I Believe That If You Do The Crime You Do The Time ✓ Solved

1st Responsei Believe That If You Do The Crimeyou Do The Time

I believe that if you do the crime, you do the time and that goes for any age. Juveniles understand right from wrong and they know what will happen if they are caught doing wrong, so if they know what will happen to them and they do the crime anyway, they should be liable for their actions. While they are paying for their crimes, I do believe they should undergo rehabilitation so that when they renter society, they would not do anything that would get them back in trouble. A moral dilemma that I have heard police officers speak to classes about was when they are faced with a situation of arresting a friend or not. I have heard some officers say they let them go under the supervision of someone they know and I have heard others arrested their friend and lost that friendship with them. This I would say is frequent due to them working in the same city they grew up in. Something that is unavoidable is the crooked police officers in the department. There are some bad police officers in most of all departments that want to abuse their authority. The good officers could see the bad officer doing something bad, but will not report it; when they should have once they saw the bad officer's actions.

Yes, I believe that juveniles should be held accountable and responsible for their actions. Oftentimes, it is the lack of accountability and responsibility early in life that leads them to commit crimes in the first place. Had they been properly and adequately disciplined when they were young, perhaps they wouldn't see crime as an activity worthy of pursuit. With juveniles, the problem in deciding how they should be held accountable and responsible is establishing their understanding of right and wrong, and their mens rea, or guilty mind. Not knowing the law is no excuse, however, not understanding what is right or wrong or understanding consequences is. Punishment that fits their age and the crime that they committed is essential, in my opinion.

Discussion Points

If I understand this discussion point correctly, there is a question of ethics and then the question of morality. Each of these terms has a very different definition and application, so they're not quite interchangeable, even though they are often used to say the same thing. For example, from the Christian worldview, morality is the different between right and wrong, and is defined by God. Ethics are a set of standards emanating from department policy or best work practices. For a police officer, a moral dilemma would be whether to arrest someone who exhibits drunk driving, blowing exactly the legal limit on a breathalyzer. The law says they are guilty and should be held accountable; the officer may decide that if they delayed their departure from the scene for a half-hour or so, they might just come under the legal limit. An ethical dilemma an officer could face is whether to accept a free cup of coffee or free meal from a restaurant simply for being an officer of the law. The officer may appreciate the gesture, but in some departments, it is an ethical violation because the restaurant may now expect special treatment from the officer in the future.

Cloud Computing Security Issues and Concerns

Cloud computing is reshaping enterprise network architectures and infrastructures. It refers to applications delivered as services over the Internet as well as the hardware and systems software in data centers that provide those services. The services themselves have long been referred to as Software as a Service (SaaS) which had its roots in Software-Oriented Architecture (SOA) concepts that began shaping enterprise network roadmaps in the early 2000s. IaaS (Infrastructure as a Service) and PaaS (Platform as a Service) are other types of cloud computing services that are available to business customers.

Security is important to any computing infrastructure. Companies go to great lengths to secure on-premises computing systems, so it is not surprising that security looms as a major consideration when augmenting or replacing on-premises systems with cloud services. Allaying security concerns is frequently a prerequisite for further discussions about migrating part or all of an organization’s computing architecture to the cloud. Availability is another major concern: “How will we operate if we can't access the Internet? What if our customers can’t access the cloud to place orders?” are common questions. Generally speaking, such questions only arise when businesses contemplating moving core transaction processing, such as ERP systems, and other mission-critical applications to the cloud.

Auditability is a concern for many organizations, especially those who must comply with Sarbanes-Oxley and/or Health and Human Services Health Insurance Portability and Accountability Act (HIPAA) regulations. The auditability of their data must be ensured whether it is stored on premises or moved to the cloud. Before moving critical infrastructure to the cloud, businesses should do diligence on security threats both from outside and inside the cloud. Many of the security issues associated with protecting clouds from outside threats are similar to those that have traditionally faced centralized data centers.

Cloud providers must guard against theft or denial-of-service attacks by their users and users need to be protected from one another. Virtualization can be a powerful mechanism for addressing these potential risks because it protects against most attempts by users to attack one another or the provider’s infrastructure. However, not all resources are virtualized and not all virtualization environments are bug-free.

Another security concern that businesses should consider is the extent to which subscribers are protected against the provider, especially in the area of inadvertent data loss. For example, in the event of provider infrastructure improvements, what happens to hardware that is retired or replaced? It is easy to imagine a hard disk being disposed of without being properly wiped clean of subscriber data.

Conclusion

Addressing cloud computing security concerns requires thorough understanding and proactive measures by both cloud service providers and users. As businesses navigate this crucial area, continuous assessment of security protocols and compliance with established regulations will be fundamental to fostering trust in cloud solutions.

References

  • Armbrust, M., et al. (2010). A View of Cloud Computing. Communications of the ACM, 53(4), 50-58.
  • Badger, L., et al. (2011). Draft Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. NIST Special Publication.
  • Heavey, J. (2011). Cloud Computing: Secure or Security Risk? Technorati. Retrieved from: secure-or-a-security1/.
  • IBM Global Technology Services. (2011). Security and Availability in Cloud Computing Environments, Technical White Paper.
  • Heavey, J. (2011). Cloud Computing: Secure or Security Risk? Technorati. Retrieved from: secure-or-a-security1/.
  • NIST. (2011). Cloud Computing Security Reference Architecture. NIST Special Publication.
  • NIST. (2011). Cloud Computing Standards Roadmap. NIST Special Publication.
  • Popovic, K., & Dodig, D. (2012). Cloud Computing Security Issues and Challenges: A Survey. 2012 IEEE 35th Conference on Local Computer Networks.
  • Zissis, D., & Lekkas, D. (2012). Addressing Cloud Computing Security Issues. Future Generation Computer Systems, 28(3), 583-592.
  • Subashini, S., & Kumar, V. (2011). Cloud Computing Security Issues and Challenges: A Survey. Journal of Network and Computer Applications, 34(2), 164-173.