internet is governed and what is contested, fought over, championed. We have learned some mechanics of the internet, but have focused largely on the social and political spheres that impact privacy and its protections. It is the aim that to this point we ask: what are we willing to give up for safety? What do we gain when we lose privacy? And, what do we lose when we lose privacy?
This film begins a turn in the course: thinking about the connection between privacy and the mechanics of surveillance. Pay attention to the technologies of surveillance here. What are the measures used by the NSA, by the whistleblowers, by Snowden and the journalists? What are the different threats?
In the following sessions we will dive into more specifics technologies of surveillance and then spend our last sessions (this semester is moving fast!) covering threat modeling for ourselves, and privacy protections, including a brief history of hacking and how to be anonymous online. The quiz will help you to think through your assignment and prepare you for the last sessions of the course.
Please watch the Laura Poitras documentary film CITIZENFOUR.
This is the link: https://digitalcampus-swankmp-net.proxy2.cl.msu.edu/michiganstate305576/play/70222dbaa7a2b537
The film focuses on Edward Snowden, and the information he produced showing extent of government digital surveillance programs in the United States and other countries.
To complete this short assignment successfully, you will need to watch the film carefully and take notes (there is also a corresponding Session Quiz to be attentive to, please see D2L for instructions). After watching the film, you will write a short essay answering the questions below.
Quality of writing will be part of your score, so please be sure to write in complete sentences using correct grammar, spelling, punctuation, etc.
For full credit you must answer the four following questions in an essay.
This is an essay so do not submit this assignment as a numbered list. Instead, articulate each of these answers in a cohesive essay with an introduction and conclusion. I recommend 1 paragraph for each question. You must include in-text citations and a reference list at the end in any formatting of your choosing. An essay without references will be deducted credit.
How much did you know of the Edward Snowden case before watching CITIZENFOUR? Describe two examples of surprising things you noticed or learned by watching the film.
Did the film change your opinion of the case? Be specific and use examples from the film to support your points.
Why didn’t Snowden just publish the documents himself online? Why did he choose to work with journalists?
Do you think Snowden had more of a responsibility to maintain the confidentiality his employers required of him, or to the American people in revealing what he perceives as wrongdoings against them? Why? Be specific and use examples from the film to support your points.
Your essay should be about 750 words long. You will find this is not much space, so please be deliberate with your words, do not include repetitive thoughts and ensure that you have answered all of the questions through your essay.

Part 4: Your company’s management wants to make sure it has policies and procedu

Part 4:
Your company’s management wants to make sure it has policies and procedures in place to protect the privacy of visitors to its Web site. You have been asked to develop a Web site privacy policy. The TRUSTe Web site at www.truste.com describes privacy best practices to help you draft your company’s privacy policy. You can also examine specific companies’ privacy policies by searching for Web site privacy policies on Yahoo!, Google or another search engine. Add to your report for management and address the following issues:
How much data should your company collect on visitors to its Web site? What information could it discover by tracking visitors’ activities at its Web site? What value would this information provide the company? What are the privacy problems raised by collecting such data?
Should the company use cookies? What are the advantages of using cookies for both the company and its Web site visitors? What privacy issues do they create for your company?
Should your company join an organization such as TRUSTe to certify that it has adopted approved privacy practices? Why or why not?
Should your company adopt an opt-in or opt-out model of informed consent?
Include in your report a short (two to three pages) privacy statement for your company’s Web site.
Part 5:
Use spreadsheet software to compare the total three-year cost of licensing and maintaining new manufacturing software or renting the software from an application service provider.
The company would like to implement new production planning, quality control, and scheduling software for use by 25 members of its manufacturing staff. Management is trying to determine whether to purchase the software from a commercial vendor along with any hardware required to run the software or to use a hosted software solution from a software service provider. (The hosted software runs on the service provider’s computer.) You have been asked to help management with this rent vs. buy decision by calculating the total cost of each option over a three-year period. The costs of purchasing the software (actually for purchasing a license from the vendor to use its software package) include the initial purchase price of the software (licensing fee of $100,000 paid in the first year), the cost of implementing and customizing the software in the first year ($20,000), one new server to run the software (a first-year purchase of $4000), one information systems specialist devoting half of his or her time to supporting the software ($55,000 in full-time annual salary and benefits with a 3% annual salary increase each year after the first year), user training in the first year ($10,000), and the cost of annual software upgrades ($5,000). The costs of renting hosted software are the rental fees ($2500 annually per user), implementation and customization costs ($12,000 in the first year), and training ($10,000 in the first year). Use your spreadsheet software to calculate the total cost of renting or purchasing this software over a three-year period. Identify the lowest-price alternative that meets the company’s requirements.
What other factors should your company consider besides cost in determining whether to rent or buy the hardware and software?
Part 6:
Your company may sell through its distributors. It maintains a small customer database with the following data: customer name, address (street, city, state, zip code), telephone number, model purchased, date of purchase, and distributor. These data are collected by its distributors when they make a sale and are then forwarded to your company.
How would you redesign or design your company’s customer database so that it can store and provide the information needed for marketing? You will need to develop a design for the new customer database and then implement that design using database software. Consider using multiple tables in your new design. You may want to use Lucid Charts to develop the ERD
Consider the types of reports you would use with this data. What are they? What would you include in them? What would be of great interest to your marketing and sales department (for example, lists of repeat customers, customers who attend events sponsored by your company, the average ages and years of schooling of your customers). Prepare a listing of the types of reports and content that your company would benefit from knowing. You can name them and describe their uses or even develop a database and create the reports to include in your report.

This is a Technology Capstone Project and a Final Report needs to be prepared. W

This is a Technology Capstone Project and a Final Report needs to be prepared. Whatever I am attaching to the zip file, I am elaborating below:
1) Final Report (Group) – This is the guide to the final report. This contains the elements that the report must have. You will also see a marking criteria, and you must ensure that the elements have touched them to secure full marks. 2) Project Proposal and Plan Report (Group), its marking criteria (in images), and feedback (in image) – This will give you an overview of what’s happening, and its marking criteria and feedback will show the shortcomings or areas for improvement. The shortcomings and feedback will help you be more accurate when preparing the final report. 3) The summaries 1 & 2: These highlight whatever happened with the project. These are basically our status updates to the sponsor. 4) Group Members Contribution Summary – This contains the contributions from the other members. Basically, whatever technical work they have done. Since I am doing the writing part, my job is to prepare the report and do nothing technical. 5) Our Project – This image is about our project.

Compare and contrast Agile Usage-Centered Design with eXtreme “planning Game” fo

Compare and contrast Agile Usage-Centered Design with eXtreme “planning Game” for requirement determination.
Find sources to support document. Below is attached pdf docs from:
Valacich, J., & George, J. (n.d.). Modern Systems Analysis and Design, 9/e. Retrieved from https://platform.virdocs.com/read/2228527/75/#/4/2[P7001015738000000000000000001E4C]/10[P7001015738000000000000000001E75]/2/2[P7001015738000000000000000001E76],/1:0,/1:0

Individual Reflection Guide (3-5 pages, append exhibits); have outline (handwrit

Individual Reflection Guide (3-5 pages, append exhibits); have outline (handwritten is great or typed) and along with the typed document.
1.Company, Purpose, and Needs statement
2.The vision of the solution and how it evolved
3.How you understood the user’s needs/wants
4.How you constructed the solution and how it works
5.How you tested the solution
6.What hurdles you faced and how they were addressed
7.What you learned about yourself, technology, and process
8.Where could you, or another group, take this project.
The project company’s name is founder’s forge, which is to create a fundraising platform to connect startups to investors online. Any Information and work that had been done is attached in the files(founders’ forge, business functions and user stories pdf file). Please refer to those files in order to know what had been for the past quarter. Then, write an essay reflection based on the prompts and questions provided above. feel free to decide the company’s needs statement yourself. Just to let you know, we used odoo database, an ERP software to create the company’s website. If you are familiar with odoo, you will understand thoroughly. My role in this project is being the CFO, that means I worked on all the financials and invoices as well as doing the market opportunity in figuring out the annual market demand.

Compare and contrast Agile Usage-Centered Design with eXtreme “planning Game” fo

Compare and contrast Agile Usage-Centered Design with eXtreme “planning Game” for requirement determination.
Find sources to support document. Below is attached pdf docs from:
Valacich, J., & George, J. (n.d.). Modern Systems Analysis and Design, 9/e. Retrieved from https://platform.virdocs.com/read/2228527/75/#/4/2[P7001015738000000000000000001E4C]/10[P7001015738000000000000000001E75]/2/2[P7001015738000000000000000001E76],/1:0,/1:0

Individual Reflection Guide (3-5 pages, append exhibits); have outline (handwrit

Individual Reflection Guide (3-5 pages, append exhibits); have outline (handwritten is great or typed) and along with the typed document.
1.Company, Purpose, and Needs statement
2.The vision of the solution and how it evolved
3.How you understood the user’s needs/wants
4.How you constructed the solution and how it works
5.How you tested the solution
6.What hurdles you faced and how they were addressed
7.What you learned about yourself, technology, and process
8.Where could you, or another group, take this project.
The project company’s name is founder’s forge, which is to create a fundraising platform to connect startups to investors online. Any Information and work that had been done is attached in the files(founders’ forge, business functions and user stories pdf file). Please refer to those files in order to know what had been for the past quarter. Then, write an essay reflection based on the prompts and questions provided above. feel free to decide the company’s needs statement yourself. Just to let you know, we used odoo database, an ERP software to create the company’s website. If you are familiar with odoo, you will understand thoroughly. My role in this project is being the CFO, that means I worked on all the financials and invoices as well as doing the market opportunity in figuring out the annual market demand.

Compare and contrast Agile Usage-Centered Design with eXtreme “planning Game” fo

Compare and contrast Agile Usage-Centered Design with eXtreme “planning Game” for requirement determination.
Find sources to support document. Below is attached pdf docs from:
Valacich, J., & George, J. (n.d.). Modern Systems Analysis and Design, 9/e. Retrieved from https://platform.virdocs.com/read/2228527/75/#/4/2[P7001015738000000000000000001E4C]/10[P7001015738000000000000000001E75]/2/2[P7001015738000000000000000001E76],/1:0,/1:0

Individual Reflection Guide (3-5 pages, append exhibits); have outline (handwrit

Individual Reflection Guide (3-5 pages, append exhibits); have outline (handwritten is great or typed) and along with the typed document.
1.Company, Purpose, and Needs statement
2.The vision of the solution and how it evolved
3.How you understood the user’s needs/wants
4.How you constructed the solution and how it works
5.How you tested the solution
6.What hurdles you faced and how they were addressed
7.What you learned about yourself, technology, and process
8.Where could you, or another group, take this project.
The project company’s name is founder’s forge, which is to create a fundraising platform to connect startups to investors online. Any Information and work that had been done is attached in the files(founders’ forge, business functions and user stories pdf file). Please refer to those files in order to know what had been for the past quarter. Then, write an essay reflection based on the prompts and questions provided above. feel free to decide the company’s needs statement yourself. Just to let you know, we used odoo database, an ERP software to create the company’s website. If you are familiar with odoo, you will understand thoroughly. My role in this project is being the CFO, that means I worked on all the financials and invoices as well as doing the market opportunity in figuring out the annual market demand.