interact.csu.edu.au/sakai-msi-tool/cont...ectView=true&siteId=ITC506_201830_SM_I

1 answer below »
please help me with the assessment 3 in thepdf


interact.csu.edu.au/sakai-msi-tool/cont...ectView=true&siteId=ITC506_201830_SM_I
Answered Same DayMay 03, 2020ITC556Charles Sturt University

Answer To: interact.csu.edu.au/sakai-msi-tool/cont...ectView=true&siteId=ITC506_201830_SM_I

Perla answered on May 07 2020
142 Votes
Title of your news/case study
Ethics in using a hacking site and a professional hacker
    SCHOOL OF COMPUTING AND MATHS, Charles Sturt University
     Ethics in using a hacking site and employing a professional hacker
    Assignment 3: Applying Ethical Theory
    
    Your Name
    Student Number
    Word Count: 1258 ( Excluding referen
ces and title sheets)
Introduction:
For any professional, while working in his domain, there is need to be in compliance with the professional and ethical code of conduct voluntarily. Though there are several associations working to enforce professional code of ethics, the best results of enforcement can be obtained only when there is totally ethical compliance of the person to the said ethics by himself voluntarily. Information technology usage for diverse operational requirements is quite natural, however the legitimacy of the usage of the technology for the intended requirements will finally will decide whether the functions are being employed effectively or not. Ethical compliance in the operations will finally decide the integrity of the total operations of the chosen activity. Inorder to decide the ethical validation of an activity and to decide the total compliance of the activity with the ethical code of conduct there is need to work out comprehensive evaluation of the process dynamics with respect to variety of ethical theories existing. The following part of the report is focussed on critical evaluation of a particular media report on lending professional hackers in Australia. This activity is evaluated by applying variety of ethical theories and the findings of the same are presented here in the following part of the report. The current media article
indicates that there are several Australians hiring the services of the professional hackers from a hacking site for variety of requirements, ranging from spying on the wife, working out to find the customer activities, also there are several instances of customers working for to find just their lost passwords and user ids etc. In this connection the following ethical theories application employed to evaluate the process in detail and the findings are used to conclude the task and its ethical validity.
Utilitarianism theory:
Utilitarianism theory indicates that the greatest amount of happiness should be the end outcome for all the government and non- government operations and activities. In the current context the greatest happiness possible with the current discussion is not actually associated with all the stakeholders of the society. For example when someone is spying on the competitor and their business activities, the actual spy will be getting benefit by having an insight into the procedures and the operations which the competitor is involved in. However still there is no such thing like happiness to all concerned. The competitor who is genuinely interested in his own business and who is operating legitimately is losing his business and hence it is not actually there in unison with the utilitarian theory. There is no happiness to all in this connection there are few stakeholder due to involvement of illegal and unethical practices are getting benefit out of the situation and hence is not an ethically valid activity and hence is condemned(Broad,2014).
Deontology theory
It is a normative ethical theory and will decide that the ethics of an action based on the rules of the duty. It will be informed whether the given action is right or not in...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here