ACS code of professional conduct
ACS code of professional conduct
- ACS code of professional conduct
Value: 13%
Due date: 23-Apr-2016
Length: 800 words
Submission method options
Alternative submission method
Task
Proceed according to the following instructions.
-
- Use the same ethical dilemma or ethically questionable situation that you identified in your first assignment.
- Undertake further research about your chosen case to assist you in analysing and discussing it in your essay.
- Analyse the ethical dilemma using the Australian Computer Society Code of Professional Conduct, The word limit is 800 words ± 10%. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicate in brackets the word count of your assignment excluding those items mentioned above.
- Make a recommendation on the basis of your analysis providing reasons for this recommendation
- Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at least THREE (3) quality academic references from different sources. Please note that these three references are in addition to those provided to you through this subject (for example, you still must reference, the ACS code, Tavani, the Interact subject lecture notes etc BUT these references cannot be used as one of your three quality references from different sources). Only use references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.
NOTE: Format your assignment according to the instructions given in the Assessment Information, Presentation section.
Rationale
The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
-
- apply the ACS Code of Conduct to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
- make a recommendation on the basis of your analysis using the ACS Code of Conduct
- apply proper academic referencing.
Marking criteria
The following marking sheet will be used to assess students’ submissions.
Please check that you have met all the criteria before you submit your assignment.
Criteria | Standards | ||||
High Distinction (HD) | Distinction (DI) | Credit (CR) | Pass (PS) | Fail (FL) | |
Analysis of the ethical dilemma using the ACS Code of Conduct | Correctly maps the ethical issues within the case to the right sections of the Code (including section numbers).Explains the link between the ethical issues and the elements of the Code supported by evidence from the literature.
Makes a convincing recommendation and justifies it using supporting arguments based on the literature.
Demonstrates solid understanding of the Code. |
Adequately maps the ethical issues within the case to the correct sections of the Code (including section numbers).Explains the link between the ethical issues and the elements of the Code.
The recommendation made is reasonable and is supported with a justification
Demonstrates a good understanding of the Code. |
Makes a genuine attempt at mapping the ethical issues within the case to the correct sections of the Code (including section numbers).Explains to some extent the link between the ethical issues and the elements of the Code.
The recommendation made makes sense and an attempt is made to support it with a justification. |
Few ethical issues within the case are correctly mapped to the right sections of the Code (including section numbers).The analysis does not explain well the link between the ethical issues and the elements of the Code.
The recommendation made makes sense but is not supported with a justification
|
Incorrectly maps the ethical issues within the case to the sections of the Code (including section numbers).The analysis of the ethical issues in light of the elements of the Code is poor.
The recommendation made makes no sense |
Writing & structure | Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation errors. | Well developed skills in expression & presentation of ideas. Fluent writing style appropriate to assessment task/document type. Grammar & spelling accurate. |
Good skills in expression & clear presentation of ideas. Mostly fluent writing style appropriate to assessment task/document type. Grammar & spelling contains a few minor errors. |
The text contains frequent errors in spelling, grammar, word choice, and structure, lacks clarity, and is not concise, but the meaning is apparent to the reader with some effort. | Rudimentary skills in expression & presentation of ideas. Not all material is relevant &/or is presented in a disorganised manner. Meaning apparent, but writing style not fluent or well organised. Grammar & spelling contains many errors. |
Referencing | Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions. | Very good referencing, including reference list and citations. High quality references. |
Good referencing, including reference list and citations. Good quality references. |
Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some minor errors or omissions in style and formatting choices (e.g. italics, punctuation, etc) don’t impact on the transparency and traceability of the source, or demonstration of academic integrity. | Sub-standard (or no) referencing. Poor quality (or no) references. |
Ethical Issues faced in ICT Matters
Name of the student:
Name of the university:
Table of Contents
- Introduction. 2
- Identification of the ICT ethical issue. 2
- Doing Ethics Technique (DET) 3
3.1 Identifying the ethical issues involved. 3
3.2 Assessment of the the implications of the ethical issues. 3
3.3 Developing solutions to the issues. 4
Conclusion. 5
References. 6
Introduction
The thinking code and behavior that has been governed by combining the legal and moral standards is termed as Ethics (Sampson & Makela, 2014). The ICT businesses depend on the extension of the code of conduct which relates the organization with the taken action.
This paper reflects the issues regarding hacking by the North Korean cyber criminals in the mobile phones of South Korean security professionals. The article also makes a summary of the Doing Ethics Techniques (DET) for identification of the ethical issues and its implications. Moreover, it also develops the suitable solutions to the problems for the purpose of overcoming it.
2. Identification of the ICT ethical issue
South Korea has claimed recently in this year 2016 that North Korea had succeeded to hack the 40 mobile phones of their national security professionals resulting in a massive threat to the entire nation. The members of the South Korea’s National Intelligence Service also told that North Korea tried to attack the control of the transport system of them by hacking into the email accounts of the railway workers (NDTV Gadgets360.com, 2016). Although the attempt got failed as the security personnel became aware of the attack in time and was able to close off their email accounts with immediate effect. The government of North Korea openly denied that it has conducted such cyber attacks on their neighbor’s system.
3. Doing Ethics Technique (DET)
3.1 Identifying the ethical issues involved
The information stored in the mobile phones of the national security professionals are considered to be of extreme importance as they give a clear picture of the defense structure of South Korea. The communication between the security guards and their superior authority over the phones are very much confidential as its subjected to the planning of the defense structure of the entire nation and its parliament members (Schulz, Isabwe & Reichert, 2015). The attempt to attack in the email ids of railway workers are also again an ethical issue. The emails contained in the ids are based on the functioning of the control system of the entire nation’s transport system. In both the cases, information or its location or email of the volunteers are hacked or tried to hack (Shin, 2015). Here one of the issues that come into the picture using the cyber crime is the ethical hacking.
3.2 Assessment of the the implications of the ethical issues
Identifying the privacy of the mobile phone communications and emails is termed as the ICT ethical issues that makes the implications of ethics. Such attempts of hacking user’s personal information lead to the blending of the existing ethics (Stahl, 2013). After the analysis of the ethical dilemma regarding tampering the mobile phones of the security professionals and attempt to intrude the control systems of the transport structure by hacking the email ids, it has been identified that the government officials have been severely affected as they can not fully trust on their defense structure.
They have realized that such cyber attack has successfully conducted on the mobile phones of the security professionals that can lead to a sudden attack by the North Korea on the South as they can plan to enter for subjugating the nation through the utilization of the loopholes in their security (van Weert & Munro, 2013). They have also learned from the attempt to attack the transport system, which sudden invasion through cyber communication can break the entire railway transport communication system of South Korea by the North.
3.3 Developing solutions to the issues
Enhancing the network security – The security level of the nation’s system including the telecommunications and internet should be appropriately increased so that no such external intrusion can take place in future (Stahl, 2013). Each and every device in the network should be scanned in regular intervals to check for the existence of suspicious items or malware.
Introducing new encryption process – New procedures regarding encryption should be assimilated in the system of defense and transport so that whenever data gets transmitted between the mobile phones of the security personnel or the railway workers, it goes through in an encrypted format, not readable by any external authority.
Providing training to the IT and Telecom professionals – An extensive training session should be conducted to educate the Telecom and IT professionals of South Korea so that they can become more flexible in tracking the network traffic of the mobile communications of the defense system as well as the data communications through the email ids of the transport professionals (Shin, 2015). Training should be given to providing a more secure and safe architecture for the mobile phones and email ids.
Conclusion
From the above statements, it can be concluded that the ethical issues in the mobile communication system of the defense professionals and email system of the transport experts have led to a sudden attack by the rival neighbor. The intruders were able to get valuable information about the defense system through mobile communications. It has been noticed that if all the ethical policies are correctly followed, then chances of such invasion will be minimized. Such principles if successfully implemented, will bring the faith of the government professionals back to the nation’s system.
Is this the question you were looking for? If so, place your order here to get started!