Ethics and Issues in Computing
VerifiedAdded on 2020/01/07
|8
|2470
|153
Literature Review
AI Summary
This assignment delves into the complex world of ethics and issues in computing. Students are tasked with analyzing various ethical challenges posed by technological advancements, drawing upon a range of provided sources. The focus is on understanding the implications of technology for individuals, society, and professional practice.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
PROFESSIONAL ISSUES,
ETHICS AND COMPUTER
LAW
ETHICS AND COMPUTER
LAW
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION....................................................................................................................................................3
TASK 1.....................................................................................................................................................................3
1. Legal issues.....................................................................................................................................................3
TASK 2.....................................................................................................................................................................5
2. Social issues....................................................................................................................................................5
TASK 3.....................................................................................................................................................................7
3. Ethical issues...................................................................................................................................................7
CONCLUSION........................................................................................................................................................7
REFERENCES.........................................................................................................................................................8
INTRODUCTION....................................................................................................................................................3
TASK 1.....................................................................................................................................................................3
1. Legal issues.....................................................................................................................................................3
TASK 2.....................................................................................................................................................................5
2. Social issues....................................................................................................................................................5
TASK 3.....................................................................................................................................................................7
3. Ethical issues...................................................................................................................................................7
CONCLUSION........................................................................................................................................................7
REFERENCES.........................................................................................................................................................8
INTRODUCTION
The government of United States has framed some rules and regulation which are
framed for securing the confidential information in interest of the country. CIA is the foreign
intelligence service which maintains privacy and confidentiality to keep the information
secretly and not to disclosed that data in public. The present report focuses on Wikileaks
which is the non profit making organization and is engaged in the business of publishing
secret information. The founder of this organization is Julian Assange who leaks information
which is considered as illegal or fraud in eyes of law (Hunt and Mehta, 2013). He had leaked
nine thousand files from high security network. They used different tools for this purpose that
is produced by Apple, Samsung and Microsoft.
1. Legal issues.
According to laws which are framed by government of United States, organization
are not able to disclose information which are kept by the legal authorities. (Silberman, Irani
and Ross, 2010). As per the given scenario, Wikileaks have to take prior permission of CIA
to use information or data and disclosed them to public. The CIA's hacking operation has
used various types of tool which has helped in disclosing information. The company stole
approx nine thousand files of CIA from the network security which were confidential in the
interest of the country. In this case, various types of legal issues have been witnessed which
have affected to the existence. CIA is having their own rules, regulation and policies on
which no other organization are able intervene.. They are required to frame some accurate
policies through which no country can take information which is illegal according to laws of
government.
Organization has to follow those rules and regulation which are imposed on them. As
per those legal bindings, no company is able to disclose any information in public which are
of the interest of public (Jacob, Decker and Lugg, 2016). They have to follow them in the
efficient manner. Nine thousand files disclosed in the public were illegal. The Central
intelligence agencies are facing complications after the act which is done by Wikileaks. The
act involves published privacy and confidential document with the help of tools which can
break into phones and further types of electronic devices. Thousands of documents which are
The government of United States has framed some rules and regulation which are
framed for securing the confidential information in interest of the country. CIA is the foreign
intelligence service which maintains privacy and confidentiality to keep the information
secretly and not to disclosed that data in public. The present report focuses on Wikileaks
which is the non profit making organization and is engaged in the business of publishing
secret information. The founder of this organization is Julian Assange who leaks information
which is considered as illegal or fraud in eyes of law (Hunt and Mehta, 2013). He had leaked
nine thousand files from high security network. They used different tools for this purpose that
is produced by Apple, Samsung and Microsoft.
1. Legal issues.
According to laws which are framed by government of United States, organization
are not able to disclose information which are kept by the legal authorities. (Silberman, Irani
and Ross, 2010). As per the given scenario, Wikileaks have to take prior permission of CIA
to use information or data and disclosed them to public. The CIA's hacking operation has
used various types of tool which has helped in disclosing information. The company stole
approx nine thousand files of CIA from the network security which were confidential in the
interest of the country. In this case, various types of legal issues have been witnessed which
have affected to the existence. CIA is having their own rules, regulation and policies on
which no other organization are able intervene.. They are required to frame some accurate
policies through which no country can take information which is illegal according to laws of
government.
Organization has to follow those rules and regulation which are imposed on them. As
per those legal bindings, no company is able to disclose any information in public which are
of the interest of public (Jacob, Decker and Lugg, 2016). They have to follow them in the
efficient manner. Nine thousand files disclosed in the public were illegal. The Central
intelligence agencies are facing complications after the act which is done by Wikileaks. The
act involves published privacy and confidential document with the help of tools which can
break into phones and further types of electronic devices. Thousands of documents which are
leaked consists information which are in the interest of people. The leak name called Vault 7
by the non profit organization which is Wikileaks (Weiss, 2014). Through this, question can
be raised which are able to protect and safeguarding private document in the digital age. The
things which are involved in the document are as follows:
The hackers of CIA have targeted computers, phones and other electronic devises.
Information which are related with interest of people.
For the same purpose, CIA is able to file case against Wikileaks to claim damages which is
caused by them due to leaking information in the public (Gibb, Thornley, Ferguson and
Weckert, 2011). Wikileaks is the non profit making organization which able to published
information in public which are kept secret. CIA is the legal authority which have their own
rules and regulation have to be follow by all firms and enterprises. The agencies have been
using the hacking tool like malware, remote control system, viruses and trojans. They help
them to disclose data which are needs to be kept by the organization. In order to conducting
electronic surveillance is the act which is prohibited by the CIA which are able to having
impact on the individual person. The main aim of this agency is to gather foreign intelligence
of overseas to protect country from terrorist which are having on the environment of the
country and bot able to maintain peaceful country as well. They have to use innovative and
opted various types of inventions which are able to protect the America from enemies. The
protection which they provide to the country is they deserve to get (Buchanan, Aycock,
Dexter, Dittrich and Hvizdak, 2011). The country is deeply in trouble with the data which is
disclosed by the agencies. They have to follow some rules and regulation which are imposed
on them and have tom liable to follow in the well and efficient manner. The act has been done
on March, 2017 by the Wikileaks. The documents which they leaks are largest confidential
and have to be kept in the secret manner.
2. Social issues.
Wikileaks is the largest intelligence agency of US which help to disclosed information
and try to introduce them in the public. It plays a vital role in the entire world and act as a
whistle blowing in world wide. It will be consider as largest influential news outlet in all over
the world (Connolly, 2011). It plays an significant role in the legal authorities and whistle
by the non profit organization which is Wikileaks (Weiss, 2014). Through this, question can
be raised which are able to protect and safeguarding private document in the digital age. The
things which are involved in the document are as follows:
The hackers of CIA have targeted computers, phones and other electronic devises.
Information which are related with interest of people.
For the same purpose, CIA is able to file case against Wikileaks to claim damages which is
caused by them due to leaking information in the public (Gibb, Thornley, Ferguson and
Weckert, 2011). Wikileaks is the non profit making organization which able to published
information in public which are kept secret. CIA is the legal authority which have their own
rules and regulation have to be follow by all firms and enterprises. The agencies have been
using the hacking tool like malware, remote control system, viruses and trojans. They help
them to disclose data which are needs to be kept by the organization. In order to conducting
electronic surveillance is the act which is prohibited by the CIA which are able to having
impact on the individual person. The main aim of this agency is to gather foreign intelligence
of overseas to protect country from terrorist which are having on the environment of the
country and bot able to maintain peaceful country as well. They have to use innovative and
opted various types of inventions which are able to protect the America from enemies. The
protection which they provide to the country is they deserve to get (Buchanan, Aycock,
Dexter, Dittrich and Hvizdak, 2011). The country is deeply in trouble with the data which is
disclosed by the agencies. They have to follow some rules and regulation which are imposed
on them and have tom liable to follow in the well and efficient manner. The act has been done
on March, 2017 by the Wikileaks. The documents which they leaks are largest confidential
and have to be kept in the secret manner.
2. Social issues.
Wikileaks is the largest intelligence agency of US which help to disclosed information
and try to introduce them in the public. It plays a vital role in the entire world and act as a
whistle blowing in world wide. It will be consider as largest influential news outlet in all over
the world (Connolly, 2011). It plays an significant role in the legal authorities and whistle
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
blower. The thousands of document which are released by the Wikileaks are the most private
and confidential in nature. This process is having impact on the public which are lived in the
country. It create lots of social issues which having impact on the entire business
organization.
Social issues are those which influences the number of people within the country. In
this concept various types of conflicts has been arises (Masters, 2015). There are growing
concern that different persons having different perception through which complications are
arises. Lack of proper sanitation is the major problem able to create social issues. This
concept is having not able to improve the standard of people. Some important points which
are involve in the present scenario:
CIA hacking tool (Vault 7 )- Wikileaks is the intelligence agency of United States
central. It can able to published confidential document which are kept secret by the different
types of agencies. Disclosed document which are kept in the safe and private security.
Dark matter (Vault 7)- This concept contain documentation of several CIA projects
which are related with the Apple Mac (Liu and Yang, 2012). These documents are helpful in
defining techniques which are used by the CIA.
Some important which are involve in the given scenario are as aligned below:
Wikileaks is the largest non profit company which engaged in the business of
published private and confidential information in public.
This act can be performed by the in the interest of people.
CIA stands for Central Intelligence Agency having their own rules, regulation and
policies in relation with privacy and confidentiality.
They released nine thousand files which are kept in the high security network.
Through this concept people are feeling safe and secure. This is clearly having impact
on their life.
For the same purpose organization needs to use some hacking tools which includes
malware, viruses, remote control system and trojans. These tools are having impact on
the entire business organization (Akhavan, Ramezan and Yazdi Moghaddam, 2013).
Various functions are affected with this system and try to maintain performance as
well.
and confidential in nature. This process is having impact on the public which are lived in the
country. It create lots of social issues which having impact on the entire business
organization.
Social issues are those which influences the number of people within the country. In
this concept various types of conflicts has been arises (Masters, 2015). There are growing
concern that different persons having different perception through which complications are
arises. Lack of proper sanitation is the major problem able to create social issues. This
concept is having not able to improve the standard of people. Some important points which
are involve in the present scenario:
CIA hacking tool (Vault 7 )- Wikileaks is the intelligence agency of United States
central. It can able to published confidential document which are kept secret by the different
types of agencies. Disclosed document which are kept in the safe and private security.
Dark matter (Vault 7)- This concept contain documentation of several CIA projects
which are related with the Apple Mac (Liu and Yang, 2012). These documents are helpful in
defining techniques which are used by the CIA.
Some important which are involve in the given scenario are as aligned below:
Wikileaks is the largest non profit company which engaged in the business of
published private and confidential information in public.
This act can be performed by the in the interest of people.
CIA stands for Central Intelligence Agency having their own rules, regulation and
policies in relation with privacy and confidentiality.
They released nine thousand files which are kept in the high security network.
Through this concept people are feeling safe and secure. This is clearly having impact
on their life.
For the same purpose organization needs to use some hacking tools which includes
malware, viruses, remote control system and trojans. These tools are having impact on
the entire business organization (Akhavan, Ramezan and Yazdi Moghaddam, 2013).
Various functions are affected with this system and try to maintain performance as
well.
These tools have been directed at hacking domestic products which are made by
Apple, Samsung and Microsoft.
The government of United States is responsible to frame some rules and regulation
which are related with discloser of important information or data. According to law
this concept is not enforceable by law which is consider as illegal as per the various
types and policies and procedures.
Through this the performance of people are also having impact. When the information
is disclose among the country then they feel unsafe and unsecure.
They have to use advance technological tools for the stated purpose in order to
disclose information in public. Through this they can introduce people and about
privacy and confidential information and data.
Through this lots of business organization are affected which having impact on their
performance and work quality as well. They needs to frame their own rules and
regulation and to use them as well. CIA needs to frame some policies, plans and
procedures and have to implement them in the effective manner and try to improve
when it is require. Have to opted important rules which are able to improve their
performance and try to increase their work efficiency as well.
But those rules and procedures are not effect the performance or standard of living of
people. When ever document are disclosed in the country which are needs to kept in
the interest of people by the agencies after that people not feeling safe and secure as
they think their important information has been disclosed in front of others.
The act which is done by the Wikileaks is not enforceable by law so that it is able to
create legal issues (Liu and Yang, 2012). Also it having on the people so that, it also
create social issuers which having influence the entire country.
3. Ethical issues.
The conflict or the effective solution which requires by the person or the company in
order to select among different alternatives that can be evaluated either right or wrong. The
right is considered as ethical or wrong is stated as unethical. Ethical issues which are created
due to any reason have to be easily solved with the help of effective planning and procedures.
Apple, Samsung and Microsoft.
The government of United States is responsible to frame some rules and regulation
which are related with discloser of important information or data. According to law
this concept is not enforceable by law which is consider as illegal as per the various
types and policies and procedures.
Through this the performance of people are also having impact. When the information
is disclose among the country then they feel unsafe and unsecure.
They have to use advance technological tools for the stated purpose in order to
disclose information in public. Through this they can introduce people and about
privacy and confidential information and data.
Through this lots of business organization are affected which having impact on their
performance and work quality as well. They needs to frame their own rules and
regulation and to use them as well. CIA needs to frame some policies, plans and
procedures and have to implement them in the effective manner and try to improve
when it is require. Have to opted important rules which are able to improve their
performance and try to increase their work efficiency as well.
But those rules and procedures are not effect the performance or standard of living of
people. When ever document are disclosed in the country which are needs to kept in
the interest of people by the agencies after that people not feeling safe and secure as
they think their important information has been disclosed in front of others.
The act which is done by the Wikileaks is not enforceable by law so that it is able to
create legal issues (Liu and Yang, 2012). Also it having on the people so that, it also
create social issuers which having influence the entire country.
3. Ethical issues.
The conflict or the effective solution which requires by the person or the company in
order to select among different alternatives that can be evaluated either right or wrong. The
right is considered as ethical or wrong is stated as unethical. Ethical issues which are created
due to any reason have to be easily solved with the help of effective planning and procedures.
Every company must face these issues during their existence and try to resolve them as well
through providing best possible solution for the same. As per the scenario, in March, 2017
9000 file of CIA has been reveal by the Wikileaks which are related with important data
(Professional Issues, Ethics And Computer Law. 2017). Companies are able to hacking files
with the help of different types of tools i.e. malware, remote control system and much more.
With the help of this they are able to hacking data and which are directed by the Apple,
Samsung and Microsoft. For the same reason legal authority of US needs to frame some
legal rules, laws and act which are relevant with the hacking performance of firms which are
performed by agencies for improve their performance and introduce people the important
data.
CONCLUSION
On the basis of above report it has been concluded that, Wikileaks is the non profit
organization which is engaged in the business of published private and confidential
information in public. They disclosed nine thousand files which are kept in the high security
network. Government of United States frame some rules and regulation which are having
impact on the performance of companies which are related with the discloser of data. Those
rules, regulation and policies are have to be follow by entire country and able to maintain
their performance as well. CIA stands for Central Intelligence Agencies which is able frame
their own policies and rules and have to follow by entire members and firms as well. This
process is able to create social issues, ethical issues and legal issues.
REFERENCES
Books and Journals
Hunt, G. and Mehta, M. eds., 2013. Nanotechnology:" Risk, Ethics and Law". Routledge.
Silberman, M., Irani, L. and Ross, J., 2010. Ethics and tactics of professional
crowdwork. XRDS: Crossroads, The ACM Magazine for Students. 17(2). pp.39-43.
Jacob, S., Decker, D.M. and Lugg, E.T., 2016. Ethics and law for school psychologists. John
Wiley & Sons.
Weiss, J.W., 2014. Business ethics: A stakeholder and issues management approach. Berrett-
Koehler Publishers.
through providing best possible solution for the same. As per the scenario, in March, 2017
9000 file of CIA has been reveal by the Wikileaks which are related with important data
(Professional Issues, Ethics And Computer Law. 2017). Companies are able to hacking files
with the help of different types of tools i.e. malware, remote control system and much more.
With the help of this they are able to hacking data and which are directed by the Apple,
Samsung and Microsoft. For the same reason legal authority of US needs to frame some
legal rules, laws and act which are relevant with the hacking performance of firms which are
performed by agencies for improve their performance and introduce people the important
data.
CONCLUSION
On the basis of above report it has been concluded that, Wikileaks is the non profit
organization which is engaged in the business of published private and confidential
information in public. They disclosed nine thousand files which are kept in the high security
network. Government of United States frame some rules and regulation which are having
impact on the performance of companies which are related with the discloser of data. Those
rules, regulation and policies are have to be follow by entire country and able to maintain
their performance as well. CIA stands for Central Intelligence Agencies which is able frame
their own policies and rules and have to follow by entire members and firms as well. This
process is able to create social issues, ethical issues and legal issues.
REFERENCES
Books and Journals
Hunt, G. and Mehta, M. eds., 2013. Nanotechnology:" Risk, Ethics and Law". Routledge.
Silberman, M., Irani, L. and Ross, J., 2010. Ethics and tactics of professional
crowdwork. XRDS: Crossroads, The ACM Magazine for Students. 17(2). pp.39-43.
Jacob, S., Decker, D.M. and Lugg, E.T., 2016. Ethics and law for school psychologists. John
Wiley & Sons.
Weiss, J.W., 2014. Business ethics: A stakeholder and issues management approach. Berrett-
Koehler Publishers.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Gibb, F., Thornley, C., Ferguson, S. and Weckert, J., 2011. The application of RFIDs in
libraries: an assessment of technological, management and professional
issues. International Journal of Information Management. 31(3). pp.244-251.
Buchanan, E., Aycock, J., Dexter, S., Dittrich, D. and Hvizdak, E., 2011. Computer science
security research and human subjects: Emerging considerations for research ethics
boards. Journal of Empirical Research on Human Research Ethics. 6(2). pp.71-83.
Connolly, R.W., 2011, June. Beyond good and evil impacts: rethinking the social issues
components in our computing curricula. In Proceedings of the 16th annual joint
conference on Innovation and technology in computer science education (pp. 228-
232). ACM.
Masters, K., 2015. Role development in professional nursing practice. Jones & Bartlett
Publishers.
Liu, C.J. and Yang, S.C., 2012. Applying the practical inquiry model to investigate the
quality of students’ online discourse in an information ethics course based on
Bloom’s teaching goal and Bird’s 3C model. Computers & Education. 59(2).
pp.466-480.
Liu, C.J. and Yang, S.C., 2012. Applying the practical inquiry model to investigate the
quality of students’ online discourse in an information ethics course based on
Bloom’s teaching goal and Bird’s 3C model. Computers & Education. 59(2).
pp.466-480.
Akhavan, P., Ramezan, M. and Yazdi Moghaddam, J., 2013. Examining the role of ethics in
knowledge management process: Case study: An industrial organization. Journal of
Knowledge-Based Innovation in China. 5(2). pp.129-145.
Online
Professional Issues, Ethics And Computer Law. 2017. [Online.] Available through:
<https://myassignmenthelp.com/free-samples/professional-issues-ethics-and-
computer-law> [Accessed on 9th May, 2017].
libraries: an assessment of technological, management and professional
issues. International Journal of Information Management. 31(3). pp.244-251.
Buchanan, E., Aycock, J., Dexter, S., Dittrich, D. and Hvizdak, E., 2011. Computer science
security research and human subjects: Emerging considerations for research ethics
boards. Journal of Empirical Research on Human Research Ethics. 6(2). pp.71-83.
Connolly, R.W., 2011, June. Beyond good and evil impacts: rethinking the social issues
components in our computing curricula. In Proceedings of the 16th annual joint
conference on Innovation and technology in computer science education (pp. 228-
232). ACM.
Masters, K., 2015. Role development in professional nursing practice. Jones & Bartlett
Publishers.
Liu, C.J. and Yang, S.C., 2012. Applying the practical inquiry model to investigate the
quality of students’ online discourse in an information ethics course based on
Bloom’s teaching goal and Bird’s 3C model. Computers & Education. 59(2).
pp.466-480.
Liu, C.J. and Yang, S.C., 2012. Applying the practical inquiry model to investigate the
quality of students’ online discourse in an information ethics course based on
Bloom’s teaching goal and Bird’s 3C model. Computers & Education. 59(2).
pp.466-480.
Akhavan, P., Ramezan, M. and Yazdi Moghaddam, J., 2013. Examining the role of ethics in
knowledge management process: Case study: An industrial organization. Journal of
Knowledge-Based Innovation in China. 5(2). pp.129-145.
Online
Professional Issues, Ethics And Computer Law. 2017. [Online.] Available through:
<https://myassignmenthelp.com/free-samples/professional-issues-ethics-and-
computer-law> [Accessed on 9th May, 2017].
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.