logo

The history of the different countries

7 Pages1466 Words11 Views
   

Added on  2022-09-02

The history of the different countries

   Added on 2022-09-02

ShareRelated Documents
Running head: ACS CODE OF PROFESSIONAL CONDUCT
ACS CODE OF PROFESSIONAL CONDUCT
Name of the Student
Name of the University
Author Note
The history of the different countries_1
ACS CODE OF PROFESSIONAL CONDUCT2
Table of Contents
Introduction................................................................................................................................3
Identification and Analysis of Ethical Dilemma........................................................................3
Recommendations......................................................................................................................6
References..................................................................................................................................7
The history of the different countries_2
ACS CODE OF PROFESSIONAL CONDUCT3
Introduction
Now a days, technology is changing every single day and with new technology, new
challenges arise with it. One of the main challenges of today’s software development process
is to keep that secure from unwanted hands. For keeping the data or software private
encryption plays the main role in the development of the software (Singh & Kaur, 2015).
This Report discusses about the ethical issue in early launching of a new software product
(Willis projetct) from its deadline and without any encryption. In this case, a company is
wanting its project leader to deliver a software project one month earlier by skipping the
encryption part so the company can take over new upcoming projects. However the project
leader and his team members strongly believe that the project on which they are working
cannot be completed without encryption. This report also discusses about the violation of the
ICT (information and communication technology) and ACS (Australian Computer Society)
ethics and professional conduct in the following case study (Gotterbarn, 2013).
Identification and Analysis of Ethical Dilemma
Encryption is the methodology of transforming plain or simple information in cipher
texts in a way that no information get reveal by seeing cipher texts. The encryption follows a
particular algorithm for the transformation. From way past, encryption has always been used
for protecting the secrecy of any object or communication. The history of the different
countries has witnessed the era of encryption during the World War II, when the German and
Japanese encryption system were defeated by USA government. Creaser Cipher was the
mostly used encryption method from back then to till now (Deshmukh, Pasha & Qureshi,
2013). The main purpose of encryption is to provide protection to the confidentiality of the
software, integrity, authentication and privacy for software or information.
ICT is the enhanced term of IT that works with many present technologies like big
data, nanotechnology and biotechnology. The increase in using ICT results in digitization of
The history of the different countries_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Doing Ethics Technique Assignment Sample
|6
|1450
|110

Computer-Supported Cooperative Work & Social Computing
|10
|2274
|18

Information Technology Ethics Case Study 2022
|9
|1971
|19

IT Ethics In Professional Life
|10
|2023
|23

Ethical Dilemma in Scenario 3: Early Launch
|8
|1182
|254

Doing Ethics Technique Assignment
|5
|1198
|78