Explain some virtues and shortcomings of australian computer

Assignment Help Computer Network Security
Reference no: EM131024995

Task

Length: The maximum number of words set for this assignment is 600 words per answer.

Instructions

Answer the following questions. All questions carry equal weight (5% of all assessments in this subject).

1. Consider the following scenario:

Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications. These include, Gmail, Google Maps, Google+, Google Calendar, Google Chrome, Picasa, AdSense/Adwords, and so forth. In the past, each had its own privacy policy. In 2012, however, Google replaced the individual policies with one comprehensive privacy policy across all of its services. When it implemented this change, Google also announced that the company would share user account data across all its services. Critics note that a user's search engine history could be shared with YouTube, or vice versa, and that a user's Google+ account data might be shared with Adwords to generate more targeted advertising.

Source: Tavani, H. T. (2014). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (4th ed.). John Wiley & Sons Publishers., pp.166

Analyse the above case using the philosophical ethics perspective.

2. Although Kant's version of deontology has at least one significant flaw, some philosophers believe that a deontological account of morality is nonetheless the correct kind of ethical theory. (Tavani, 2014)

Critique the concept of Act Deontology using suitable examples.

3. Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics.

4. The term "Dataveillance" was coined by Roger Clarke in the eighties (https://www.rogerclarke.com/DV/ ). Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

Referencing

All sources of information must be appropriately referenced using the APA style ( https://student.csu.edu.au/library/integrity/referencing-at-csu ).

Rationale

This assignment is designed to test your knowledge and understanding of some of the key concepts and issues related to ICT ethics as covered in this subject.

This assignment relates to the following subject learning outcomes:

- be able to discuss various philosophical theories of ethics and how these relate to the ethical and legal issues raised by current practices involving ICT;

- be able to apply ethical theories and concepts to analyse ICT related ethical dilemmas;

- be able to discuss professionalism and professional responsibility in the context of the ICT profession;

- be able to critically analyse and apply the various concepts of professional ethics;

- be able to critique ethical issues related to privacy.

Reference no: EM131024995

Questions Cloud

What are computer-based threats to your individual privacy : What are the computer-based threats to your individual privacy in American culture? Who is behind these threats to your individual privacy? Would you be willing to give up certain levels of privacy for better security?
What is the slope of the line that models this depreciation : What kind of slope you would get if your employer decided to pay you the same salary whether you work overtime or not? Define the dependent and independent variables in this situation.
Meaning via visual communication : Compare and contrast two television programs, noting how each communicates the meaning via visual communication rather than words or dialogue
Identify the commentator''s point of view : Identify the commentator point of view. If you were giving a presentation to inform, would you express your point of view in a similar style?
Explain some virtues and shortcomings of australian computer : Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.
How changes affect an equilibrium mixture of the three gases : How will each of the following changes affect an equilibrium mixture of the three gases: O2(g) is added to the system; the reaction mixture is heated;
Find the market equilibrium interest rate : Find the market equilibrium interest rate and level of investment. Now the Odiland government has decided to build a dam. Originally, the Odiland government budget was balanced, but this project will give the government a deficit of $20 million. Gi..
Formulate a liner programming model for this problem : .What is the effect on the optimal solution if the profit per yard of denim is increased for 2.25 to 3.00? What is the effect if the profit per yard of corduroy is increased from 3.10 to 4.00?
What should frank kelsey recommended to jean fontaine : What should Frank kelsey recommended to jean Fontaine at the end of the case? why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Operational model of computer security

In the Operational Model of Computer Security, which of the following is true?

  Differences between file viruses and boot viruses

What are the differences between file viruses and boot viruses

  Decrypt the following message which was enciphered using

1 decrypt the following message which was enciphered using the vigenere cipher with encrypting key secret wbrcs lazgj

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  Classify vulnerability using the risos model

Classify this vulnerability using the RISOS model, classify this vulnerability using the PA model and justify your answer

  Assignment on email harassment

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email sys..

  How the network infrastructure is more secure

The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.

  What is utc and why is it used

How they are syncronised and why do they need to be syncronised and what is UTC and why is it used?

  Discuss what security policies commerce should implement

For Reflective Article Paper 3, select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening.

  Write about computer security affects you at school

Write about computer security affects YOU at school and in your personal life. You may be surprised at how many things you do that depend on some aspects of secure computer records and communications, like banking, grades, e-mail, timesheets, libr..

  What purpose does a firewall play in an organization

What are some things we need to evaluate when protecting our network?

  Advocate for and recommend an implementation plan

Your task is to advocate for and recommend an implementation plan to include all 15 CLAS standards over the next 5 years.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd