What if the gossips about you and you rather not hear it

Assignment Help Computer Engineering
Reference no: EM131573014

Review the article with references in APA format.

Corey As a good human beings and Christians, we are taught not to gossip. We are taught eavesdropping is wrong and that we should mind our own business. It is said in Ecclesiastes, "Don't eavesdrop on the conversation of others.

What if the gossip's about you and you'd rather not hear it? You've done that a few times, haven't you said things behind someone's back you wouldn't say to his face" (7:21-22, MSG)? Now we make some exceptions for the greater good and allow law enforcement to wire tap and listen in on conversation when there is a reasonable doubt and thus a court order allowing such action.

Now if I were to find out that where i worked was being wire tapped I would want to know why and of course see the court order, for even though Ecclesiastes says we should mind our own business, Titus says to, "remind them to be submissive to rulers and authorities, to be obedient, to be ready for every good work" (3:1, ESV) and 1 Peter reminds us to, "honor everyone. Love the brotherhood. Fear God. Honor the emperor" (2:17, ESV).

In doing these things, we give a certain amount of leeway and benefit of the doubt that the authorities are doing what they do for our good. Now Snowden may have been doing what he thought was right and it was probably for the better good, however, I think he should have gone about it in a different manner.

He should have gone through the proper channels and chain of command instead of breaking the law by releasing information that was not his to release. I am a firm believer in accountability and requiring a checks and balances to prevent one person from having too much power to run free and be faced with temptations to do wrong.

Wood and Wright (2015) tell us that Snowden is not the first to bring revelation and whistleblowing about things the NSA is doing.

I don't think he'll be the last but hopefully the next one will be done in a more legal manner. Wood, D. M., & Wright, S. (2015). Before and after snowden. Surveillance & Society, 13(2), 132-138.

Verified Expert

This assignment talks about illegal activities done by different people. We know the fact that most of the people in the world is giving more importance to the information. We have to use different methods for protecting the information. We also has to consider different aspects that is related with the illegal hacking and systems. This assignment is prepared in MS word and it is about 200 words

Reference no: EM131573014

Questions Cloud

Travels along the same path as the incident ray : State the reason why when a ray of light strikes a mirror at 90 degrees, the reflected ray travels along the same path as the incident ray.
What is the net present value of the proposed investment : As the controller and a management accountant, what is your responsibility to this project? What is the net present value of the proposed investment
Locate at least one professional organization : describe what main talks interested you and why you were interested in them
Reputable articles on nuclear powered aircraft carriers : Reputable articles on nuclear powered aircraft carriers may be readily found on the internet.
What if the gossips about you and you rather not hear it : What if the gossip's about you and you'd rather not hear it - You've done that a few times, haven't you said things behind someone's back you wouldn't say to his face
Find the torque on the wrench : A force of 10.0 N is applied at 45 degrees to the end of a wrench of length 16 cm. Find the torque on the wrench
In how many different ways can the driver pay a toll : A bus driver pays all tolls, using only nickels and dimes, by throwing one coin at a time into the mechanical toll collector.
Explain why brakes fail in a hydraulic braking system : Explain why brakes fail in a hydraulic braking system when air gets into the system.
The use of electronic recruiment methods : Questions of equity and fairness are always raised in the application proccess. What is your position on the use of electronic recruiment methods?

Reviews

inf1573014

8/14/2017 4:28:56 AM

I have been managing you amid my task and it was a joy to manage you, I am exceptionally fulfilled in that, I truly welcome all that exertion and help that I got from you, and I would state this is one of the best site that I have manage

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd