Explain some virtues and shortcomings of australian computer

Assignment Help Computer Network Security
Reference no: EM131024995

Task

Length: The maximum number of words set for this assignment is 600 words per answer.

Instructions

Answer the following questions. All questions carry equal weight (5% of all assessments in this subject).

1. Consider the following scenario:

Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications. These include, Gmail, Google Maps, Google+, Google Calendar, Google Chrome, Picasa, AdSense/Adwords, and so forth. In the past, each had its own privacy policy. In 2012, however, Google replaced the individual policies with one comprehensive privacy policy across all of its services. When it implemented this change, Google also announced that the company would share user account data across all its services. Critics note that a user's search engine history could be shared with YouTube, or vice versa, and that a user's Google+ account data might be shared with Adwords to generate more targeted advertising.

Source: Tavani, H. T. (2014). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (4th ed.). John Wiley & Sons Publishers., pp.166

Analyse the above case using the philosophical ethics perspective.

2. Although Kant's version of deontology has at least one significant flaw, some philosophers believe that a deontological account of morality is nonetheless the correct kind of ethical theory. (Tavani, 2014)

Critique the concept of Act Deontology using suitable examples.

3. Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics.

4. The term "Dataveillance" was coined by Roger Clarke in the eighties (https://www.rogerclarke.com/DV/ ). Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

Referencing

All sources of information must be appropriately referenced using the APA style ( https://student.csu.edu.au/library/integrity/referencing-at-csu ).

Rationale

This assignment is designed to test your knowledge and understanding of some of the key concepts and issues related to ICT ethics as covered in this subject.

This assignment relates to the following subject learning outcomes:

- be able to discuss various philosophical theories of ethics and how these relate to the ethical and legal issues raised by current practices involving ICT;

- be able to apply ethical theories and concepts to analyse ICT related ethical dilemmas;

- be able to discuss professionalism and professional responsibility in the context of the ICT profession;

- be able to critically analyse and apply the various concepts of professional ethics;

- be able to critique ethical issues related to privacy.

Reference no: EM131024995

Questions Cloud

What are computer-based threats to your individual privacy : What are the computer-based threats to your individual privacy in American culture? Who is behind these threats to your individual privacy? Would you be willing to give up certain levels of privacy for better security?
What is the slope of the line that models this depreciation : What kind of slope you would get if your employer decided to pay you the same salary whether you work overtime or not? Define the dependent and independent variables in this situation.
Meaning via visual communication : Compare and contrast two television programs, noting how each communicates the meaning via visual communication rather than words or dialogue
Identify the commentator''s point of view : Identify the commentator point of view. If you were giving a presentation to inform, would you express your point of view in a similar style?
Explain some virtues and shortcomings of australian computer : Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.
How changes affect an equilibrium mixture of the three gases : How will each of the following changes affect an equilibrium mixture of the three gases: O2(g) is added to the system; the reaction mixture is heated;
Find the market equilibrium interest rate : Find the market equilibrium interest rate and level of investment. Now the Odiland government has decided to build a dam. Originally, the Odiland government budget was balanced, but this project will give the government a deficit of $20 million. Gi..
Formulate a liner programming model for this problem : .What is the effect on the optimal solution if the profit per yard of denim is increased for 2.25 to 3.00? What is the effect if the profit per yard of corduroy is increased from 3.10 to 4.00?
What should frank kelsey recommended to jean fontaine : What should Frank kelsey recommended to jean Fontaine at the end of the case? why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  Dealing with computer security

Computer Security is very important for organizations and if not impliedproperly it may have a very big impact on its overall working system.

  Evaluate the security of a password management protocol

Evaluate the security of a password management protocol is to try to crack it yourself. Fortunately, you do not need to be an expert hacker to do this.

  Windows os vulnerability analysis using metapsloit framework

Windows OS Vulnerability Analysis Using the Metapsloit Framework - Penetration testers use the Metasploit Framework to find security weaknesses in operating systems, applications and networks.

  Security issues considered when implementing a wireless lan

What type of security issues need to be considered when implementing a Wireless LAN?

  Establishing compliance of it security controls with us laws

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  Discuss specific characteristics of global botnets

Discuss Six specific characteristics of global Botnets (such as purpose, size, attack method, attribution, etc.), and describe how these characteristics have emerged, changed, or evolved over the past 5-10 years.

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Knowing the threat

Explain the added challenges of securing wireless devices versus securing LAN-connected devices. Imagine you are starting a new small- to-midsized cybercafe business from the ground up. Explain which areas of your network would be LAN based and wh..

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd