How Australian Government Kept On Spying Over Their Users And Blocked All Torrent Sites And How UK Government Adopted It?
There is certain code of ethics that everyone need to follow including the government. Everyone is bind with this code and these are meant for every citizen. Without these codes of ethics, there will be no equality and foul play will happen. Code of Ethics helps in binding all of the people together and the ones in an organization take a vow to never break these codes.
The following essay is about how Australian Government kept on spying over their users and blocked all torrent sites and how UK government adopted it.
The persons who are involved in ICT Professionalism should possess absolute and also should have an up-to-date understanding for the main body of knowledge (Turner, 2016). They should also be able to demonstrate all the ongoing works in the professional development with the help of an appropriate and a good combination of qualifications as well as certifications and also should include work experience and should contain non-formal and formal education. They should also strongly be firm to all the code of ethics and should try to apply them in real life (Bannister & Connolly, 2014). They should also be able to communicate with others in a professional way and should try to maintain the code of ethics.
For the following case study, it has been seen that Australia is spying around the users and collecting data on what they are accessing. From the side of ICT Professionalism, this is very wrong as users got the freedom of whatever sites they wish to access (Brady, 2014). It their right to access any website and Government cannot simply put an end to this. The Australian Government is putting a ban over torrent sites as well as torrent search engines such as Bit Torrent and sites like Pirates Bay and Kickass Torrents. This proves that the government is continuously spying on their users activities that they are making over the internet which is bad thing (Leicester, 2016). By doing so, they are not even safe over the internet knowing that government can track their each movement over the internet.
In terms of security basis, spying can increase the rate of security much higher as while the government is spying over their citizens, some hacker can inject a virus over a terminal which can spread over all other networking systems when they are spying. By doing so, they are also infiltrating the firewall of the users and leaving it exposed and by doing so; any other hacker can also get into their systems and may inject any malware. By doing this, the government is exposing the systems of users to others. Another issue that might happen is that when they are spying on the users through network, if any hacker sniffs in between them then the hacker can get full access to the user’s computer (Warren et al., 2016).
There are various cyber-crimes activities that can happen if the firewall is kept exposed for others like a hacker can inject any form of virus or worms or Trojan and by back tracing the network path, they can go to the main source of the network and can also perform DDoS attack on the server and by this they can cripple the server. By injecting worms or viruses, attackers can steal any form of confidential data or can seriously damage the system also (Yanagihara & Koga, 2016). But there are eminent dangers are also present while downloading from torrent sites or torrent search engines that torrent sites often redirects it to another page where viruses can be present and can harm the system.
From the following case study, it can be drawn that the intellectual property of the user’s were violated as they do not have the freedom to surf the internet also as government is blocking all torrent sites. It is also a direct violation to the ones who created those pages and handling them as they have the right to create the page as internet is for all and nobody can control that. Also, the users have the right to privacy that is no one can spy on them or their activities over the internet (Yanagihara & Koga, 2016). Also, the people who are behind making the websites, are not harming anyone so it is their right to remain over the internet and government cannot block their sites.
Regulation on the internet
The main purpose of putting an end to these torrent sites is to stop piracy of films and other forms of media or even the application. By these torrent sites, main organizations are facing huge loss as many users are uploading the pirated software and films over the internet and many end users are also downloading them (Burmeister et al., 2014). To stop this, government is applying some rule and regulations that the ISPs need to edit their list of all the websites and block all the torrent websites and torrent search engines so that no piracy of films or application can occur any more. Certain rules are required while accessing the internet as without these rules, there will be a huge chaos.
When the government of Australia started to spy on the user’s activities and started blocking all the torrent sites, they saw it as a direct threat to their right to privacy and formed social groups over the social media and even locally and criticized the actions that the government has taken. By forming all these social groups, they protested against the government’s act and asked for full privacy when they are over the internet (Yanagihara & Koga, 2016). The main reason behind creating these social groups was to show the government that the user’s were not happy with their activities of spying over them.
Community and identity
After the users were aware of being spied by their own Government, all the people formed group and community to show their dislikes about this activity. This is a direct violation to the right to privacy of the users and everyone was unhappy due to this act (Turner, 2016).
Pervasive and convergent computing
In this type of computing, government is tracking the everyday tasks of the users to see what they are doing and what not. It a form of embedded computational capability that is present in everyday objects only to make communication perform much better but the Government of Australia is using to spy on the internet users. Pervasive computing devices are network connected and is available at all time (Warren et al., 2016). The problem with pervasive computing is that it can occur anytime with any device and at any place. These are all included in the laptops, notebooks and smartphones which makes the job of Government much easier to track.
Utilitarian Ethical Theory
In accordance with Utilitarian ethical theory it is stated that any ethical concern must be based on the utility of the fact among the users or involved heads within any specific case scenario (Bannister & Connolly, 2014). In accordance with the case study selected in this assignment, Australia has decided to protect the websites from piracy and hacking issues. Therefore, the decision of Australian government is right from the point of view of utility and utilization of different facts within any case scenario.
Deontology Ethical Theory
According to the ethical theory of deontology, it is stated that duty towards human beings are the most important fact that needs to be managed with respect different ethical considerations within different places. In addition to this, in case of the considered case study about blocking websites for piracy events are one correct decision taken by Australian government as this decision reflects the ethical consideration of the government for protecting the privacy of the websites (Brady, 2014). Therefore, in accordance with the facts related to ethical concern this scenario has appropriately implemented deontological aspects within it.
Virtue Ethical Theory
In accordance with the ethical theory of virtue ethics, this is found the moral values are mainly prioritized for evaluating the ethical aspects involved within any case scenario. In contrast with these facts, this is identified that Australian government has decided to block some websites due to solving piracy issues involved within those websites. The government has considered here the moral values of the users of those websites for managing ethical considerations within the scenario of piracy within websites (Burmeister et al., 2014). The concept of virtue ethical theory, the Australian government has taken an ethically correct decision in case of their judgment.
Contract Ethical Theory
According to the contract ethical theory, justification is prioritized within in case of ethically correct situations. This theory states that the considered decisions should be justified with respect to significant ethical theories (Leicester, 2016). Australian government has taken decision for blocking all the websites that are used for piracy of services and conduct. Therefore, this decision is justified enough for restricting the piracy measures involved within the case scenarios.
Aware behavior of users: Aware behavior can restrict the potential threats coming from piracy. Therefore, the users can easily manage and protect their services.
Blocking of unnecessary websites: Blocking of unnecessary websites will prevent the piracy of services within web.
From the following essay it can be concluded that every person has their right to privacy and one should not interfere with that. It is the very basic integral part of anyone’s life. No matter what that organization is, everyone should try to respect the privacy of others. From the film industry’s point of view, it is also correct but there are other ways also by which it can be sorted out.
Bannister, F., & Connolly, R. (2014). ICT, public values and transformative government: A framework and programme for research. Government Information Quarterly, 31(1), 119-128.
Brady, D. (2014). Ethics: IT Professional Pillar or Pillory!. Mondo Digitale, 2.
Burmeister, O., Al-Saggaf, Y., Schwartz, M., & Johnson, L. (2014). Internet resources to help Australian ICT professionals identify and solve ethical challenges. ACIS.
Leicester, N. (2016). Ethics in the IT Profession: Does a Code of Ethics have an Effect on Professional Behaviour?.
Turner, A. (2016). Britain's The Grand Tour piracy spree highlights the futility of blocking The Pirate Bay. The Sydney Morning Herald. Retrieved 10 May 2017, from https://www.smh.com.au/technology/gadgets-on-the-go/britains-the-grand-tour-piracy-spree-highlights-the-futility-of-blocking-the-pirate-bay-20161215-gtcfay.html
Warren, M., Warren, M., Lucas, R., & Lucas, R. (2016). Ethics and ICT: Why all the fuss?. Journal of Information, Communication and Ethics in Society, 14(2), 167-169.
Yanagihara, S., & Koga, H. (2016). The significance of ICT in the generation of code of conduct.
Yanagihara, S., & Koga, H. (2016). The significance of ICT in the generation of code of conduct: from the perspective of polarization of ICT and organizational citizenship behavior. ACM SIGCAS Computers and Society, 45(3), 33-37.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Cyber Technology. Retrieved from https://myassignmenthelp.com/free-samples/cyber-technology.
"Cyber Technology." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/cyber-technology.
My Assignment Help (2018) Cyber Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/cyber-technology
[Accessed 30 March 2020].
My Assignment Help. 'Cyber Technology' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/cyber-technology> accessed 30 March 2020.
My Assignment Help. Cyber Technology [Internet]. My Assignment Help. 2018 [cited 30 March 2020]. Available from: https://myassignmenthelp.com/free-samples/cyber-technology.
MyAssignmenthelp.com is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.
Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...Read More
Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...Read More
Answer: Introduction Augmented Reality (AR) has emerged different technologies and it uses artificial intelligence and machine learning algorithms for providing a superimposed images and videos of real things for better understanding. In this report, AR technology will discuss with their uses in different fields as well as how it is beneficial for education system. AR is a latest technology, which is highly used for understanding of different t...Read More
Answer: Introduction The foremost determination of the paper is to investigate the role of the automatic learning ability of the AI based systems. Most of the business organizations all over the world uses the automated learning ability of the AI based systems and this paper will be very much effective for the organizations who are planning to implement this technology in their working environment. Along with this accounting organizatio...Read More
Answer: Introduction: Flight management System or the FMS is the fundamental component that is included in the modern airliners avionics. This is one of the specialized computer systems which is associated with the automation of the various in-flight tasks along with helping in the reduction of the workload upon the flight crew up to a point where the modern civilian aircrafts no longer need to carry the flight engineers or the navigators (Zh...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Awesome write up for my assignment!!! Worth the money paid!!! Will come back .....
I really appreciate how the editor understood what I really meant to say thus making me feel more confident in submitting my work. I am an extremely happy customer. I will definitely sen un update on my grade.
Excellent work. We got total of 68 marks and we are very satisfied with the score. We gave this assignment near to deadline which is 2 days before due date. The assignment was about 4000 words and they did it well and gave it before 8 hours of submis...
I can\'t complain, speedy service and got the assignment before the deadline and got full mark