Explain some virtues and shortcomings of australian computer

Assignment Help Computer Network Security
Reference no: EM131024995

Task

Length: The maximum number of words set for this assignment is 600 words per answer.

Instructions

Answer the following questions. All questions carry equal weight (5% of all assessments in this subject).

1. Consider the following scenario:

Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications. These include, Gmail, Google Maps, Google+, Google Calendar, Google Chrome, Picasa, AdSense/Adwords, and so forth. In the past, each had its own privacy policy. In 2012, however, Google replaced the individual policies with one comprehensive privacy policy across all of its services. When it implemented this change, Google also announced that the company would share user account data across all its services. Critics note that a user's search engine history could be shared with YouTube, or vice versa, and that a user's Google+ account data might be shared with Adwords to generate more targeted advertising.

Source: Tavani, H. T. (2014). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (4th ed.). John Wiley & Sons Publishers., pp.166

Analyse the above case using the philosophical ethics perspective.

2. Although Kant's version of deontology has at least one significant flaw, some philosophers believe that a deontological account of morality is nonetheless the correct kind of ethical theory. (Tavani, 2014)

Critique the concept of Act Deontology using suitable examples.

3. Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics.

4. The term "Dataveillance" was coined by Roger Clarke in the eighties (https://www.rogerclarke.com/DV/ ). Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

Referencing

All sources of information must be appropriately referenced using the APA style ( https://student.csu.edu.au/library/integrity/referencing-at-csu ).

Rationale

This assignment is designed to test your knowledge and understanding of some of the key concepts and issues related to ICT ethics as covered in this subject.

This assignment relates to the following subject learning outcomes:

- be able to discuss various philosophical theories of ethics and how these relate to the ethical and legal issues raised by current practices involving ICT;

- be able to apply ethical theories and concepts to analyse ICT related ethical dilemmas;

- be able to discuss professionalism and professional responsibility in the context of the ICT profession;

- be able to critically analyse and apply the various concepts of professional ethics;

- be able to critique ethical issues related to privacy.

Reference no: EM131024995

Questions Cloud

What are computer-based threats to your individual privacy : What are the computer-based threats to your individual privacy in American culture? Who is behind these threats to your individual privacy? Would you be willing to give up certain levels of privacy for better security?
What is the slope of the line that models this depreciation : What kind of slope you would get if your employer decided to pay you the same salary whether you work overtime or not? Define the dependent and independent variables in this situation.
Meaning via visual communication : Compare and contrast two television programs, noting how each communicates the meaning via visual communication rather than words or dialogue
Identify the commentator''s point of view : Identify the commentator point of view. If you were giving a presentation to inform, would you express your point of view in a similar style?
Explain some virtues and shortcomings of australian computer : Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.
How changes affect an equilibrium mixture of the three gases : How will each of the following changes affect an equilibrium mixture of the three gases: O2(g) is added to the system; the reaction mixture is heated;
Find the market equilibrium interest rate : Find the market equilibrium interest rate and level of investment. Now the Odiland government has decided to build a dam. Originally, the Odiland government budget was balanced, but this project will give the government a deficit of $20 million. Gi..
Formulate a liner programming model for this problem : .What is the effect on the optimal solution if the profit per yard of denim is increased for 2.25 to 3.00? What is the effect if the profit per yard of corduroy is increased from 3.10 to 4.00?
What should frank kelsey recommended to jean fontaine : What should Frank kelsey recommended to jean Fontaine at the end of the case? why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd