Determine the rightness or wrongness of actions

Assignment Help Computer Networking
Reference no: EM13906287

Describe the answers with required answers. make sure you follow the following points apply the ACS Code of Conduct to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein; make a recommendation on the basis of your analysis using the ACS Code of Conduct critique ethical issues related to privacy. legal issues raised by current practices involving ICT; apply the APA referencing style.

Task

In this assignment you are required to answer the following three (3) questions. Write your response between 400-500 words for each of these questions. All questions are of equal value (5%). Question 1. Use the professional ethics perspective to analyse the ethical issue(s) involved in the following case.

New Australian national security laws will permit hacking by its intelligence agencies and approve the retention of personal web and phone metadata. This will break new ground around the world and raise significant privacy concerns. privacy groups have warned.

Question 2. Analyse ethical dilemma in the following case using the Australian Computer Society (ACS) Code of Professional Conduct and make recommendations with reasoning on the basis of your analysis.

A local QA company has decided to approve a laser health care system for general surgery without doing any testing, because they trust the well reputed international company. Look at this from several points of view: the QA company, an individual in QA. the customer. the development team, the team leader (e.g. should s/he tell the customer?)

Reference: Australian Computer Society (2012). ACS Code of Ethics Case Studies & Related Clauses to the Code of Conduct

Question 3. What is privacy? Explain how data merging, data matching, and data mining threaten privacy in the context of cyberethics. Use suitable examples in your discussion. NOTE: Format your assignment according to the instructions given in the Assessment Information and Presentation sections.

Verified Expert

Reference no: EM13906287

Questions Cloud

What will be david cost of goods sold and ending inventory : If David sells two widgets next year, what will be his cost of goods sold and ending inventory next year under the LIFO method?
Read are families dangers by barbara ehrenreic : Read "Are Families Dangers?" by Barbara Ehrenreich and write an introduction to an essay about whether or not you agree with her views. The introduction should summarize her views and then state your thesis using three examples that will be used to a..
Radar company sells bikes : Radar Company sells bikes for $ 300 each. The company currently sells 3,750 bikes per year and could make as many as 5,000 bikes per year.
Describe the relationship between with the traynors : Read "Nineteen Fifty Five" by Alice Walker and write a summary about its overall theme and insight. Then use a real life example that is similar to describe the relationship between with the Traynors and Gracie.
Determine the rightness or wrongness of actions : Conduct to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein - Analyse ethical dilemma in the following case using the Australian Computer Society.
Listen to both versions of tutti frutti : Listen to both versions of "Tutti Frutti" by Little Richard and Pat Boone. Then compare and contrast the songs and describe the styles and characteristics of each song. In addition, connect them with themes of the Blues and Rock n Roll.
What is ambers tax basis in her ending inventory : What is Amber's tax basis in her ending inventory after applying the UNICAP rules to allocate indirect costs to inventory?
Who is responsible for lookout point- advise paul : While the others were reluctant, Paul climbed over the fence and walked to the edge of the cliff. He lost his balance and fell off the cliff and broke his leg. Paul wishes to sue the Willow Council who is responsible for Lookout Point. Advise Paul..
Requirements of flyhigh airlines : The development team of SoftSols Inc. has revamped the software according to the requirements of FlyHigh Airlines and is in the process of testing the software. While testing the software, the team encounters the following issues:

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd