Question: Assessment 2 | Interpretive Report Overview This assessment requires a written submission equivalent to 1,500 words (in a Word document), andis worth 40% of your

Assessment 2 | Interpretive Report

Overview

This assessment requires a written submission equivalent to 1,500 words (in a Word document), andis worth 40% of your final mark.

Essay/Report - 1,500 words (equivalent to 6 typed pages double spaced NOT including bibliography or title page).

Instructions

Select ONE of the following 3 questions as the basis of your interpretive report:

1.Read the following quotation and discuss, with relevant examples from THIS SUBJECT ONLY:

"The very essence of the Internet is anarchy...the anarchy of the Internet is a powerful, cooperative, functional force that cannot be subjected to centralized control.'"

Do you agree or disagree with this statement - why or why not?

OR

2.At p.35 of his book, The Future of Ideas, Lawrence Lessig wrote the following:

"...I argued that it was the architecture of cyberspace that constituted its freedom and that, as this architecture was changed, that freedom was erased.Code, in other words, is a law of cyberspace and...in my view, its most significant law."

Discuss what Lessig means, with relevant examples from THIS SUBJECT ONLY.

OR

3.Is the Australian legal framework capable of dealing with the security threats discussed in this course? Why or why not?

Discuss with relevant examples from THIS SUBJECT ONLY.

You will consider your chosen question by drawing upon information that you studied across Modules 1 to 6.Make sure that you are answering the question asked.In other words, do not just provide a list of examples/materials that touch on the question but think about answering the question and using the subject materials as examples to advance your argument.

Determine areas that you need to further research, critically evaluate, or interpret to enable drawing together a report to respond to the question in a scholarly manner.

You must find three (3) external scholarly sources (published books, journal articles, government documents) and rely on them, in addition to the subject materials (textbook, lecture notes, PP slides, videos).

In your report, include a discussion regarding your thinking on the key question. For example: Has your opinion changed or is it reinforced by your external readings? Has your knowledge changed or deepened during this subject? Has anything become more complex or more confusing? How? Why?

Research Resources

You may wish to use your local library and online scholarly resources, such as Google Scholar.You are strongly encouraged to use the La Trobe library's online resources including digital book download and the databases (e.g. Proquest) that give you access to scholarly journal articles.You may also refer to government whitepaper sources.You may NOT rely on Wikipedia or any other non-scholarly source.If you have questions about this, please email the instructor.

A Note on Plagiarism

Plagiarism is a major academic offence and is treated very seriously at LaTrobe University.Details about this are provided in the document "Tips for Studying Cybersecurity Law Subjects for Non-Law Students" which is available at the start of the Assessment tab (under Assessment Overview).Anyone found plagiarizing (i.e. copying work directly from another source without attributing credit to the author, copying another student's work, using their own work from another subject, or any other activity that constitutes plagiarism) will receive a grade of 0 for that work and will be referred to the Academic Misconduct Committee for any further discipline that may be imposed by the university.

Marking criteria

While formulating your report, aim to achieve the following criteria:

Provide an in-depth analysis of the key question, critically discussing major points and counter-points relevant to current cybercrime issues.

Interpret the legal, law enforcement and regulatory challenges as related to the key question.

Integrate and critically evaluate relevant subject content and external scholarly sources.

Critically discuss potential misunderstandings or growth in understanding as related to law enforcement and/or regulatory structures around dealing with cybercrime.

Develop your report appropriately to assessment requirements including referencing.

For more detailed information, please see the Assessment 2 Marking Rubric:

Assessment format requirements

Formatting requirements for your report:

Type in 12-point font.

Include a cover page with your student number and your name as identification. Make sure on your cover page you clearly indicate WHICH [ONE] OF THE THREE QUESTIONS you are answering.

Use of appropriate headings, introduction and conclusion, paragraphs.

Include a bibliography - this is not included in the total word-count.

Referencing requirements

You may use whatever referencing guide you are most familiar with.Law students should use the Australian Guide to Legal Citation for their referencin

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Law Questions!