Analysis of the ethical issue, Computer Networking

Assignment Help:

This ICT-related issue that has been raised in the contemporary media, and the article is required to be included as part of the essay:

Undertake further research about this topic to assist in analysing and discussing it in the essay.

Write a concise essay of 1,300 words that analyses the case in two different ways, is written clearly and with the content well-organised:

a. Analyse the situation using the Doing Ethics Technique (DET), addressing each of the DET questions; and

b. Analyse the situation from the point of view of an ICT professional, using the ACS Code of Ethics and relating clauses from the ACS code of Ethics to the ethical issues as appropriate (see attachments).

c. Write a conclusion that ties the results of both analyses together and presents overall recommendations;

d. Include a reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.


Related Discussions:- Analysis of the ethical issue

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

CCNA, What is basic purpose of Routers

What is basic purpose of Routers

Describe about data communications, Q. Describe about Data Communications? ...

Q. Describe about Data Communications? - Data - Information presented in whatsoever form is agreed upon by the parties creating and using the data - Data Communications - ex

What is money laundering and how is money laundered, Question: a) (i)...

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Unused reserved - trannsport layer, Unused Reserved This  is a 6 bi...

Unused Reserved This  is a 6 bite field  reserved for future use.

Reliable data transfer - transport layer, Reliable Data Transfer Figur...

Reliable Data Transfer Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel

Intranet, Intranets are fundamentally "small" Internets. They employ the sa...

Intranets are fundamentally "small" Internets. They employ the same network facilities which the Internet does, however access is limited to a restricted sphere. For example, a com

Which layer defines bit synchronization, Physical layers defines with synch...

Physical layers defines with synchronizing the 1s and 0s on the wire.

Physical media - computer network, Physical Media In order  to define ...

Physical Media In order  to define what is meant by a physical medium let us reflect on the brief life of a bit. Consider  a bit travelling from one end system through a serie

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd