This assignment delves into the complex world of ethics and issues in computing. Students are tasked with analyzing various ethical challenges posed by technological advancements, drawing upon a range of provided sources. The focus is on understanding the implications of technology for individuals, society, and professional practice.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
PROFESSIONAL ISSUES, ETHICS AND COMPUTER LAW
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION The government of United States has framed some rules and regulation which are framed for securing the confidential information in interest of the country. CIA is the foreign intelligence service which maintains privacy and confidentiality to keep the information secretly and not to disclosed that data in public. The present report focuses on Wikileaks which is the non profit making organization and is engaged in the business of publishing secret information. The founder of this organization is Julian Assange who leaks information which is considered as illegal or fraud in eyes of law (Hunt and Mehta, 2013). He had leaked nine thousand files from high security network. They used different tools for this purpose that is produced by Apple, Samsung and Microsoft. 1. Legal issues. According to laws which are framed bygovernment of United States, organization are not able to disclose information which are kept by the legal authorities. (Silberman, Irani and Ross, 2010). As per the given scenario, Wikileaks have to take prior permission of CIA to use information or data and disclosed them to public. The CIA's hacking operation has used various types of tool which has helped in disclosing information. The company stole approx nine thousand files of CIA from the network security which were confidential in the interest of the country. In this case, various types of legal issues have been witnessed which have affected to the existence.CIA is having their own rules, regulation and policies on which no other organization are able intervene.. They are required to frame some accurate policies through which no country can take information which is illegal according to laws of government. Organization has to follow those rules and regulation which are imposed on them. As per those legal bindings, no company is able to disclose any information in public which are of the interest of public (Jacob, Decker and Lugg, 2016). They have to follow them in the efficient manner. Nine thousand files disclosed in the public were illegal. The Central intelligence agencies are facing complications after the act which is done by Wikileaks. The act involves published privacy and confidential document with the help of tools which can break into phones and further types of electronic devices. Thousands of documents which are
leaked consists information which are in the interest of people. The leak name called Vault 7 by the non profit organization which is Wikileaks (Weiss, 2014). Through this, question can be raised which are able to protect and safeguarding private document in the digital age. The things which are involved in the document are as follows: ď‚·The hackers of CIA have targeted computers, phones and other electronic devises. ď‚·Information which are related with interest of people. For the same purpose, CIA is able to file case against Wikileaks to claim damages which is caused by them due to leaking information in the public (Gibb, Thornley, Ferguson and Weckert, 2011). Wikileaks is the non profit making organization which able to published information in public which are kept secret. CIA is the legal authority which have their own rules and regulation have to be follow by all firms and enterprises. The agencies have been using the hacking tool like malware, remote control system, viruses and trojans. They help them to disclose data which are needs to be kept by the organization.In order to conducting electronic surveillance is the act which is prohibited by the CIA which are able to having impact on the individual person. The main aim of this agency is to gather foreign intelligence of overseas to protect country from terrorist which are having on the environment of the country and bot able to maintain peaceful country as well. They have to use innovative and opted various types of inventions which are able to protect the America from enemies. The protection which they provide to the country is they deserve to get(Buchanan, Aycock, Dexter, Dittrich and Hvizdak, 2011). The country is deeply in trouble with the data which is disclosed by the agencies. They have to follow some rules and regulation which are imposed on them and have tom liable to follow in the well and efficient manner. The act has been done on March, 2017 by the Wikileaks. The documents which they leaks are largest confidential and have to be kept in the secret manner. 2. Social issues. Wikileaks is the largest intelligence agency of US which help to disclosed information and try to introduce them in the public. It plays a vital role in the entire world and act as a whistle blowing in world wide. It will be consider as largest influential news outlet in all over the world (Connolly, 2011). It plays an significant role in the legal authorities and whistle
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
blower. The thousands of document which are released by the Wikileaks are the most private and confidential in nature. This process is having impact on the public which are lived in the country.Itcreatelotsofsocialissueswhichhavingimpactontheentirebusiness organization. Social issues are those which influences the number of people within the country. In this concept various types of conflicts has been arises (Masters, 2015). There are growing concern that different persons having different perception through which complications are arises. Lack of proper sanitation is the major problem able to create social issues. This concept is having not able to improve the standard of people. Some important points which are involve in the present scenario: CIA hacking tool(Vault 7 )- Wikileaks is the intelligence agency of United States central. It can able to published confidential document which are kept secret by the different types of agencies. Disclosed document which are kept in the safe and private security. Dark matter(Vault 7)- This concept contain documentation of several CIA projects which are related with the Apple Mac (Liu and Yang, 2012). These documents are helpful in defining techniques which are used by the CIA. Some important which are involve in the given scenario are as aligned below: ď‚·Wikileaks is the largest non profit company which engaged in the business of published private and confidential information in public. ď‚·This act can be performed by the in the interest of people. ď‚·CIA stands for Central Intelligence Agency having their own rules, regulation and policies in relation with privacy and confidentiality. ď‚·They released nine thousand files which are kept in the high security network. ď‚·Through this concept people are feeling safe and secure. This is clearly having impact on their life. ď‚·For the same purpose organization needs to use some hacking tools which includes malware, viruses, remote control system and trojans. These tools are having impact on the entire business organization (Akhavan, Ramezan and Yazdi Moghaddam,2013). Various functions are affected with this system and try to maintain performance as well.
ď‚·These tools have been directed at hacking domestic products which are made by Apple, Samsung and Microsoft. ď‚·The government of United States is responsible to frame some rules and regulation which are related with discloser of important information or data. According to law this concept is not enforceable by law which is consider as illegal as per the various types and policies and procedures. ď‚·Through this the performance of people are also having impact. When the information is disclose among the country then they feel unsafe and unsecure. ď‚·They have to use advance technological tools for the stated purpose in order to disclose information in public. Through this they can introduce people and about privacy and confidential information and data. ď‚·Through this lots of business organization are affected which having impact on their performance and work quality as well. They needs to frame their own rules and regulation and to use them as well. CIA needs to frame some policies, plans and procedures and have to implement them in the effective manner and try to improve when it is require. Have to opted important rules which are able to improve their performance and try to increase their work efficiency as well. ď‚·But those rules and procedures are not effect the performance or standard of living of people. When ever document are disclosed in the country which are needs to kept in the interest of people by the agencies after that people not feeling safe and secure as they think their important information has been disclosed in front of others. ď‚·The act which is done by the Wikileaks is not enforceable by law so that it is able to create legal issues (Liu and Yang, 2012). Also it having on the people so that, it also create social issuers which having influence the entire country. 3. Ethical issues. The conflict or the effective solution which requires by the person or the company in order to select among different alternatives that can be evaluated either right or wrong. The right is considered as ethical or wrong is stated as unethical. Ethical issues which are created due to any reason have to be easily solved with the help of effective planning and procedures.
Every company must face these issues during their existence and try to resolve them as well through providing best possible solution for the same. As per thescenario, in March, 2017 9000 file of CIA has been reveal by the Wikileaks which are related withimportant data (Professional Issues, Ethics And Computer Law. 2017). Companies are able to hacking files with the help of different types of toolsi.e. malware, remote control system and much more. With the help ofthis they are able to hacking data and which are directed by the Apple, Samsung and Microsoft. For the same reason legal authorityof US needs to frame some legal rules, laws and act which are relevant with the hacking performance of firms which are performed by agencies forimprove their performance and introduce people the important data. CONCLUSION On the basis of above report it has been concluded that,Wikileaks is the non profit organizationwhich is engaged in the business of published private and confidential information in public. They disclosed nine thousand files which are kept in the high security network. Government of United States frame some rules and regulation which are having impact on the performance of companies which are related with the discloser of data. Those rules, regulation and policies are have to be follow by entire country and able to maintain their performance as well. CIA stands for Central Intelligence Agencies which is able frame their own policies and rules and have to follow by entire members and firms as well. This process is able to create social issues, ethical issues and legal issues. REFERENCES Books and Journals Hunt, G. and Mehta, M. eds., 2013.Nanotechnology:" Risk, Ethics and Law". Routledge. Silberman,M.,Irani,L.andRoss,J.,2010.Ethicsandtacticsofprofessional crowdwork.XRDS: Crossroads, The ACM Magazine for Students.17(2). pp.39-43. Jacob, S., Decker, D.M. and Lugg, E.T., 2016.Ethics and law for school psychologists. John Wiley & Sons. Weiss, J.W., 2014.Business ethics: A stakeholder and issues management approach. Berrett- Koehler Publishers.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Gibb, F., Thornley, C., Ferguson, S. and Weckert, J., 2011. The application of RFIDs in libraries:anassessmentoftechnological,managementandprofessional issues.International Journal of Information Management.31(3). pp.244-251. Buchanan, E., Aycock, J., Dexter, S., Dittrich, D. and Hvizdak, E., 2011. Computer science security research and human subjects: Emerging considerations for research ethics boards.Journal of Empirical Research on Human Research Ethics.6(2). pp.71-83. Connolly, R.W., 2011, June. Beyond good and evil impacts: rethinking the social issues components in our computing curricula. InProceedings of the 16th annual joint conference on Innovation and technology in computer science education(pp. 228- 232). ACM. Masters, K., 2015.Role development in professional nursing practice. Jones & Bartlett Publishers. Liu, C.J. and Yang, S.C., 2012. Applying the practical inquiry model to investigate the quality of students’ online discourse in an information ethics course based on Bloom’steachinggoalandBird’s3Cmodel.Computers&Education.59(2). pp.466-480. Liu, C.J. and Yang, S.C., 2012. Applying the practical inquiry model to investigate the quality of students’ online discourse in an information ethics course based on Bloom’steachinggoalandBird’s3Cmodel.Computers&Education.59(2). pp.466-480. Akhavan, P., Ramezan, M. and Yazdi Moghaddam, J., 2013. Examining the role of ethics in knowledge management process: Case study: An industrial organization.Journal of Knowledge-Based Innovation in China.5(2). pp.129-145. Online ProfessionalIssues,EthicsAndComputerLaw.2017.[Online.]Availablethrough: <https://myassignmenthelp.com/free-samples/professional-issues-ethics-and- computer-law> [Accessed on 9thMay, 2017].