Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after yoursecond assignment has been submitted. Choose one...

1 answer below »

Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after yoursecond assignment has been submitted.

  1. Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.
  2. Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.
  3. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.

You are required to complete the following:

Write an essay:

  • Theword limitfor the essay is XXXXXXXXXXwords. Headings, citations and references do not count towards the word limit, but quotations do.
  • Analyse the article/case study from the perspective of fourclassical ethical theories including utilitarianism, deontology, virtue and contract. Present well reasoned arguments for your assessments and recommendations.
  • Write an overall conclusion that justifies your recommendations made in your essay.
  • Include aReferencelist at the end of your work, in the correct APA referencing style, corresponding to in-text citations.

NOTE: Please use the template provided in resources section of this subject site.


This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.

In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.

Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.

In ICT, the main ethical issues are taken to be:

  • ICT professionalism
  • Privacy
  • Security
  • Cyber-crime
  • Intellectual property
  • Regulation on the internet
  • Social inclusion
  • Community and identity
  • Pervasive and convergent computing.

The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:

  • identify an ICT-related ethical issue from a media article or case study;
  • apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
  • derive logical and justifiable conclusions to resolve the ethical issue(s);and,
  • apply proper academic referencing.
Answered Same Day Apr 30, 2020 ITC506 Charles Sturt University


Amit answered on May 03 2020
124 Votes
Rent-a-hacker site leaks Australian buyers' names and addresses
Rent-a-hacker site leaks Australian buyers' names and addresses
Rent-a-hacker site leaks Australian buyers' names and addresses
Assignment 3: Applying Ethical Theory
Your Name
Student Numbe
Word Count:
1. Introduction
The topic named as “Rent-a-hacker site leaks Australian buyers' names and addresses” with concepts of cyber security and ethical implementations is selected for this required paper or essay. This topic describes the requirement of professional hackers which can help individual with certain payment. Only the hiring person and hired hackers knows all the requirements of given project. The list of professional hackers is available from which the client can select any professional hacker by providing name, his / her address, and possible reason why he /she needs a professional hacker. Professional hackers are responsible to provide cyber security to customer database so any unauthorized person cannot use that information for personal benefits. Some of the jobs performed by hackers are legal and according to government rules but some like data stealing for making personal benefits are illegal. The illegal hacking is a crime and it leads to violation of cyber security.
2. Utilitarianism Theory
The utilitarianism ethical theory stats that; if any of the performed action of ethical hacking is increasing the happiness of huge number of individual users, then, the performed action is always right. The use of hackers is not making huge number of individual users happy but it is also showing their name, address and shown reasons for hiring a hacker to public. This is a big challenge to cyber security of individual user’s data base or database of any organization [Williams & Murphy, 1990].
The modern era of technology based system includes all data of individuals and organization in some computers or smart phones only. The request examples for hiring hackers shown on web page of selected articles shows that some users wants hackers to find loyalty of their life partners, some want hackers to make data
each on any other organizations database and some individuals are even looking hackers to improve their grades by making unauthorized access to their own account. These are very big issues and not leading to happiness of so many users. Thus, utilitarianism theory is not suitable for hackers. The hacking activities are big challenge to government and other related agencies of Australia. In Australia, the central agencies handling cyber crimes are very active and any fraud can easily be tracked by them.
The increased cyber crimes in well organized manners through a platform where any user can make request, pay some money and hire a professional hackers to perform some ethical or unethical work is big challenge to maintain cyber security. As the hackers are offering services to individual users and making them happy, but the created data
eaches by them will lead to problems for more number of persons. So, even if the users are making legal actions with professional hackers but these actions are not ethical.
3. Deontology Theory
As per the deontology theory, the principles of any taken actions are must be based on the suitability and unfairness of performed action them self not on the suitability and unfairness of the occu
ed consequences from performed actions. The use of hackers can lead...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here