This study analyses the ethical perspective of Edward Snowden Ethical Issue from the perspective of U.S Government. The study also analyses the situation through ACS codes of ethics, where Edward Snowden has been assessed as an ICT professional, who is actually unprofessional to his duties.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:PROFESSIONAL PRACTICE IN ETHICS Edward Snowden Ethical Issue Name of the Student: Name of the University: Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1PROFESSIONAL PRACTICE IN ETHICS Title “Edward Snowden Ethical Issue” Executive Summary The code of ethics and professional practice ensure that professional practitioners have adhered to the standard of their professions. This study has analysed the ethical perspective of“Edward Snowden Ethical Issue” from the perspective of U.S Government. From the analysis ofDoing Ethics Technique, it has been seen thatEdward Snowden has violated the national security by revealing the confidential information of NSA to public. On the other hand, the study has also analysed the situation through ACS codes of ethics, where Edward Snowden has been assessed as an ICT professional, who is actually unprofessional to his duties.
2PROFESSIONAL PRACTICE IN ETHICS Table of Contents Title “Edward Snowden Ethical Issue”...........................................................................................1 Executive Summary.........................................................................................................................1 List of Abbreviations and Assumption............................................................................................3 Introduction......................................................................................................................................4 Analysis of Situationusing the Doing Ethics Technique................................................................4 What's going on?..........................................................................................................................4 What are the facts?.......................................................................................................................5 What are the issues?.....................................................................................................................5 Who is affected?..........................................................................................................................6 What are the ethical issues and implications?.............................................................................7 What can be done about it?..........................................................................................................8 What are the options?..................................................................................................................8 Which option is best - and why?..................................................................................................9 Analysis of the situation from the point of view of an ICT Professional using the ACS Code of Ethics.............................................................................................................................................10 Conclusion and Recommendation.................................................................................................12 References......................................................................................................................................13
3PROFESSIONAL PRACTICE IN ETHICS List of Abbreviations and Assumption List of Abbreviations ICT:Information and Communications Technology NSA:National Security Agency ACS: Australian Computer Society U.S: United State CIA:Central Intelligence Agency FBI: Federal Bureau of Investigation List of Assumption Edward Snowden has violated the ACS code of ethics and demonstrated unprofessionalism as an ICT professional Edward Snowden has violated the national security by revealing the confidential U.S information to the public Edward Snowden has unethically caused harm to the U.S public by interrupting the NSA surveillance program
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4PROFESSIONAL PRACTICE IN ETHICS Introduction Disciplinary ethical codes allow an ICT professional to define standard of conduct and ensure the individual practitioners to meet those standards (Fleischmann, Hui and Wallace 2017). This study will discuss the case ethical issue caused byEdward Snowden in NSA. Moreover, the study will analyze this situation using Doing Ethics Technique. Apart from that, the study will also analyze the situation based on the ACS code of ethics. Both the technique will evaluate the ethical issues of the situation from the perspective of ICT professional. Moreover, the study will also provide a suitable recommendation for resolving the case. Analysis of Situationusing the Doing Ethics Technique What's going on? In June 2013, the computer expert and former CIA system administratorEdward Snowden leakedthe confidentialinformationabout thesurveillanceprogram ofNational Security Agency (NSA)(Philosophytalk.org 2015). The U.S Government used to gather and perform data mining on hundreds of internet traffic and U.S phone through this surveillance program. Moreover, the intension of this surveillance program was to identify the possible link to the known terrorists. However,Edward Snowden has violated the Espionage Act through leaking out the state secret. The computer expert has violated the secrecy agreement of the U.S Government by breaching the ethical codes (Allen 2018). Such unethical behavior of Snowden has just wasted the vision of U.S government towards tracking the activities of the terrorists, which can be dangerous for the country.
5PROFESSIONAL PRACTICE IN ETHICS What are the facts? Edward Snowden has breached the ethical norms by leaking the confidential surveillance information of U.S government Snowden has caused harm to the national security of U.S through interrupting the data mining surveillance program The intension of the Snowden was unethical in the sense that he broke the national law of protecting the national assets from the enemies (BBC News 2014) What are the issues? Violation of National Security:EdwardSnowden, the computer expert has violated the national security of U.S through revealing the confidential data mining surveillance programs of NSA. CausedHarmtotheNationalSecurity:EdwardSnowdenhasinterruptedthe surveillance program for data mining towards tracking the contacts with known terrorists. In this way, he has caused harm to the national security of U.S and U.S public (Irvine 2018). Breach of ICT Professional Code of Ethics: The computer expert has violated the code of ethics of ICT professionals through leaking out the confidential information of U.S government. Moreover, he has exploited his position of trust for scoring political points. BreakingEspionage Act of Data Protection: EdwardSnowden has violated the laws of national security act named Espionage Act of data protection (Dodds 2013). He has breached the law of data protection by revealing the confidential information to the enemies.
6PROFESSIONAL PRACTICE IN ETHICS Who is affected? U.S Government: U.S Government is the prime stakeholder, who is directly affected by this case.Moreover, Edward Snowden has actually interrupted the big motto of U.S Government towards tracking the terrorism activities. Such interruption can also cause harm to the national security of the country and the citizen (Lyon 2014). Furthermore, the case also has another negative effect on U.S Government, where the Government has been alleged with violating the privacy of citizen through data mining process. U.S Citizen: U.S citizens are also directly involved in this case, where the data mining process has tracked their telephonic information. The case has negative impact on the U.S citizens, where the surveillance program has hampered the security of their personal information and activities. On the other hand, the leaking out of surveillance information has interrupted the program of tracking terrorism activities. Moreover, now, the terrorists can easily fulfil their terrorism activates, which can hamper the quality of life of the U.S citizens. Telecommunication and Social Networking Service Company: The case also has negative impact on the Telecommunication and Social Networking Service Company. The reputation of the companies can be destroyed on the ground that those companies have permitted U.S Government to track the Telephonic and internet traffic data of the normal publics (Walsh and Miller 2016). Terrorists group and their Associated People: The case has positive impact on the terrorists group and their associated People, which actually have negative consequence on the U.S government and U.S citizens. The terrorists group and their associated People
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7PROFESSIONAL PRACTICE IN ETHICS will be alert after revealing information of the surveillance program. Hence, they can easily protect themselves from the Government treats and fulfil their illegal activities. ICT Professional:EdwardSnowden has set a negative example for the ICT professional, which can influence the associated colleagues. Such unethical conducts of Edward Snowden can also encourage other ICT professional to do the same (Murata, Adams and Lara Palma 2017). What are the ethical issues and implications? Ethical IssueViolation of National Security:EdwardSnowden has violated the ethical norms through breaching the national security of U.S. As per, duty ethics theory, the ethicality of an action is judged on the basis of its adherence with the duty of the actor. Moreover, EdwardSnowden has not adhered with his duty of maintaining national security, which can actually hamper the national security of U.S (Near and Miceli 2016). Ethical Issue in CausingHarm to the National Security: As per Utilitarianism theory ofethic,ethicalactionalwaysenhancesthewellbeingofpeople.However,the information leak ofEdwardSnowden can cause security harm for the citizen by interrupting the terrorism tracking program (Bannister and Connolly 2014). Hence, it is an unethical action, which will actually enhance the sufferings of U.S citizen. Ethical IssueBreach of ICT Professional Code of Ethics: As per duty of ethics, ethical action is always based on certain rules and norms. However, in this case, Edward SnowdenhasbreachedtheethicalcodesICTprofessionthroughrevealingthe confidential information of U.S Government. Hence, it is actually an unethical initiative for ICT professional.
8PROFESSIONAL PRACTICE IN ETHICS Ethical Issue ofBreakingEspionage Act of Data Protection: As per duty ethics, the action of EdwardSnowden is unethical, as he have not adhered with the rules of Espionage Act for protecting national security. However, as per his own justification, he revealed the secure information for the privacy of the public, where his intension was good for protecting public privacy (Murataet al.2017). Hence, as per virtue theory, this action may not be completely unethical. What can be done about it? NSA should renew the surveillance program for tracking the activities of the terrorists. Moreover,theFederalBureauofInvestigation(FBI)shouldhavetosatisfymorelegal requirements prior to access the Americans’ communication from the NSA database for the investigation of the agency (Raab and Szekely 2017). In such legal requirement, the FBI would get a warrant before searching the information from the NSA database. Hence, it would be very difficult for someone to pass on any information to unauthentic person. Apart from that, NSA can also useHomomorphic encryption, which can be use towards aggregating the encrypted data (Kalogridiset al.2014). It would help in both privacy of secure information in the NSA database and useful aggregate information. What are the options? More Legal Requirement for Data Access: NSA should set more legal requirements for accessing the confidential information in the renewed surveillance program. Moreover, in this security measure, the FBI would get an alert, when a person would try to access the secure and confidential information from the NSA database. In this way, no person even within the NSA members would be able to access the confidential information without
9PROFESSIONAL PRACTICE IN ETHICS the permission of FBI. Hence, the chance of violation of security measures would be reduced. Proper Encryption: NSA can also use proper encryption for protecting the confidential information. In this way, it would be extremely difficult for any unauthentic person for understand the meaning of encrypted confidential information (Gotterbarn and Miller 2017). Hence, it would be extremely difficult for the enemies like the terrorists in this case to understand the encrypted form of confidential information. Access Control for Handling Confidential Data: NSA can also use access control system for handing the confidential data in the Database. Moreover, in such system, a NSA member requires permission from the Data Steward towards handling confidential information. Data Steward would give permission to access confidential information only in case of critical business requirement (Raab and Szekely 2017). Hence, it would be extremely difficult to for any NSA member to get access to the confidential database information without critical requirement for the investigation. Which option is best - and why? Among the above mentioned 3 options, access control for handling confidential data would be best for resolving such case. As perKalogridiset al.(2014), in case of more legal requirement for accessing data, it might be possible for someone within the FBI members to avoid the alert on request of getting access to confidential data. Furthermore,Raab and Szekely (2017)stated that in encryption process, it might be possible for someone within the NSA to help the unauthentic person in understanding the encrypted form of confidential information. Such person may easily unethically violate his/her duty to pass on the confidential information to the enemies. However,Raab and Szekely (2017)opined that in case of access control for handling
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10PROFESSIONAL PRACTICE IN ETHICS confidential information, the permission for accessing confidential information would be system generated through Data Steward. Moreover, the request for accessing data would fit the critical business requirement in the Data Steward. Hence, no person, even within the NSA members can unethically violate their duties by unnecessary accessing database information and pass on them to unauthentic persons. Analysis of the situation from the point of view of an ICT Professional using the ACS Code of Ethics The Primacy of Public Interest In this code of ethics, an ICT professional is supposed to place the interest of public above those of his/her personal interests or sectional interests. In this case, the NSA surveillance program was initiated for tracking the contacts of the persons with the known terrorists. Moreover, the interest of this program was to protect the U.S public from the threats of terrorists. However, EdwardSnowden gave priority of his personal interest to be hero to the public by revealing the data mining process of NSA (Whitehouseet al.2016). In this way, Edward Snowden has underestimated the public interest of being protected from the terrorists. The enhancement of Quality of Life In this code of ethics, an ICT professional is supposed to enhance the quality of life of the people, who are affected by his/her work. However, in this case, EdwardSnowden interrupted the surveillance program of NSA, which used to track the contacts of the terrorists. In this way, this person has caused harm to the national security, which can directly harm the quality of life of the U.S citizen (Díaz-Campo and Segado-Boj 2015). Hence, EdwardSnowden has actually violated the ACS Code of Ethics.
11PROFESSIONAL PRACTICE IN ETHICS Honesty In this code of Ethics, an ICT professional is supposed to be honest his/her representing the skills, knowledge and service. However, in this case, EdwardSnowden has demonstrated dishonesty in representing his service by leaking out the confidential information of NSA to the public. Moreover, this computer expert was not actually loyal to his profession. Competence In this code of Ethics, an ICT professional is supposed to work competently and diligently for his/her stakeholders. Being an ICT professional, EdwardSnowden should be his prime duty to protect the confidential information of NSA competently and diligently. However, EdwardSnowden failed to maintain his competence and diligence of this duty by revealing the confidential information of U.S government to the public. Professional Development Inthiscodeofethics,anICTprofessionalissupposedtoenhancehis/herown professional development as well as his/her colleagues’ professional development. However, in this case, being an ICT professional, EdwardSnowden has violated the national security and set a negative example for his other colleagues (Valentine, Fleischman and Bateman 2015). In this way, he actually hindered his own as well as his colleagues’ professional development. Professionalism In this code of ethics, an ICT professional is supposed to enhance the integrity of the society and respect the members for each other. However, in this case, EdwardSnowden has not demonstrated his professionalism by leaking out the confidential information of NSA to the
12PROFESSIONAL PRACTICE IN ETHICS public. Moreover, he has just exploited his position for disintegrating the society by causing harm to the national security. Conclusion and Recommendation While concluding the situation usingDoing Ethics Technique, it can be said thatEdward Snowden has just violated the ethical norms by leaking out the information of NSA surveillance program. Moreover, he has caused harm to the national security of U.S.Such situation can be handled through access control on handling the confidential information of NSA database. On the other hand, as per ACS code of ethics, being an ICT professional, EdwardSnowden was not at all professional to his profession. He was incapable of protecting the confidential information of NSA. NSAshouldprovidepropertrainingtoitsICTprofessionalsforenhancingtheir professional development. In this way, such ICT professionals would be loyal to their duties and roles and protect the confidential information of the NSA database. On the other, NSA should strongly initiate the access control for handling the confidential information of database. Moreover, in such privacy system, any ICT professional would require permission from the Data Steward for getting access to confidential information. Hence, it would not be possible for any NSA members to access the confidential information unnecessary and reveal them to unauthentic persons.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13PROFESSIONAL PRACTICE IN ETHICS References Allen, N. 2018.Edward Snowden: the quiet Hawaii life of the NSA whistleblower. [online] Telegraph.co.uk.Availableat: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10110342/Edward-Snowden-the- quiet-Hawaii-life-of-the-NSA-whistleblower.html Bannister, F. and Connolly, R., 2014. ICT, public values and transformative government: A framework and programme for research.Government Information Quarterly,31(1), pp.119-128. BBCNews.2014.HowtheUSspyscandalunravelled.[online]Availableat: http://www.bbc.com/news/world-us-canada-23123964 Díaz-Campo, J. and Segado-Boj, F., 2015. Journalism ethics in a digital environment: How journalistic codes of ethics have been adapted to the Internet and ICTs in countries around the world.Telematics and Informatics,32(4), pp.735-744. Dodds, N. 2013.Five Eyes spying alliance will survive Edward Snowden: experts. [online] The SydneyMorningHerald.Availableat:http://www.smh.com.au/it-pro/security-it/five-eyes- spying-alliance-will-survive-edward-snowden-experts-20130717-hv0xw.html Fleischmann,K.R.,Hui,C.andWallace,W.A.,2017.Thesocietalresponsibilitiesof computationalmodelers:Humanvaluesandprofessionalcodesofethics.Journalofthe Association for Information Science and Technology,68(3), pp.543-552.
14PROFESSIONAL PRACTICE IN ETHICS Gotterbarn, D. and Miller, K.W., 2017. Yes, but… our response to:“professional ethics in the information age”.Journal of Information, Communication and Ethics in Society,15(4), pp.357- 361. Kalogridis, G., Sooriyabandara, M., Fan, Z. and Mustafa, M.A., 2014. Toward unified security and privacy protection for smart meter networks.IEEE Systems Journal,8(2), pp.641-654. Lyon, D., 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique.Big Data & Society,1(2), p.2053951714541861. Murata, K., Adams, A.A. and Lara Palma, A.M., 2017. Following Snowden: a cross-cultural study on the social impact of Snowden’s revelations.Journal of Information, Communication and Ethics in Society,15(3), pp.183-196. Murata, K., Fukuta, Y., Adams, A.A. and Ronghua, D., 2017. How Snowden’s revelations have influenced youngsters’ attitude and behaviour in the PRC and Taiwan.Journal of Information, Communication and Ethics in Society,15(3), pp.213-231. Near, J.P. and Miceli, M.P., 2016. After the wrongdoing: What managers should know about whistleblowing.Business Horizons,59(1), pp.105-114. Philosophytalk.org. 2015.Edward Snowden and the Ethics of Whistleblowing | Philosophy Talk. [online] Available at: https://www.philosophytalk.org/snowden Raab,C.andSzekely,I.,2017.Dataprotectionauthoritiesandinformation technology.Computer Law & Security Review,33(4), pp.421-433. Raab,C.andSzekely,I.,2017.Dataprotectionauthoritiesandinformation technology.Computer Law & Security Review,33(4), pp.421-433.
15PROFESSIONAL PRACTICE IN ETHICS Valentine, S., Fleischman, G. and Bateman, C.R., 2015. An Exploratory Study Of Professional Ethical Standards, Positive Budgeting Orientation, And The Mediating Role Of Corporate Ethical Values.Accounting & Taxation,7(1), p.1. Walsh, P.F. and Miller, S., 2016. Rethinking ‘Five Eyes’ security intelligence collection policies and practice post Snowden.Intelligence and National Security,31(3), pp.345-368. Whitehouse, D., Duquenoy, P., Kimppa, K.K., Burmeister, O.K., Gotterbarn, D., Kreps, D. and Patrignani,N.,2016.Twenty-fiveyearsofICTandsociety:codesofethicsandcloud computing.ACM SIGCAS Computers and Society,45(3), pp.18-24.