Article https://www.smh.com.au/technology/rentahacker-site-leaks-australian-buyers-names-and-addresses XXXXXXXXXXghca3f.html Ethical theory’s ¢ Consequence-based ¢ Duty-based ¢ Contract-based ¢...

1 answer below »

View more »
Answered Same DayMay 10, 2020

Answer To: Article ...

Parul answered on May 12 2020
143 Votes
Analysis on ICT and Related Ethical Issues
Introduction
We live in an era where there is proliferation of Internet of things (IOT) and entire world is in race of transforming itself into virtual reali
ty. Devices which might appear docile may turn out to be worst nightmares. This is because with the introduction of information and communication technologies (ICT) all devices and platforms have started interacting with each other. This might seem beneficial at first as it provides corporates and their people to interact 24x7 with minimal or least downtime. However, this may invite hidden problems and creates issues that are mysterious to many thereby raising questions on moral grounds. ICT forms the backbone of modern world computing.
Current Problem
With tremendous growth of ICT and advancement in technologies, that way traditional business is operated transformed completely. There are more platforms for interaction and networking has improved all across. However, it has also brought threat to the privacy of individuals and corporates. Interesting view were expressed in the article, “Rent-a-hacker site leaks Australian buyers' names and addresses”, (Tung, L., 2015). Everyone value their privacy and don’t wont to broadcast it to the entire world. Most definitely no one wants their most confidential information to made accessible to anyone at any point of time. The revelations made in these articles urges one to worry that personal information like bank account details, medical history, pictures and even phone conversation that we fill in the ICT platforms everyday due to one reason or other can be used by anyone agencies, government and even people who are technical sound to hack into the system. Unwanted and unauthorised access to someone's credential can not only harm that person but also can damage many other as information provided in the personal sphere may completely change how it would be interpreted.
Ethics & Theories of Ethics
In general, ethics implies what is considered as...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30