Explain some virtues and shortcomings of australian computer

Assignment Help Computer Network Security
Reference no: EM131024995

Task

Length: The maximum number of words set for this assignment is 600 words per answer.

Instructions

Answer the following questions. All questions carry equal weight (5% of all assessments in this subject).

1. Consider the following scenario:

Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications. These include, Gmail, Google Maps, Google+, Google Calendar, Google Chrome, Picasa, AdSense/Adwords, and so forth. In the past, each had its own privacy policy. In 2012, however, Google replaced the individual policies with one comprehensive privacy policy across all of its services. When it implemented this change, Google also announced that the company would share user account data across all its services. Critics note that a user's search engine history could be shared with YouTube, or vice versa, and that a user's Google+ account data might be shared with Adwords to generate more targeted advertising.

Source: Tavani, H. T. (2014). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (4th ed.). John Wiley & Sons Publishers., pp.166

Analyse the above case using the philosophical ethics perspective.

2. Although Kant's version of deontology has at least one significant flaw, some philosophers believe that a deontological account of morality is nonetheless the correct kind of ethical theory. (Tavani, 2014)

Critique the concept of Act Deontology using suitable examples.

3. Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics.

4. The term "Dataveillance" was coined by Roger Clarke in the eighties (https://www.rogerclarke.com/DV/ ). Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

Referencing

All sources of information must be appropriately referenced using the APA style ( https://student.csu.edu.au/library/integrity/referencing-at-csu ).

Rationale

This assignment is designed to test your knowledge and understanding of some of the key concepts and issues related to ICT ethics as covered in this subject.

This assignment relates to the following subject learning outcomes:

- be able to discuss various philosophical theories of ethics and how these relate to the ethical and legal issues raised by current practices involving ICT;

- be able to apply ethical theories and concepts to analyse ICT related ethical dilemmas;

- be able to discuss professionalism and professional responsibility in the context of the ICT profession;

- be able to critically analyse and apply the various concepts of professional ethics;

- be able to critique ethical issues related to privacy.

Reference no: EM131024995

Questions Cloud

What are computer-based threats to your individual privacy : What are the computer-based threats to your individual privacy in American culture? Who is behind these threats to your individual privacy? Would you be willing to give up certain levels of privacy for better security?
What is the slope of the line that models this depreciation : What kind of slope you would get if your employer decided to pay you the same salary whether you work overtime or not? Define the dependent and independent variables in this situation.
Meaning via visual communication : Compare and contrast two television programs, noting how each communicates the meaning via visual communication rather than words or dialogue
Identify the commentator''s point of view : Identify the commentator point of view. If you were giving a presentation to inform, would you express your point of view in a similar style?
Explain some virtues and shortcomings of australian computer : Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.
How changes affect an equilibrium mixture of the three gases : How will each of the following changes affect an equilibrium mixture of the three gases: O2(g) is added to the system; the reaction mixture is heated;
Find the market equilibrium interest rate : Find the market equilibrium interest rate and level of investment. Now the Odiland government has decided to build a dam. Originally, the Odiland government budget was balanced, but this project will give the government a deficit of $20 million. Gi..
Formulate a liner programming model for this problem : .What is the effect on the optimal solution if the profit per yard of denim is increased for 2.25 to 3.00? What is the effect if the profit per yard of corduroy is increased from 3.10 to 4.00?
What should frank kelsey recommended to jean fontaine : What should Frank kelsey recommended to jean Fontaine at the end of the case? why?

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

  Discuss specific characteristics of global botnets

Discuss Six specific characteristics of global Botnets (such as purpose, size, attack method, attribution, etc.), and describe how these characteristics have emerged, changed, or evolved over the past 5-10 years.

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  Provide a brief description of the model

Provide a brief description of the model - Provide a scenario where the model would be the optimal choice for access control, and why.

  Eulers theorem problem

Any cipher system that needs to avoid encrypting certain messages should be avoided like the plague - what do you have to say for yoursel

  Network security hii need the attached assignment done by

hi ltbrgti need the attached assignment done by 120914. please quote the best price. the assignment should be completed

  Computer security models

Use the Internet to research the following computer security models: Biba (Biba Integrity Model), Give a brief synopsis of each model in your own words. Please cite any references that you use to complete this assignment

  Identify the key features of the affordable care act

Identify the key features of the Affordable Care Act

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd