I’m working on a Computer Science exercise and need support.
|Professional Codes of Conduct|
Prior to beginning work on this discussion read Chapter 7 from the text, review any relevant information from this week’s lecture and read the following online resources:
- AITP Code of Ethics (Links to an external site.)
- SANS – Information Security Resources (Links to an external site.)
- Software Engineering Code | ACM Ethics (Links to an external site.)
There are several professional codes of conducts for IS professionals which are designed to guide their professional behaviors. For this discussion forum, select two Information Systems codes of conduct and address the elements below. Your initial post should be a minimum of 300 words.
- Describe each conduct code, explaining the emphasis of each.
- Compare and contrast the conduct codes for similarities and differences.
- Explain which code you would choose to follow and provide a rationale for your choice.
Guided Response: Review several of your classmates’ posts and respond to at least two of your peers by 11:59 p.m. on Day 7 of the week. You are encouraged to post your required replies early during the week to promote more meaningful interactive discourse in the discussion.
|Allow Government “Backdoor” Access to Company Technology?|
Prior to beginning work on this discussion read the Keys Under the Doormat: Mandating Insecurity by Requiring Government Access to All Data and Communications (Links to an external site.) and review any relevant information from this week’s lecture.
In an effort to fight terrorism, the federal government has sought the assistance and involvement of major Internet and technology companies (e.g., Yahoo, Microsoft, and Apple) to allow “backdoor access” to their technology (especially their encrypted communications technology) so that the government can better monitor communications of suspected terrorists. In theory, this backdoor access would be a non-public method of accessing the technology that only the federal government would be permitted to use at their discretion.
You are the CIO of a developing American technology company with over 500,000 customers. The federal government has contacted the Board of Directors of your company seeking the company’s participation in allowing the federal government backdoor access to your company’s technology for the reasons stated above. The Board seeks your professional advice and opinion on whether the company should freely give the federal government this type of access to your company’s technology. You need to provide guidance to the Board.
In a minimum of 300 words, explain whether technology companies should voluntarily grant the federal government backdoor access to a company’s technology (specifically their encrypted technology), providing legal and ethical rationale(s) for your determination. Support your position with evidence from your readings.
WHY SHOULD YOU HIRE EXPERT ACADEMIC WRITERS?
Answering this question is not essay as it seems. It will require you to research or burn your brain power, write your findings down, edit, proofread severally, and submit unsure of the grade you will get. Essay96.com assignment writers are offering to take care of that. Order your assignment now, relax, submit, and enjoy excellent grades. We guarantee you 100% original answers, timely delivery, and some free products.