Ethical Considerations of National Security Agency
VerifiedAdded on 2023/06/15
|16
|3935
|181
AI Summary
This report analyzes the ethical considerations of National Security Agency using Doing Ethics Technique and ACS Code of Ethics. It discusses the situation of Edward Snowden leaking confidential data and suggests options to prevent data theft and disclosure of classified information. The report emphasizes on the importance of honesty, integrity and professionalism in the workplace.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ETHICS AND PROFESSIONAL PRATICE
Report on ethical Considerations of National Security Agency
Name of the student:
Name of the university:
Author note:
Report on ethical Considerations of National Security Agency
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
ETHICS AND PROFESSIONAL PRACTICE
Executive Summary
Ethics is an important aspect within the workplace issues. Consciousness towards legal
compliance reflects the cultured upbringing of the individuals. This is reflected in the techniques
used for performing the allocated duties and responsibilities. Herein lays the appropriateness of
the phrase “professional practice”. On the other hand, neglecting the organizational values
indicates a poor cultural upbringing in case of the employees. People like Edward Snowden
belong to the second category. The case study reflects Snowden’s confession about the heinous
crime, which he has commited. Fleeing from the country attaches interrogative parameter to this
confession. In view of this connotation, the assumptions regarding Snowden’s illegal alliance
with the terrorists, gains shape. Based on the violation of the civil and constitutional rights,
Snowden can be considered as a traitor, who should be prosecuted. This is in order to protect the
public interest.
ETHICS AND PROFESSIONAL PRACTICE
Executive Summary
Ethics is an important aspect within the workplace issues. Consciousness towards legal
compliance reflects the cultured upbringing of the individuals. This is reflected in the techniques
used for performing the allocated duties and responsibilities. Herein lays the appropriateness of
the phrase “professional practice”. On the other hand, neglecting the organizational values
indicates a poor cultural upbringing in case of the employees. People like Edward Snowden
belong to the second category. The case study reflects Snowden’s confession about the heinous
crime, which he has commited. Fleeing from the country attaches interrogative parameter to this
confession. In view of this connotation, the assumptions regarding Snowden’s illegal alliance
with the terrorists, gains shape. Based on the violation of the civil and constitutional rights,
Snowden can be considered as a traitor, who should be prosecuted. This is in order to protect the
public interest.
2
ETHICS AND PROFESSIONAL PRACTICE
Table of Contents
Introduction......................................................................................................................................4
Analysis of the situation using Doing Ethics Technique.................................................................4
1. What is going on?....................................................................................................................4
2. What is the facts/information?.................................................................................................5
3. What are the issues?.................................................................................................................5
4. Who are affected?....................................................................................................................6
5. Ethical issues and implication.................................................................................................6
6. What can be done?...................................................................................................................7
7. What are the options?..............................................................................................................7
7.1 Review of the policies.......................................................................................................7
7.2 Introduction of a firewall...................................................................................................8
7.3 Limited access to the employees.......................................................................................8
8. What is the best option and why?............................................................................................8
Analysis of the situation using ACS code of ethics.........................................................................8
Conclusion.....................................................................................................................................12
References and bibliography.........................................................................................................13
ETHICS AND PROFESSIONAL PRACTICE
Table of Contents
Introduction......................................................................................................................................4
Analysis of the situation using Doing Ethics Technique.................................................................4
1. What is going on?....................................................................................................................4
2. What is the facts/information?.................................................................................................5
3. What are the issues?.................................................................................................................5
4. Who are affected?....................................................................................................................6
5. Ethical issues and implication.................................................................................................6
6. What can be done?...................................................................................................................7
7. What are the options?..............................................................................................................7
7.1 Review of the policies.......................................................................................................7
7.2 Introduction of a firewall...................................................................................................8
7.3 Limited access to the employees.......................................................................................8
8. What is the best option and why?............................................................................................8
Analysis of the situation using ACS code of ethics.........................................................................8
Conclusion.....................................................................................................................................12
References and bibliography.........................................................................................................13
3
ETHICS AND PROFESSIONAL PRACTICE
List of abbreviations and assumptions made
NSA- National Service Agency
ACS Code of ethics- Australian Computer Society Code of Ethics
Edward Snowden might be having illegal alliance with the terrorists
Working under a contractor and violation of the civil and constitutional rights puts
Snowden’s employment at stake
ETHICS AND PROFESSIONAL PRACTICE
List of abbreviations and assumptions made
NSA- National Service Agency
ACS Code of ethics- Australian Computer Society Code of Ethics
Edward Snowden might be having illegal alliance with the terrorists
Working under a contractor and violation of the civil and constitutional rights puts
Snowden’s employment at stake
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
ETHICS AND PROFESSIONAL PRACTICE
Introduction
Ethics is an integral part in the workplace operations. Exposure of ethical approach
reflects the culture of the employees. This approach is crucial for the managers in terms of
involving the employees in group discussions. Respecting the individual sentiments is one of an
essential component of workplace ethics. Consciousness in this direction enhances the
professionalism of the employees. Legal compliance is one of the other examples of workplace
ethics (Cohen 2016). Delving deep into the aspect, ethics brings in behavioral theory into the
discussion. This assignment peeks into the ethical consideration of NSA. This is carried out
through the Doing Ethics Technique and ACS Code of ethics.
Analysis of the situation using Doing Ethics Technique
1. What is going on?
Edward Snowden performed an action of leaking the classified information of the
National Security Agency, which intensified the danger of the malfunctioning of the systems. On
the other hand, the step that was taken by the .employee of the NSA has compromised the details
of the people. The violation of the ethics of the company was based on the compromise of the
phone and internet traffic details of the terrorists (Nsa.gov 2018). The systems helped the
security systems to keep a close track on the activities of the terrorists and therefore the leakage
of the functioning of the systems has helped the terrorists in finding a refuge away from the
security systems. Some of the people however think that Snowden is a kind of whistleblower
who has drawn attention on the undertakings of the NSA, which is unethical. On the other hand,
ETHICS AND PROFESSIONAL PRACTICE
Introduction
Ethics is an integral part in the workplace operations. Exposure of ethical approach
reflects the culture of the employees. This approach is crucial for the managers in terms of
involving the employees in group discussions. Respecting the individual sentiments is one of an
essential component of workplace ethics. Consciousness in this direction enhances the
professionalism of the employees. Legal compliance is one of the other examples of workplace
ethics (Cohen 2016). Delving deep into the aspect, ethics brings in behavioral theory into the
discussion. This assignment peeks into the ethical consideration of NSA. This is carried out
through the Doing Ethics Technique and ACS Code of ethics.
Analysis of the situation using Doing Ethics Technique
1. What is going on?
Edward Snowden performed an action of leaking the classified information of the
National Security Agency, which intensified the danger of the malfunctioning of the systems. On
the other hand, the step that was taken by the .employee of the NSA has compromised the details
of the people. The violation of the ethics of the company was based on the compromise of the
phone and internet traffic details of the terrorists (Nsa.gov 2018). The systems helped the
security systems to keep a close track on the activities of the terrorists and therefore the leakage
of the functioning of the systems has helped the terrorists in finding a refuge away from the
security systems. Some of the people however think that Snowden is a kind of whistleblower
who has drawn attention on the undertakings of the NSA, which is unethical. On the other hand,
5
ETHICS AND PROFESSIONAL PRACTICE
some others believe Snowden to be traitor to the security systems and the country by
compromising the security of millions of people (Nsa.gov 2018).
2. What is the facts/information?
In the year 2013, June, Edward Snowden revealed certain classified information of the
National Security Systems (NSA) and thereby compromised the information of the systems that
are undertaken by the agency. On the other hand, the compromise of the information that is being
undertaken by Edward has made the terrorists aware of the practices that are undertaken by the
agency for tracking their activities (Nsa.gov 2018). Edward revealed the classified information of
the undertakings of the agency in a mass media channel through which the mass is made aware
of the processes that are undertaken by the organization. The report on the NSA surveillance
programs has helped in undertaking steps for bringing in the varied changes in the security
systems that are undertaken by the agency. Alternatively, the revelation of the functioning of the
NSA has helped in the understanding of the unethical and unconstitutional procedure undertaken
by the agency.
3. What are the issues?
The issues that are being faced by the organization are based on the revelation of the
important classified information, which has made the terrorists and the other antisocial aware of
their functioning and the processes undertaken by the organization. The major aspects of the
change that is being undertaken by the organization is based on the requirements of the people
to secure their surroundings and the neighborhood. On the other hand, the information of the
processes has made the processes vulnerable to the cyber theft and data piracy, which might
affect the smooth functioning of the organization (Nsa.gov 2018). The proper functioning of the
organization is based on the resourcefulness and the processes that are undertaken by the
ETHICS AND PROFESSIONAL PRACTICE
some others believe Snowden to be traitor to the security systems and the country by
compromising the security of millions of people (Nsa.gov 2018).
2. What is the facts/information?
In the year 2013, June, Edward Snowden revealed certain classified information of the
National Security Systems (NSA) and thereby compromised the information of the systems that
are undertaken by the agency. On the other hand, the compromise of the information that is being
undertaken by Edward has made the terrorists aware of the practices that are undertaken by the
agency for tracking their activities (Nsa.gov 2018). Edward revealed the classified information of
the undertakings of the agency in a mass media channel through which the mass is made aware
of the processes that are undertaken by the organization. The report on the NSA surveillance
programs has helped in undertaking steps for bringing in the varied changes in the security
systems that are undertaken by the agency. Alternatively, the revelation of the functioning of the
NSA has helped in the understanding of the unethical and unconstitutional procedure undertaken
by the agency.
3. What are the issues?
The issues that are being faced by the organization are based on the revelation of the
important classified information, which has made the terrorists and the other antisocial aware of
their functioning and the processes undertaken by the organization. The major aspects of the
change that is being undertaken by the organization is based on the requirements of the people
to secure their surroundings and the neighborhood. On the other hand, the information of the
processes has made the processes vulnerable to the cyber theft and data piracy, which might
affect the smooth functioning of the organization (Nsa.gov 2018). The proper functioning of the
organization is based on the resourcefulness and the processes that are undertaken by the
6
ETHICS AND PROFESSIONAL PRACTICE
organization for the better functioning of the same related to the security of the people.
Therefore, the issues that are faced by the organization are due to the concession of the data of
the organization in the markets and the people being made aware of the systems of the security
that is being undertaken by the agency (Nsa.gov 2018).
4. Who are affected?
The people of the nation and the security systems are affected by the breach in the
information of the agency. On the other hand, it has affected the functioning of the organization
as per the requirements to deal with the issues faced by the people relating to their security
(Nsa.gov 2018). The mishandling of the phone records and the other significant documents are
subjected to the data theft and has resulted to an issue in the cyber security system of the agency.
The organization and its functioning is mostly affected through the breach of information. On the
other hand, the people of the region are affected through the mismanagement of their private
details that has endangered their existence in the region.
5. Ethical issues and implication
The ethical issues that are faced by the agency is based on the revelation of the classified
information of the systems that are undertaken by the organization. The classified information
has not only affected the functioning of the organization but also has affected the security of the
people (Nsa.gov 2018). The major impact that the agency might face while making use of the
security systems are based on the data piracy, which might affect the smooth functioning of the
security systems. On the other hand, the breach of the information has caused havoc impacts on
the livelihood of the people. The security systems of the company should have been integrated
which would have helped in the prevention of the data theft and other unethical practices.
ETHICS AND PROFESSIONAL PRACTICE
organization for the better functioning of the same related to the security of the people.
Therefore, the issues that are faced by the organization are due to the concession of the data of
the organization in the markets and the people being made aware of the systems of the security
that is being undertaken by the agency (Nsa.gov 2018).
4. Who are affected?
The people of the nation and the security systems are affected by the breach in the
information of the agency. On the other hand, it has affected the functioning of the organization
as per the requirements to deal with the issues faced by the people relating to their security
(Nsa.gov 2018). The mishandling of the phone records and the other significant documents are
subjected to the data theft and has resulted to an issue in the cyber security system of the agency.
The organization and its functioning is mostly affected through the breach of information. On the
other hand, the people of the region are affected through the mismanagement of their private
details that has endangered their existence in the region.
5. Ethical issues and implication
The ethical issues that are faced by the agency is based on the revelation of the classified
information of the systems that are undertaken by the organization. The classified information
has not only affected the functioning of the organization but also has affected the security of the
people (Nsa.gov 2018). The major impact that the agency might face while making use of the
security systems are based on the data piracy, which might affect the smooth functioning of the
security systems. On the other hand, the breach of the information has caused havoc impacts on
the livelihood of the people. The security systems of the company should have been integrated
which would have helped in the prevention of the data theft and other unethical practices.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
ETHICS AND PROFESSIONAL PRACTICE
6. What can be done?
In order to avoid the circumstances and the atrocities, the agency might take steps in
order to ensure the safety of the data from the piracy and the cyber crime activities. The steps
that might be taken by the agency are framing policies for the control of the cyber theft and the
development of the organization in the markets. On the other hand, the agency must take steps in
order to review the policies for the proper management of the information that is retained by the
agency. Limited access to the employees will also help the organization in securing the classified
information. The company must also take steps to secure the information through the application
of various software that helps in retaining the important information away from the outsiders and
even provide very limited access to the employees.
7. What are the options?
The various options that can be implemented by the organization in order to handle the
situation is being discussed in this section of the report. It helps in the understanding of the
different steps that are undertaken by the management of the organization. The various options
that can be undertaken by the organization in order to handle the situation are:
7.1 Review of the policies
The company must take steps in order to review the policies of the security in order to
keep the classified documents secured and away from the cyber crime. It will be helping the
organization in retaining the secrecy of the information safe and away from breaches and leaks.
ETHICS AND PROFESSIONAL PRACTICE
6. What can be done?
In order to avoid the circumstances and the atrocities, the agency might take steps in
order to ensure the safety of the data from the piracy and the cyber crime activities. The steps
that might be taken by the agency are framing policies for the control of the cyber theft and the
development of the organization in the markets. On the other hand, the agency must take steps in
order to review the policies for the proper management of the information that is retained by the
agency. Limited access to the employees will also help the organization in securing the classified
information. The company must also take steps to secure the information through the application
of various software that helps in retaining the important information away from the outsiders and
even provide very limited access to the employees.
7. What are the options?
The various options that can be implemented by the organization in order to handle the
situation is being discussed in this section of the report. It helps in the understanding of the
different steps that are undertaken by the management of the organization. The various options
that can be undertaken by the organization in order to handle the situation are:
7.1 Review of the policies
The company must take steps in order to review the policies of the security in order to
keep the classified documents secured and away from the cyber crime. It will be helping the
organization in retaining the secrecy of the information safe and away from breaches and leaks.
8
ETHICS AND PROFESSIONAL PRACTICE
7.2 Introduction of a firewall
The introduction of a firewall through the implementation of a software, which might
help the organization in keeping the records safe and away from disclosure. It helps the
organization in safeguarding the classified information away from the disruptions in the systems.
7.3 Limited access to the employees
Ensuring the limited access to the employees also helps the organization in monitoring
over the security of the information and therefore prevent data theft from affecting the systems of
the undertakings of the agency.
8. What is the best option and why?
The best option that can be counted by the organization is based on the level of security
systems and the importance of the documents that are required to be secured. The best option
that might be undertaken by the agency is the introduction of a firewall, which will actually help
the organization in preventing invaders from looking into the confidential documents of the
organization. The NSA must take steps in order to implement the software in the best possible
manner in order to prevent data theft and disclosure of classified information of the agency.
Analysis of the situation using ACS code of ethics
ACS code of ethics is an essential component of the Australian constitution. According to
the standard and protocols of ACS code of ethics, maintaining the honor, dignity of the personnel
is very important in order to abide by the workplace ethics (Jensen and Delany 2016). These
aspects contradict the situation of NSA, as one of the personnel, Edward Snowden, leaked the
private and confidential data of the organization. As he leaked the private and confidential
information, it can be considered that he neglected the public interest of his colleagues,
ETHICS AND PROFESSIONAL PRACTICE
7.2 Introduction of a firewall
The introduction of a firewall through the implementation of a software, which might
help the organization in keeping the records safe and away from disclosure. It helps the
organization in safeguarding the classified information away from the disruptions in the systems.
7.3 Limited access to the employees
Ensuring the limited access to the employees also helps the organization in monitoring
over the security of the information and therefore prevent data theft from affecting the systems of
the undertakings of the agency.
8. What is the best option and why?
The best option that can be counted by the organization is based on the level of security
systems and the importance of the documents that are required to be secured. The best option
that might be undertaken by the agency is the introduction of a firewall, which will actually help
the organization in preventing invaders from looking into the confidential documents of the
organization. The NSA must take steps in order to implement the software in the best possible
manner in order to prevent data theft and disclosure of classified information of the agency.
Analysis of the situation using ACS code of ethics
ACS code of ethics is an essential component of the Australian constitution. According to
the standard and protocols of ACS code of ethics, maintaining the honor, dignity of the personnel
is very important in order to abide by the workplace ethics (Jensen and Delany 2016). These
aspects contradict the situation of NSA, as one of the personnel, Edward Snowden, leaked the
private and confidential data of the organization. As he leaked the private and confidential
information, it can be considered that he neglected the public interest of his colleagues,
9
ETHICS AND PROFESSIONAL PRACTICE
managers and other staffs. This negligence strained the relationship between Snowden and the
organization. Herein lays the appropriateness of the instance, suggesting different perceptions
regarding Snowden’s deeds. Delving deep into the perspective, the intensity of crime is so high,
that any initiative from Snowden’s end would not bear positive result. This is in terms of raising
the standard of living of his colleagues.
Snowden’s deeds lack honesty in the practical application of the learnt skills in the
workplace operations. This is reflected from his unethical revelations of the confidential data to
the third party. This revelation also indicates Snowden’s lack of competence regarding catering
to the needs, demands and requirements of the stakeholders (Erford 2017). Absence of these
skills stalls the professional development of personnel like Snowden. Along with this, it also acts
as an obstacle towards the professional development of his colleagues, as they are compelled to
bear with the illegal issues and scandals. Viewing it from broader perspective, obstacles in the
professional development adds an ombre shade to the professionalism of Snowden as well as the
other staffs of NSA.
Countering this, obstacles in the professional development aggravates complexities
towards enhancing the quality of life. This is applicable both in cases of Snowden and his
colleagues in NSA. These complexities reflect the misutilization of the preconceived
competencies by people like Snowden compelling the organization to encounter losses (Rogers
and Braunack 2015). Confessing regarding the crime can be considered as the presence of
honesty within Snowden’s characteristic traits. However, in terms of the loss, which NSA had to
face, this honesty is of no use. Leaking the information to terrorists is Snowden’s unethical
approach, adding interrogative parameter to Snowden’s professional career. Fleeing from the
country nullifies the attribute of honesty in case of Snowden.
ETHICS AND PROFESSIONAL PRACTICE
managers and other staffs. This negligence strained the relationship between Snowden and the
organization. Herein lays the appropriateness of the instance, suggesting different perceptions
regarding Snowden’s deeds. Delving deep into the perspective, the intensity of crime is so high,
that any initiative from Snowden’s end would not bear positive result. This is in terms of raising
the standard of living of his colleagues.
Snowden’s deeds lack honesty in the practical application of the learnt skills in the
workplace operations. This is reflected from his unethical revelations of the confidential data to
the third party. This revelation also indicates Snowden’s lack of competence regarding catering
to the needs, demands and requirements of the stakeholders (Erford 2017). Absence of these
skills stalls the professional development of personnel like Snowden. Along with this, it also acts
as an obstacle towards the professional development of his colleagues, as they are compelled to
bear with the illegal issues and scandals. Viewing it from broader perspective, obstacles in the
professional development adds an ombre shade to the professionalism of Snowden as well as the
other staffs of NSA.
Countering this, obstacles in the professional development aggravates complexities
towards enhancing the quality of life. This is applicable both in cases of Snowden and his
colleagues in NSA. These complexities reflect the misutilization of the preconceived
competencies by people like Snowden compelling the organization to encounter losses (Rogers
and Braunack 2015). Confessing regarding the crime can be considered as the presence of
honesty within Snowden’s characteristic traits. However, in terms of the loss, which NSA had to
face, this honesty is of no use. Leaking the information to terrorists is Snowden’s unethical
approach, adding interrogative parameter to Snowden’s professional career. Fleeing from the
country nullifies the attribute of honesty in case of Snowden.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
ETHICS AND PROFESSIONAL PRACTICE
Avoiding the federal charges reflects the negligent attitude of Snowden towards
performing the duties of a faithful citizen. Being a whistle blower raises doubts over Snowden’s
post as an employee. Violation of the civil rights and constitutional elements attaches questions
regarding the Snowden’s citizenship as well as the post offered (Congress 2017). In view of this
parameter, perspectives his prosecution is appropriate. Herein lays the appropriateness of the
term traitor. Countering this, his confession regarding committing a crime reduces the intensity
of prosecution. In his confession, the names of Newspaper agencies emerge, which spoils the
reputation of NSA. Revealing the information to these agencies reflects the foolishness of
Snowden in terms of ensuring the betterment of the organization, of which he is an employee.
This foolishness contradicts the true essence of ethics in workplace.
As a matter of specification, ACS code of ethics indicates the responsibility of the
individuals to adhere to the societal values for adding value and weightage to their citizenship
(Komić, Marušić and Marušić 2015). In view of this, Snowden’s citizenship is at stake. This is
because he has assisted terrorists in misutilizing confidential data about the organization. Taking
into consideration all these aspects, perceiving Snowden as a traitor is appropriate. Along with
this, prosecution is also justified. Delving deep into the aspect, Snowden’s activities makes him a
violator of security in his own country.
Revealing details of the surveillance programs can be Snowden’s disinterest towards
keeping track of the information, which flows from the internal to the external environment of
NSA. “Known” terrorists can be correlated with the fact that without the information of the
Agency, Snowden was practicing illegal alliance with the terrorists, supplying them with
confidential information and data (Holtzhausen 2015). Delving deep into Snowden’s position, he
ETHICS AND PROFESSIONAL PRACTICE
Avoiding the federal charges reflects the negligent attitude of Snowden towards
performing the duties of a faithful citizen. Being a whistle blower raises doubts over Snowden’s
post as an employee. Violation of the civil rights and constitutional elements attaches questions
regarding the Snowden’s citizenship as well as the post offered (Congress 2017). In view of this
parameter, perspectives his prosecution is appropriate. Herein lays the appropriateness of the
term traitor. Countering this, his confession regarding committing a crime reduces the intensity
of prosecution. In his confession, the names of Newspaper agencies emerge, which spoils the
reputation of NSA. Revealing the information to these agencies reflects the foolishness of
Snowden in terms of ensuring the betterment of the organization, of which he is an employee.
This foolishness contradicts the true essence of ethics in workplace.
As a matter of specification, ACS code of ethics indicates the responsibility of the
individuals to adhere to the societal values for adding value and weightage to their citizenship
(Komić, Marušić and Marušić 2015). In view of this, Snowden’s citizenship is at stake. This is
because he has assisted terrorists in misutilizing confidential data about the organization. Taking
into consideration all these aspects, perceiving Snowden as a traitor is appropriate. Along with
this, prosecution is also justified. Delving deep into the aspect, Snowden’s activities makes him a
violator of security in his own country.
Revealing details of the surveillance programs can be Snowden’s disinterest towards
keeping track of the information, which flows from the internal to the external environment of
NSA. “Known” terrorists can be correlated with the fact that without the information of the
Agency, Snowden was practicing illegal alliance with the terrorists, supplying them with
confidential information and data (Holtzhausen 2015). Delving deep into Snowden’s position, he
11
ETHICS AND PROFESSIONAL PRACTICE
works for a defence contractor Booz Allen Hamilton. This side parting with the terrorist puts
Hamilton in an awkward situation. However, this is just an assumption.
The word “code” in the AcS code of ethics represents the customs, rules and regulations
developed by an organization for maintaining the workplace decorum. All the employees, upon
their recruitment are expected to abide by these rules and regulations. However, Snowden is an
exception, as he violates the Agency norms. This connotation raises doubts over the ways and
means adopted by him to gain this position (Parsons 2016). Along with this, violation of the
constitutional rights contradicts the aspect of public interest in case of Snowden. In view of this
connotation, the aspect of professional development is nullified. This is in terms of neglecting
the interest of his colleagues, managers and the organization as a whole.
Viewing it from the perspective of ICT industry as a whole, the loss of secret and
confidential data degrades the reputation. Violation of the code of ethics compels the employees
like Snowden to encounter illegal instances, which can go up to the extent of termination.
Accepting this consequence reflects the absence of competence from Snowden’s end regarding
the application of learnt skills to the execution of the workplace operations (Barker and Branson
2014). This incompetence can be perceived in terms of intentional or incapability. In case of
Snowden, it is intentional as Snowden neglects public interest as well as the interest of his
colleagues.
Overall, it can be said that in case of Snowden, none of the elements of AcS code of
ethics is applicable. He is not at all conscious towards protecting the interest of his colleagues,
which reflects the lack of competence towards the proper application of the learnt skills. This
lack contradicts honesty, stalling the professional development of employees like Snowden.
ETHICS AND PROFESSIONAL PRACTICE
works for a defence contractor Booz Allen Hamilton. This side parting with the terrorist puts
Hamilton in an awkward situation. However, this is just an assumption.
The word “code” in the AcS code of ethics represents the customs, rules and regulations
developed by an organization for maintaining the workplace decorum. All the employees, upon
their recruitment are expected to abide by these rules and regulations. However, Snowden is an
exception, as he violates the Agency norms. This connotation raises doubts over the ways and
means adopted by him to gain this position (Parsons 2016). Along with this, violation of the
constitutional rights contradicts the aspect of public interest in case of Snowden. In view of this
connotation, the aspect of professional development is nullified. This is in terms of neglecting
the interest of his colleagues, managers and the organization as a whole.
Viewing it from the perspective of ICT industry as a whole, the loss of secret and
confidential data degrades the reputation. Violation of the code of ethics compels the employees
like Snowden to encounter illegal instances, which can go up to the extent of termination.
Accepting this consequence reflects the absence of competence from Snowden’s end regarding
the application of learnt skills to the execution of the workplace operations (Barker and Branson
2014). This incompetence can be perceived in terms of intentional or incapability. In case of
Snowden, it is intentional as Snowden neglects public interest as well as the interest of his
colleagues.
Overall, it can be said that in case of Snowden, none of the elements of AcS code of
ethics is applicable. He is not at all conscious towards protecting the interest of his colleagues,
which reflects the lack of competence towards the proper application of the learnt skills. This
lack contradicts honesty, stalling the professional development of employees like Snowden.
12
ETHICS AND PROFESSIONAL PRACTICE
Consistency in this approach acts obstacle in the enhancement of professionalism for these
employees, degrading their quality of life (Brinkman et al. 2016).
Perceptions about Snowden are the consequences of his own actions. The adjectives
“whistle blower” and “traitor” degrade his individualism. However, confessing that he has
commited a heinous crime, reflects his consciousness about the consequences, which he has to
face on violation of the constitutional rights. Placing the personal interests above the
organizational interest makes him self-centred, nullifying the aspect of ensuring the benefit of
organization as a whole (Holtzhausen 2015). This type of approach is against the workplace
ethics, raising doubts over his adherence to the position offered.
Conclusion
This assignment emerges successful in providing an insight into the workplace ethics.
The consideration of the analytical tools of Doing the Ethics and ACS code of ethics enliven the
ways and means in which the workplace ethics can be preserved. The example of NSA enhances
the clarity of the readers in this regards. Doing the ethics analysis mainly enlightens the
knowledge of the readers regarding the issues and the solutions in which these issues can be
resolved. AcS code of ethics is relevant with the requirements of the assignment. The case study
of Edward Snowden reflects unethical approach towards the workplace activities. This approach
stalls the professional development of such employees, degrading their individualism.
ETHICS AND PROFESSIONAL PRACTICE
Consistency in this approach acts obstacle in the enhancement of professionalism for these
employees, degrading their quality of life (Brinkman et al. 2016).
Perceptions about Snowden are the consequences of his own actions. The adjectives
“whistle blower” and “traitor” degrade his individualism. However, confessing that he has
commited a heinous crime, reflects his consciousness about the consequences, which he has to
face on violation of the constitutional rights. Placing the personal interests above the
organizational interest makes him self-centred, nullifying the aspect of ensuring the benefit of
organization as a whole (Holtzhausen 2015). This type of approach is against the workplace
ethics, raising doubts over his adherence to the position offered.
Conclusion
This assignment emerges successful in providing an insight into the workplace ethics.
The consideration of the analytical tools of Doing the Ethics and ACS code of ethics enliven the
ways and means in which the workplace ethics can be preserved. The example of NSA enhances
the clarity of the readers in this regards. Doing the ethics analysis mainly enlightens the
knowledge of the readers regarding the issues and the solutions in which these issues can be
resolved. AcS code of ethics is relevant with the requirements of the assignment. The case study
of Edward Snowden reflects unethical approach towards the workplace activities. This approach
stalls the professional development of such employees, degrading their individualism.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
ETHICS AND PROFESSIONAL PRACTICE
References and bibliography
Barker, R.L. and Branson, D.M., 2014. Forensic social work: Legal aspects of professional
practice. Routledge.
Brinkman, B., Gotterbarn, D., Miller, K.W. and Wolf, M.J., 2016. All hands on deck for ACM
Ethics: updating the Code, revising enforcement, promoting integrity. ACM SIGCAS Computers
and Society, 46(3), pp.5-8.
Chou, T.S., 2013. Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), p.79.
Cohen, A.I., 2016. Ethics and professional practice. In Practicing Professional Ethics in
Economics and Public Policy(pp. 237-244). Springer, Dordrecht.
Congress, E.P., 2017. What social workers should know about ethics: Understanding and
resolving practice dilemmas. Social Work Ethics, p.1909.
Erford, B.T., 2017. Orientation to the counseling profession: Advocacy, ethics, and essential
professional foundations. Pearson.
Guo, K.H., 2013. Security-related behavior in using information systems in the workplace: A
review and synthesis. Computers & Security, 32, pp.242-251.
Holtzhausen, D.R., 2015. The unethical consequences of professional communication codes of
ethics: A postmodern analysis of ethical decision-making in communication practice. Public
Relations Review, 41(5), pp.769-776.
ETHICS AND PROFESSIONAL PRACTICE
References and bibliography
Barker, R.L. and Branson, D.M., 2014. Forensic social work: Legal aspects of professional
practice. Routledge.
Brinkman, B., Gotterbarn, D., Miller, K.W. and Wolf, M.J., 2016. All hands on deck for ACM
Ethics: updating the Code, revising enforcement, promoting integrity. ACM SIGCAS Computers
and Society, 46(3), pp.5-8.
Chou, T.S., 2013. Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), p.79.
Cohen, A.I., 2016. Ethics and professional practice. In Practicing Professional Ethics in
Economics and Public Policy(pp. 237-244). Springer, Dordrecht.
Congress, E.P., 2017. What social workers should know about ethics: Understanding and
resolving practice dilemmas. Social Work Ethics, p.1909.
Erford, B.T., 2017. Orientation to the counseling profession: Advocacy, ethics, and essential
professional foundations. Pearson.
Guo, K.H., 2013. Security-related behavior in using information systems in the workplace: A
review and synthesis. Computers & Security, 32, pp.242-251.
Holtzhausen, D.R., 2015. The unethical consequences of professional communication codes of
ethics: A postmodern analysis of ethical decision-making in communication practice. Public
Relations Review, 41(5), pp.769-776.
14
ETHICS AND PROFESSIONAL PRACTICE
Jain, P., 2012. Security Issues and their solution in cloud computing. International Journal of
Computing & Business Research, pp.2229-6166.
Jensen, G. and Delany, C., 2016. The Discourse on Ethics and Expertise in Professional Practice.
In Professional Practice Discourse Marginalia (pp. 73-82). SensePublishers, Rotterdam.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things:
perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Komić, D., Marušić, S.L. and Marušić, A., 2015. Research integrity and research ethics in
professional codes of ethics: Survey of terminology used by professional organizations across
research disciplines. PloS one, 10(7), p.e0133662.
Kshetri, N., 2014. Big data׳ s impact on privacy, security and consumer
welfare. Telecommunications Policy, 38(11), pp.1134-1145.
Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security
issues and solutions at different layers of Cloud computing. The journal of
supercomputing, 63(2), pp.561-592.
Moore, J.F. and Labovitch, B.A., NewsILike Media Group Inc, 2013. Security systems and
methods for use with structured and unstructured data. U.S. Patent 8,347,088.
Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive
data. Network Security, 2012(12), pp.5-8.
Nsa.gov (2018). NSA.gov. [online] Nsa.gov. Available at: https://www.nsa.gov/ [Accessed 6 Feb.
2018].
ETHICS AND PROFESSIONAL PRACTICE
Jain, P., 2012. Security Issues and their solution in cloud computing. International Journal of
Computing & Business Research, pp.2229-6166.
Jensen, G. and Delany, C., 2016. The Discourse on Ethics and Expertise in Professional Practice.
In Professional Practice Discourse Marginalia (pp. 73-82). SensePublishers, Rotterdam.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things:
perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Komić, D., Marušić, S.L. and Marušić, A., 2015. Research integrity and research ethics in
professional codes of ethics: Survey of terminology used by professional organizations across
research disciplines. PloS one, 10(7), p.e0133662.
Kshetri, N., 2014. Big data׳ s impact on privacy, security and consumer
welfare. Telecommunications Policy, 38(11), pp.1134-1145.
Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security
issues and solutions at different layers of Cloud computing. The journal of
supercomputing, 63(2), pp.561-592.
Moore, J.F. and Labovitch, B.A., NewsILike Media Group Inc, 2013. Security systems and
methods for use with structured and unstructured data. U.S. Patent 8,347,088.
Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive
data. Network Security, 2012(12), pp.5-8.
Nsa.gov (2018). NSA.gov. [online] Nsa.gov. Available at: https://www.nsa.gov/ [Accessed 6 Feb.
2018].
15
ETHICS AND PROFESSIONAL PRACTICE
Parsons, P.J., 2016. Ethics in public relations: A guide to best practice. Kogan Page Publishers.
Rogers, W. and Braunack-Mayer, A., 2015. General practice ethics: inter-professional
responsibilities. Australian family physician, 44(7), p.519.
Verma, S. and Singh, A., 2012, December. Data theft prevention & endpoint protection from
unauthorized USB devices—Implementation. In Advanced Computing (ICoAC), 2012 Fourth
International Conference on (pp. 1-4). IEEE.
ETHICS AND PROFESSIONAL PRACTICE
Parsons, P.J., 2016. Ethics in public relations: A guide to best practice. Kogan Page Publishers.
Rogers, W. and Braunack-Mayer, A., 2015. General practice ethics: inter-professional
responsibilities. Australian family physician, 44(7), p.519.
Verma, S. and Singh, A., 2012, December. Data theft prevention & endpoint protection from
unauthorized USB devices—Implementation. In Advanced Computing (ICoAC), 2012 Fourth
International Conference on (pp. 1-4). IEEE.
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.