Abuse of power using monitoring & hacking by Korean government Name Institution Professor Course Date Abstract I analyzed about cyberethics of the government. Technologists have developed the ability of computer and speed of the Internet until now. However our ethics on the Internet did not develop like technologies. In addition we need to think about cyberethics of the government. For many years the government has been controlled by network information limitlessly. I figured out the appropriate data protection law of South Korea and a case of Korean government that was trying to instigate or influence public opinion. In a law I found how can limit government’s power through the Korean data protection law. At the end I suggested a legislation for making entry barrier of the government’s information abusing. It I believe it improves the rights of citizenship on the internet. I used news on the Internet and book (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity 1(1) 69-79. https://academic.oup.com/cybersecurity/article/1/1/69/2367066Breach Notification Laws. Ariz. L. Rev. 56 1171. http://heinonline.org/HOL/LandingPage?handle=hein.journals/arz56&div=40&id=&page=CBS. Hackers expose spy software firm's global clients. (2015 July 16). Retrieved November 25 2017 from https://www.cbsnews.com/news/italy-hacking-team-breach-suggest-spy-software-sold-fbi-russia-vatican/Daugirdas K. & Mortenson J. D. (2015). United states responds to alleged North Korean cyber attack on sony pictures entertainment. American Journal of International Law 109(2) 419-422. https://www.researchgate.net/.../289998885_United_States_Responds_to_Alleged_North.Lee K. (2016). South Korea. In HANDBOOK OF TERRORISM IN THE ASIA-PACIFIC (pp. 527-543). http://www.worldscientific.com/doi/abs/10.1142/9781783269969_0027McGrath B. (2015 July 16). World Socialist Web Site. Retrieved November 25 2017 from https://www.wsws.org/en/articles/2015/07/16/kore-j16.htmlStatcounter. Mobile Vendor Market Share Republic Of Korea. (n.d.). Retrieved November 25 2017 from http://gs.statcounter.com/vendor-market-share/mobile/south-korea/2014Park D. W. (2016 June). Analysis on mobile forensic of smishing hacking attack. In INTERNATIONAL CONFERENCE ON FUTURE INFORMATION & COMMUNICATION ENGINEERING (Vol. 6 No. 1 pp. 535-538). https://www.wsws.org/en/articles/2015/07/16/kore-j16.htmPeters R. M. (2014). So You've Been Notified Now What: The Problem with Current Data- [...]
Requiredtopic headings for your paper should include the background surrounding the issue, a historical perspective, current issues that are applicable, legislation dealing with this topic, examples, global dynamics/impact (such as issues, processes, trends, and systems),personal impact from a global perspective, and a summary. Each paper should contain a reference list of at least five (5) different substantial and quality references. The references and reference citations for the term paper must be to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper and a reference at the end of the paper to which the reference citation applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. The body of the paper should be a minimum of six typed double spaced pages. Your cover page and reference page cannot be counted in this number. You should use the APA format for your reference citations and the reference page. And my main subject is "Abuse of power using monitoring & hacking by Korean government" I already did the abstract and Some current Issues. I attached website resources for this subject. And I also attached sample of term paper. More specification is in "CSCI 415 term paper Topics-Rubric."