This discussion assesses your ability to clarify the role of each legally mandated attendee on the Individualized Education Program team. This assessment also supports your achievement of Course Learning Outcome….
Research and discuss ways in which digital technologies are impacting on personal privacy
Research and discuss ways in which digital technologies are impacting on personal privacy. Why are privacy values of such great importance to society? What steps can be taken to reduce privacy erosion?
Here are my link for my video presentation, please download all this clips and combine them and become a comprehensive video, all video links are not in order, I request writer should put it back into a right order and I will give you the video script to you, please cut all useless clips, for example, if there is a pause for a period or clips which I walked away from desk, the audience should have a continuous feeling for whole presentation, but not distributed by “NG” screen.
Please add the subtitle for me under the video.
The video should add some relevant text and vocaubulary on the screen, especially at the beginning just like some youtuber would like to demonstrate what they want to point out, of course at the middle and at the end also required. And the video I request to add some video clips related to video and keep on my voice is going on, for example, when I am talking about enter first 4 digital of my identity card number, you can show a registeration page on screen in order to increase the sense of reality.
The presentation can be informal, interesting, creativity, like a youtuber.
Please respect my privacy, after finish this assignment without further revision after one week, then please delete all my file given to you, and the finished video also, I will also make it be down line for my video after finish my submittion, I hope that you can respect my privacy.
This is the only reference link for my video presentation, please put it after my conclusion.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. & Qiu, D., 2014. Security of the internet of things: perspectives and challenges. Wireless Networks, 20(8), pp. 2481-2501.