compile a 3 source annotated bibliography related to the file attached below abo

compile a 3 source annotated bibliography related to the file attached below about “The Impact of Technology on Society”. Choose peer reviewed articles and scholarly sources from reputable organizations and agencies, example .org and .edu. I will not accept any .com references
Each annotation must include the following:
Proper APA reference information for your source
2 Relevant quotes from the source with proper in-text citation
And an annotation comprised of three short paragraphs :
Summary—In your own words, what were the key points that stood out to you about this article? What information is most important to keep in mind?
Evaluation—Is this a strong source—why/why not? Is this a trustworthy source—why/why not?
Application—How will you use this source in your speech?
The goal is to summarize the article or source and then discuss how this will be used in your presentation (i.e. to support your thesis/objective and to help you make what points?).
Comments from Customer
Discipline: annotated bibliography

Video surveillance systems play a pivotal role in maintaining security and safet

Video surveillance systems play a pivotal role in maintaining security and safety in various environments. However, traditional surveillance methods often face challenges in effectively monitoring vast amounts of video data in real-time and extracting meaningful insights. The emergence of artificial intelligence (AI) technologies has revolutionized the field by enabling intelligent monitoring capabilities. This review paper as a combination of artificial intelligence and machine learning explores the application of AI techniques in enhancing video surveillance systems, focusing on key areas such as object detection, tracking, activity recognition, anomaly detection, and integration with other sensor modalities. Beyond its technical abilities, the study navigates the ethical landscape surrounding AI Sentinel, addressing concerns related to privacy and responsible deployment. By providing a nuanced understanding of AI Sentinel′s advancements and practical applications, this contributes to the discourse on intelligent video surveillance, and positioning.

Note: You do not need to actually create a local VM or AWS, only answer Question

Note: You do not need to actually create a local VM or AWS, only answer Questions 1-8 at the bottom. Part 1: Create a local VM:
VirtualBox from Oracle for your OS may be downloaded at:
https://www.virtualbox.org/wiki/Downloads (Links to an external site.)Links to an external site.
Once your VM is turned on and functioning:
From VirtualBox, click Machine>Take Snapshot and provide a name/descriiption and click “OK”. The snapshot name and a short descriiption can help you identify why a snapshot was made, when, and why. Including this information is a common recommended practice, as it makes managing multiple snapshots easier
From VirtualBox, click Machine>Take Snapshot and provide a name/descriiption and click “OK”
The snapshot name and a descriiption can help you identify why a snapshot was made, when, and why.
On the desktop of your VM, create a file, folder, or any other artifact that is visible on the desktop.
If you’re doing a purely CLI based VM, create a textfile in a directory you’re able to access
Power off / Shut down your VM
In VirtualBox in your “Oracle VM VirtualBox Manager” select your VM in the left column, and click the icon with three squares and three rectangles.
Click Snapshots
Select the Snapshot you took in step A and click “Restore”
Power your VM on
Look for the file created in step D.
Look into Virtual drivers
Modify one of the drivers, such as the network driver
Use the internet in your virtual machine
Then disable the driver
(DOES NOT NEED TO BE ANSWERED, just to think about)
What happens to the internet connection?
Can you still use the internet on your host machine?
Reactivate the driver if necessary
Install some software of your choice
How is the installation process?
Were there any limitations?
Did you run into any issues?
Share files between host and virtual machine
What’s the process like?
Any issues?
What are some potential issues?
Part 2 Create and Access and EC2 instance on AWS:
Create an account on AWS for their Free tier, and follow this guide: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EC2_GetStarted.htmlLinks to an external site.
Create a Windows Server 2022 instance using their Free tier Windows Server 2022 AMI. Note: THIS WILL BE SLOW. We are using the absolute bare minimum resources to create it in AWS’ free tier.
Answer the following questions in your submitted document.
[Q1] Express what the effect was of taking a snapshot before a change, and restoring to a snapshot after a change was made. Your answer should explain why the file created in step b) is gone, and what the effect of restoring to a snapshot from before you created the file was (3-6 sentences expected)
[Q2] How might a software developer use this functionality when developing or testing a new system? (3-6 sentences expected)
[Q3] How might a system admin use this functionality in the course of their job when applying a new update, firmware, or feature deployment to a virtualized server or environment? (2-4 sentences expected)
[Q4] What were the system configurations you gave your system (Memory, Storage, Processor(s), etc)? Why those values? What were the limiting factors in not provisioning the virtual machine with double, triple, or 10 times that amount? (3-5 sentences expected. You may use a list to enumerate the system resources)
[Q5] How do virtual machines utilize virtual drivers, and what’s the impact of altering these drivers within the virtual machine, both on the virtual machine itself and the host machine? Are there any common issues that arise from such modifications, and if something goes awry, what are the steps to rectify the situation, or better yet, how can one prepare to prevent issues? (2-4 sentences)
[Q6] How does the file-sharing mechanism between virtual and host machines operate, and is there synchronization when modifications are made on one side, or is there a separation, and why does it exist? (2-3 sentences)
[Q7] AWS: What was different about the process of setting up a VM in VirtualBox (or your alternative) and AWS? What was different in how you navigated your on-machine VM vs AWS? (2-4 sentences)
[Q8] AWS: Did you shutdown your AWS instance? If not, GO DO IT! You pay as you go, and the free tier can burn your ‘credits’. Why is it critical to manage your spend in cloud environments for deployed/created systems? (1-3 sentences)

Note: You do not need to actually create a local VM or AWS, only answer Question

Note: You do not need to actually create a local VM or AWS, only answer Questions 1-8 at the bottom.
Part 1: Create a local VM:
VirtualBox from Oracle for your OS may be downloaded at:
https://www.virtualbox.org/wiki/Downloads (Links to an external site.)Links to an external site.
Once your VM is turned on and functioning:
From VirtualBox, click Machine>Take Snapshot and provide a name/descriiption and click “OK”.
The snapshot name and a short descriiption can help you identify why a snapshot was made, when, and why. Including this information is a common recommended practice, as it makes managing multiple snapshots easier
From VirtualBox, click Machine>Take Snapshot and provide a name/descriiption and click “OK”
The snapshot name and a descriiption can help you identify why a snapshot was made, when, and why.
On the desktop of your VM, create a file, folder, or any other artifact that is visible on the desktop.
If you’re doing a purely CLI based VM, create a textfile in a directory you’re able to access
Power off / Shut down your VM
In VirtualBox in your “Oracle VM VirtualBox Manager” select your VM in the left column, and click the icon with three squares and three rectangles.
Click Snapshots
Select the Snapshot you took in step A and click “Restore”
Power your VM on
Look for the file created in step D.
Look into Virtual drivers
Modify one of the drivers, such as the network driver
Use the internet in your virtual machine
Then disable the driver
(DOES NOT NEED TO BE ANSWERED, just to think about)
What happens to the internet connection?
Can you still use the internet on your host machine?
Reactivate the driver if necessary
Install some software of your choice
How is the installation process?
Were there any limitations?
Did you run into any issues?
Share files between host and virtual machine
What’s the process like?
Any issues?
What are some potential issues?
Part 2 Create and Access and EC2 instance on AWS:
Create an account on AWS for their Free tier, and follow this guide: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EC2_GetStarted.htmlLinks to an external site.
Create a Windows Server 2022 instance using their Free tier Windows Server 2022 AMI. Note: THIS WILL BE SLOW. We are using the absolute bare minimum resources to create it in AWS’ free tier.
Answer the following questions in your submitted document.
[Q1] Express what the effect was of taking a snapshot before a change, and restoring to a snapshot after a change was made. Your answer should explain why the file created in step b) is gone, and what the effect of restoring to a snapshot from before you created the file was (3-6 sentences expected)
[Q2] How might a software developer use this functionality when developing or testing a new system? (3-6 sentences expected)
[Q3] How might a system admin use this functionality in the course of their job when applying a new update, firmware, or feature deployment to a virtualized server or environment? (2-4 sentences expected)
[Q4] What were the system configurations you gave your system (Memory, Storage, Processor(s), etc)? Why those values? What were the limiting factors in not provisioning the virtual machine with double, triple, or 10 times that amount? (3-5 sentences expected. You may use a list to enumerate the system resources)
[Q5] How do virtual machines utilize virtual drivers, and what’s the impact of altering these drivers within the virtual machine, both on the virtual machine itself and the host machine? Are there any common issues that arise from such modifications, and if something goes awry, what are the steps to rectify the situation, or better yet, how can one prepare to prevent issues? (2-4 sentences)
[Q6] How does the file-sharing mechanism between virtual and host machines operate, and is there synchronization when modifications are made on one side, or is there a separation, and why does it exist? (2-3 sentences)
[Q7] AWS: What was different about the process of setting up a VM in VirtualBox (or your alternative) and AWS? What was different in how you navigated your on-machine VM vs AWS? (2-4 sentences)
[Q8] AWS: Did you shutdown your AWS instance? If not, GO DO IT! You pay as you go, and the free tier can burn your ‘credits’. Why is it critical to manage your spend in cloud environments for deployed/created systems? (1-3 sentences)

Learning Objective: Evaluate the mission, vision, and values statements of an IT

Learning Objective:
Evaluate the mission, vision, and values statements of an IT organization.
Details:
Select and research a specific organization. In at least 250 words, discuss the following in your main post.
Summarize an organization’s public documentation, specifically their mission, vision, and values statements.
Explain why each of these documents is important to the organization.
Include whether the documents mention information security. If not, explain why they should or should not.

Overview In this assignment, you will gain more practice with designing a progra

Overview
In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for a higher/lower game. This will give you practice designing a more complex program and allow you to see more of the benefits that designing before coding can offer. The higher/lower game will combine different programming constructs that you have been learning about, such as input and output, decision branching, and a loop.
Higher/Lower Game Descriiption
Your friend Maria has come to you and said that she has been playing the higher/lower game with her three-year-old daughter Bella. Maria tells Bella that she is thinking of a number between 1 and 10, and then Bella tries to guess the number. When Bella guesses a number, Maria tells her whether the number she is thinking of is higher or lower or if Bella guessed it. The game continues until Bella guesses the right number. As much as Maria likes playing the game with Bella, Bella is very excited to play the game all the time. Maria thought it would be great if you could create a program that allows Bella to play the game as much as she wants.
Prompt
For this assignment, you will be designing pseudocode for a higher/lower game program. The higher/lower game program uses similar constructs to the game you will design and develop in Projects One and Two.
Review the Higher/Lower Game Sample Output PDF for more detailed examples of this game. As you read, consider the following questions:
What are the different steps needed in this program? How can you break them down in a way that a computer can understand?
What information would you need from the user at each point (inputs)? What information would you output to the user at each point?
When might it be a good idea to use “IF” and “IF ELSE” statements?
When might it be a good idea to use loops?
Create pseudocode that logically outlines each step of the game program so that it meets the following functionality:
Prompts the user to input the lower bound and upper bound. Include input validation to ensure that the lower bound is less than the upper bound.
Generates a random number between the lower and upper bounds
Prompts the user to input a guess between the lower and upper bounds. Include input validation to ensure that the user only enters values between the lower and upper bound.
Prints an output statement based on the guessed number. Be sure to account for each of the following situations through the use of decision branching:
What should the computer output if the user guesses a number that is too low?
What should the computer output if the user guesses a number that is too high?
What should the computer output if the user guesses the right number?
Loops so that the game continues prompting the user for a new number until the user guesses the correct number.
OPTIONAL: If you would like to practice turning your designs into code, check out the optional 9.1 LAB: Higher/Lower Game in ZyBooks. This step is optional, but will give you additional practice turning designs into code, which will support your work in moving from Project One to Project Two.
What to Submit
Submit your completed pseudocode as a Word document of approximately 1 to 2 pages in length.

Overview In this assignment, you will gain more practice with designing a progra

Overview
In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for a higher/lower game. This will give you practice designing a more complex program and allow you to see more of the benefits that designing before coding can offer. The higher/lower game will combine different programming constructs that you have been learning about, such as input and output, decision branching, and a loop.
Higher/Lower Game Descriiption
Your friend Maria has come to you and said that she has been playing the higher/lower game with her three-year-old daughter Bella. Maria tells Bella that she is thinking of a number between 1 and 10, and then Bella tries to guess the number. When Bella guesses a number, Maria tells her whether the number she is thinking of is higher or lower or if Bella guessed it. The game continues until Bella guesses the right number. As much as Maria likes playing the game with Bella, Bella is very excited to play the game all the time. Maria thought it would be great if you could create a program that allows Bella to play the game as much as she wants.
Prompt
For this assignment, you will be designing pseudocode for a higher/lower game program. The higher/lower game program uses similar constructs to the game you will design and develop in Projects One and Two.
Review the Higher/Lower Game Sample Output PDF for more detailed examples of this game. As you read, consider the following questions:
What are the different steps needed in this program? How can you break them down in a way that a computer can understand?
What information would you need from the user at each point (inputs)? What information would you output to the user at each point?
When might it be a good idea to use “IF” and “IF ELSE” statements?
When might it be a good idea to use loops?
Create pseudocode that logically outlines each step of the game program so that it meets the following functionality:
Prompts the user to input the lower bound and upper bound. Include input validation to ensure that the lower bound is less than the upper bound.
Generates a random number between the lower and upper bounds
Prompts the user to input a guess between the lower and upper bounds. Include input validation to ensure that the user only enters values between the lower and upper bound.
Prints an output statement based on the guessed number. Be sure to account for each of the following situations through the use of decision branching:
What should the computer output if the user guesses a number that is too low?
What should the computer output if the user guesses a number that is too high?
What should the computer output if the user guesses the right number?
Loops so that the game continues prompting the user for a new number until the user guesses the correct number.
OPTIONAL: If you would like to practice turning your designs into code, check out the optional 9.1 LAB: Higher/Lower Game in ZyBooks. This step is optional, but will give you additional practice turning designs into code, which will support your work in moving from Project One to Project Two.
What to Submit
Submit your completed pseudocode as a Word document of approximately 1 to 2 pages in length.

Deepfakes use AI technology in a number of fairly different ways that impact how

Deepfakes use AI technology in a number of fairly different ways that impact how we think about its effect on a person’s privacy. We’ll consider two significantly different uses of AI in this exercise.
The first approach uses AI technology to make small changes to a video captured of a person in a particular situation. The key point here is that the person in the resulting AI-doctored video was actually in that particular situation doing many, but not all of the things shown.
A good example of this approach is the use of AI to create better dubbing of a film into a foreign language (i.e., not the language spoken in the original shoot). The approach works as follows: Given the original film with an actor saying her lines in one language and a video of another actor performing the script in another language, the AI system produces a resulting film where the original actor’s lips are seamlessly replaced with those of the other actor. It would also replace the original actor’s soundtrack with that of the other actor.
You might use this same technology to create a funny video of your family dog saying something, in the way that today’s memes caption a picture or short video of a dog with a humorous saying. You’d need only the video of your dog, a video of you saying the humorous line, and the earlier described dubbing software.
Now let’s consider a different approach. This time, instead of using AI technology to make small changes to a video of a person in a particular situation, we use the technology to make it look like the person was in a completely different situation. The key point here is that the person in the resulting AI-doctored video was never in that situation doing any of the things shown.
An example of this alternative approach is what is done to create revenge-porn videos. The approach works as follows: Given a video of some person in a compromising situation and a collection of videos or digital images of the target person, the AI system produces a video where the target person’s face is seamlessly placed on the head of the actual person in the compromising video. The system may also make changes to the video’s soundtrack to make it even more believable.
Now let’s flip things. Spend a few minutes thinking about harmful uses of the first approach and harmless uses of the second.
Reflect on the ease or difficulty of what we just asked you to do. Categorize the benefits and harms as accruing to an individual or to society. Record your thoughts in the text box below. What you write will NOT be shared with anyone else.

This assignment will cover what is considered the largest cybersecurity scandal

This assignment will cover what is considered the largest cybersecurity scandal in modern history, the massive release of confidential NSA surveillance tactics via Wikileaks and Edward Snowden. Along with Chelsea Manning, these releases brought words like “whistleblower” into everyday language and changed the public conversation about national security, immigration and terrorism, and the relationship of the tech industry to government. Some of you will remember this happening at the time and some may be learning of this event for the first time. This scandal opened hugely critical questions for not only the cybersecurity community and privacy experts but for the general public around protection from major national threats and the costs of that protection. Some of you will feel this level of surveillance is very worthwhile while others will be troubled by what was uncovered by this scandal. There are no correct reactions here, in fact, many people move across many kinds of reactions over time. We will use this opportunity to catalog some of your new questions about cybersecurity and privacy that arise as you learn more about the scandal and we will use the remainder of the semester to think through the mechanics of cybersecurity that make this level of surveillance possible and how they have advanced in the years since.
We will also consider where the players of this case stand today: Laura Poitras continued to make another documentary specifically about Julian Assange and Wikileaks and went on to found the Intercept with Glenn Greenwald, an online publication dedicated to investigative journalism on corruption and corporate interest. Glenn Greenwald was fired from the Intercept last year, amidst a series of events that deem him an extremely controversial figure who may in 2021 be somehow MORE controversial than Snowden himself!
To this point, the course has focused on our definitions of privacy and how it is protected, how the internet is governed and what is contested, fought over, championed. We have learned some mechanics of the internet, but have focused largely on the social and political spheres that impact privacy and its protections. It is the aim that to this point we ask: what are we willing to give up for safety? What do we gain when we lose privacy? And, what do we lose when we lose privacy?
This film begins a turn in the course: thinking about the connection between privacy and the mechanics of surveillance. Pay attention to the technologies of surveillance here. What are the measures used by the NSA, by the whistleblowers, by Snowden and the journalists? What are the different threats?
In the following sessions we will dive into more specifics technologies of surveillance and then spend our last sessions (this semester is moving fast!) covering threat modeling for ourselves, and privacy protections, including a brief history of hacking and how to be anonymous online. The quiz will help you to think through your assignment and prepare you for the last sessions of the course.
Please watch the Laura Poitras documentary film CITIZENFOUR.
This is the link: https://digitalcampus-swankmp-net.proxy2.cl.msu.edu/michiganstate305576/play/70222dbaa7a2b537
The film focuses on Edward Snowden, and the information he produced showing extent of government digital surveillance programs in the United States and other countries.
To complete this short assignment successfully, you will need to watch the film carefully and take notes (there is also a corresponding Session Quiz to be attentive to, please see D2L for instructions). After watching the film, you will write a short essay answering the questions below.
Quality of writing will be part of your score, so please be sure to write in complete sentences using correct grammar, spelling, punctuation, etc.
For full credit you must answer the four following questions in an essay.
This is an essay so do not submit this assignment as a numbered list. Instead, articulate each of these answers in a cohesive essay with an introduction and conclusion. I recommend 1 paragraph for each question. You must include in-text citations and a reference list at the end in any formatting of your choosing. An essay without references will be deducted credit.
How much did you know of the Edward Snowden case before watching CITIZENFOUR? Describe two examples of surprising things you noticed or learned by watching the film.
Did the film change your opinion of the case? Be specific and use examples from the film to support your points.
Why didn’t Snowden just publish the documents himself online? Why did he choose to work with journalists?
Do you think Snowden had more of a responsibility to maintain the confidentiality his employers required of him, or to the American people in revealing what he perceives as wrongdoings against them? Why? Be specific and use examples from the film to support your points.
Your essay should be about 750 words long. You will find this is not much space, so please be deliberate with your words, do not include repetitive thoughts and ensure that you have answered all of the questions through your essay.

Part 4: Your company’s management wants to make sure it has policies and procedu

Part 4:
Your company’s management wants to make sure it has policies and procedures in place to protect the privacy of visitors to its Web site. You have been asked to develop a Web site privacy policy. The TRUSTe Web site at www.truste.com describes privacy best practices to help you draft your company’s privacy policy. You can also examine specific companies’ privacy policies by searching for Web site privacy policies on Yahoo!, Google or another search engine. Add to your report for management and address the following issues:
How much data should your company collect on visitors to its Web site? What information could it discover by tracking visitors’ activities at its Web site? What value would this information provide the company? What are the privacy problems raised by collecting such data?
Should the company use cookies? What are the advantages of using cookies for both the company and its Web site visitors? What privacy issues do they create for your company?
Should your company join an organization such as TRUSTe to certify that it has adopted approved privacy practices? Why or why not?
Should your company adopt an opt-in or opt-out model of informed consent?
Include in your report a short (two to three pages) privacy statement for your company’s Web site.
Part 5:
Use spreadsheet software to compare the total three-year cost of licensing and maintaining new manufacturing software or renting the software from an application service provider.
The company would like to implement new production planning, quality control, and scheduling software for use by 25 members of its manufacturing staff. Management is trying to determine whether to purchase the software from a commercial vendor along with any hardware required to run the software or to use a hosted software solution from a software service provider. (The hosted software runs on the service provider’s computer.) You have been asked to help management with this rent vs. buy decision by calculating the total cost of each option over a three-year period. The costs of purchasing the software (actually for purchasing a license from the vendor to use its software package) include the initial purchase price of the software (licensing fee of $100,000 paid in the first year), the cost of implementing and customizing the software in the first year ($20,000), one new server to run the software (a first-year purchase of $4000), one information systems specialist devoting half of his or her time to supporting the software ($55,000 in full-time annual salary and benefits with a 3% annual salary increase each year after the first year), user training in the first year ($10,000), and the cost of annual software upgrades ($5,000). The costs of renting hosted software are the rental fees ($2500 annually per user), implementation and customization costs ($12,000 in the first year), and training ($10,000 in the first year). Use your spreadsheet software to calculate the total cost of renting or purchasing this software over a three-year period. Identify the lowest-price alternative that meets the company’s requirements.
What other factors should your company consider besides cost in determining whether to rent or buy the hardware and software?
Part 6:
Your company may sell through its distributors. It maintains a small customer database with the following data: customer name, address (street, city, state, zip code), telephone number, model purchased, date of purchase, and distributor. These data are collected by its distributors when they make a sale and are then forwarded to your company.
How would you redesign or design your company’s customer database so that it can store and provide the information needed for marketing? You will need to develop a design for the new customer database and then implement that design using database software. Consider using multiple tables in your new design. You may want to use Lucid Charts to develop the ERD
Consider the types of reports you would use with this data. What are they? What would you include in them? What would be of great interest to your marketing and sales department (for example, lists of repeat customers, customers who attend events sponsored by your company, the average ages and years of schooling of your customers). Prepare a listing of the types of reports and content that your company would benefit from knowing. You can name them and describe their uses or even develop a database and create the reports to include in your report.