Title of your news/case study Title of news/case study SCHOOL OF COMPUTING AND MATHS Title of your news/case study Assessment Item 3: Rational Arguments Your Name Student Number Word Count: Overview...

1 answer below »
plz find attached files for question


Title of your news/case study Title of news/case study SCHOOL OF COMPUTING AND MATHS Title of your news/case study Assessment Item 3: Rational Arguments Your Name Student Number Word Count: Overview Summary about the news/case study. Just one short paragraph. Words will not count for this section. Utilize your words for Task 2. Task 1 : Argument Visualisation Copy argument visualisation here as image. Words will not count for this section. See sample argument visualization from resources section. Also submit separate pdf as well for argument visualisation. Task 2 : Applying Ethical Theories (2000 words) Try to use equal word limit for all ethical theories. 1. Utilitarianism Theory 2. Deontology Theory 3. Virtue Theory 4. Contract Theory 5. Conclusion References References must also be cited within text. Do not remove the following marking sheet.(For lecturer use only) Criteria Standards Obtained Marks Argument Visualisation 8 Marks HD: Argument visualisation features and structures are used to convey meaning effectively, concisely, unambiguously using appropriate visualisation techniques with no argument construction errors. No mistakes in grammar or spelling. (6.80-8.00) DI: Well-developed skills in expression and presentation of visual arguments. Visualisation style appropriate to assessment task. Grammar and spelling accurate. (6.00-6.79) CR: Good skills in expression and clear presentation of visual arguments. Visualisation style appropriate to assessment task. Grammar and spelling contain a few minor errors. (5.20-5.99) PS: The visualisation contains frequent errors in spelling, grammar, word choice, and the structure lacks clarity and is not concise, but the meaning is apparent to the reader with some effort. (4.00-5.19) FL: Rudimentary skills in expression & presentation of visual arguments. Not all material is relevant and/or is presented in a disorganised manner. Meaning apparent, but visualisation style not well organised. Grammar and spelling contain many errors. (0.00-3.99) Application of Classical Ethical Theory 12 Marks HD: All relevant ethical theories are appropriately applied to the ethical issue/issues being analysed. Reasons and objections are correctly presented. (10.20-12.00) DI: All relevant ethical theories are mostly appropriately applied. Minor omissions only. Reasons and objections are mostly correctly presented. Minor omissions only. (9.00-10.19)  CR: Makes a genuine attempt at applying the ethical theories to the analysis of the ethical issue/issues. (7.80-8.99)  PS: The ethical theories do not link well with the analysis of the ethical issue/issues presented. (6.00-7.79) FL: The ethical theories are inadequately or inappropriately applied to the analysis of the ethical issue/issues presented. (0.00-5.99) Tone and purpose of written communication. Conformity to scholarly writing requirements. 2 Marks HD: The tone and style is exemplary and is appropriate to the content of the scholarly review. (1.70-2.00) DI: Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling. (1.50-1.69) CR: Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only. (1.30-1.49) PS: Writing style not always fluent or well organised and grammar and spelling contain errors. (1.00-1.29) FL: Writing style not fluent or well-organised, and many grammatical and spelling mistakes. (0.00-0.99) Conclusion 2 Marks HD: Superior conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. (1.70-2.00) DI: Very high standard conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. (1.50-1.69) CR: High standard conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. Some omissions. (1.30-1.49) PS: Rudimentary conclusion that provides a convincing argument. (1.00-1.29) FL: Sub-standard (or no) conclusion. (0.00-0.99) Referencing 1 Mark HD: Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions. (0.85-1.00) DI: Very good referencing, including reference list and citations. Evidence of high quality references. (0.75-0.84) CR: Good referencing, including reference list and citations. Evidence of good quality references. (0.65-0.74) PS: Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some errors or omissions in style and formatting choices (e.g. italics, punctuation, etc) don’t impact on the transparency and traceability of the source, or demonstration of academic integrity. (0.50-0.64) FL: Sub-standard (or no) referencing. Poor quality (or no) references. (0.00-0.49) Total /25   Your Name
Answered 4 days AfterJan 12, 2021ITC506Charles Sturt University

Answer To: Title of your news/case study Title of news/case study SCHOOL OF COMPUTING AND MATHS Title of your...

Swapnil answered on Jan 16 2021
146 Votes
As Artificial Intelligence is on boom nowadays so are the risks also. Criminals are using Artificial intelligence to do crimes and they so vigorous that we even can't think of it. For example, the captcha we are filling to authenticate ourselves as we are human beings, this is also done by bots and this activity leads to cyber-attack which is called as Distributed Denial of Service attack and this crashes the whole website and alters the functionality of the victim's website and intentionally done by criminal to represent false image of victim. Whenever the ICT is usable then the most of the ethical issues will get affects and these are personal privacy, access right, harmful actions, trade secrets, liability and piracy. The ethical implications can be considered as impact of psychological research of other people to the wider context. This might be including the informed consent, anonymity and confidentiality, respect for privacy etc.
Argument Visualization:
Cyber criminals can employ the AI to help with effectiveness of social engineering attacks. The AI can learn to identifying the network patterns and behaviour and understanding the way to convince to the video or call and even email. So that is legitimate then persuading them to compromise networks and fork with other data and network system. All the social techniques can be cyber criminals currently employ might be improved with assistance with artificial intelligence.
The AI will usable to the fresh vulnerabilities in network areas and also it will help to the devices and applications to emerging day by day. They are rapidly identifying opportunities for human hackers, the work of keeping information system secured with networks. And it is formed as tougher to the monitoring of access and activity to the network. It also includes the patching to clear the threats. The simple policy is that they fight fire with fire in networking.
There are basically different solutions provide the ethical issues and that can be identifying the problem as we can see. When gathering the data, we need to solve the story straight to a regulatory issues and it always process the issue related to the regulatory requirements. Again we have to compare the issue with the ethical hacking technique. So that we can identify the power of control the situation. It is important know that what are the publications are available to the professionals and apply these concepts to the actual practice of that profession. Critical thinking has plays the role in ethics because the process by which we use to determine the critical thinking to the forming of analysis and it should be identifying the unknown problems. When we work onto the ethical theories of ethics that has been provide the information like utilitarian ethics, deontological ethics and virtue ethics.
Utilitarianism Theory:
According to the utilitarianism, the appraisal of any action is a function of the utility
consequences of that action. i. e. the sum of total of being produced. Utilitarianism is a strictly maximising theory. It will take the right action one that maximise to the aggregate. In action of utilitarianism that produces a gain to well-boing to a previous state of the world. The guiding action will take place a utilitarianism prescribes the aggregate to expected utility. The cyber security provides the average of utility. The action could cause the possible state. Utilitarianism implies the opposite case to the cyber security world. No matter how valuable is utilitarianism the life of small damages will give the inflicted to a group will count the large group of utilitarianism. The utilitarianism more plausible than maximum that in everyday life that should give the cyber security policy into the world of artificial intelligence. If you consider...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here