Tuesday, May 5, 2020

Ethical Consideration Of National Security -Myassignmenthelp.Com

Question: Discuss About The Ethical Consideration Of National Security? Answer: Introduction Ethics is an integral part in the workplace operations. Exposure of ethical approach reflects the culture of the employees. This approach is crucial for the managers in terms of involving the employees in group discussions. Respecting the individual sentiments is one of an essential component of workplace ethics. Consciousness in this direction enhances the professionalism of the employees. Legal compliance is one of the other examples of workplace ethics (Cohen 2016). Delving deep into the aspect, ethics brings in behavioral theory into the discussion. This assignment peeks into the ethical consideration of NSA. This is carried out through the Doing Ethics Technique and ACS Code of ethics. Analysis of the situation using Doing Ethics Technique Edward Snowden performed an action of leaking the classified information of the National Security Agency, which intensified the danger of the malfunctioning of the systems. On the other hand, the step that was taken by the .employee of the NSA has compromised the details of the people. The violation of the ethics of the company was based on the compromise of the phone and internet traffic details of the terrorists (Nsa.gov 2018). The systems helped the security systems to keep a close track on the activities of the terrorists and therefore the leakage of the functioning of the systems has helped the terrorists in finding a refuge away from the security systems. Some of the people however think that Snowden is a marketing whistleblower who has drawn attention on the undertakings of the NSA, which is unethical. On the other hand, some others believe Snowden to be traitor to the security systems and the country by compromising the security of millions of people (Nsa.gov 2018). What is the facts/information? In the year 2013, June, Edward Snowden revealed certain classified information of the National Security Systems (NSA) and thereby compromised the information of the systems that are undertaken by the agency. On the other hand, the compromise of the information that is being undertaken by Edward has made the terrorists aware of the practices that are undertaken by the agency for tracking their activities (Nsa.gov 2018). Edward revealed the classified information of the undertakings of the agency in a mass media channel through which the mass is made aware of the processes that are undertaken by the organization. The report on the NSA surveillance programs has helped in undertaking steps for bringing in the varied changes in the security systems that are undertaken by the agency. Alternatively, the revelation of the functioning of the NSA has helped in the understanding of the unethical and unconstitutional procedure undertaken by the agency. What are the issues? The issues that are being faced by the organization are based on the revelation of the important classified information, which has made the terrorists and the other antisocial aware of their functioning and the processes undertaken by the organization. The major aspects of the change that is being undertaken by the organization is based on the requirements of the people to secure their surroundings and the neighborhood. On the other hand, the information of the processes has made the processes vulnerable to the cyber theft and data piracy, which might affect the smooth functioning of the organization (Nsa.gov 2018). The proper functioning of the organization is based on the resourcefulness and the processes that are undertaken by the organization for the better functioning of the same related to the security of the people. Therefore, the issues that are faced by the organization are due to the concession of the data of the organization in the markets and the people being made aware o f the systems of the security that is being undertaken by the agency (Nsa.gov 2018). Who are affected? The people of the nation and the security systems are affected by the breach in the information of the agency. On the other hand, it has affected the functioning of the organization as per the requirements to deal with the issues faced by the people relating to their security (Nsa.gov 2018). The mishandling of the phone records and the other significant documents are subjected to the data theft and has resulted to an issue in the cyber security system of the agency. The organization and its functioning is mostly affected through the breach of information. On the other hand, the people of the region are affected through the mismanagement of their private details that has endangered their existence in the region. Ethical issues and implication The ethical issues that are faced by the agency is based on the revelation of the classified information of the systems that are undertaken by the organization. The classified information has not only affected the functioning of the organization but also has affected the security of the people (Nsa.gov 2018). The major impact that the agency might face while making use of the security systems are based on the data piracy, which might affect the smooth functioning of the security systems. On the other hand, the breach of the information has caused havoc impacts on the livelihood of the people. The security systems of the company should have been integrated which would have helped in the prevention of the data theft and other unethical practices. What can be done? In order to avoid the circumstances and the atrocities, the agency might take steps in order to ensure the safety of the data from the piracy and the cyber crime activities. The steps that might be taken by the agency are framing policies for the control of the cyber theft and the development of the organization in the markets. On the other hand, the agency must take steps in order to review the policies for the proper management of the information that is retained by the agency. Limited access to the employees will also help the organization in securing the classified information. The company must also take steps to secure the information through the application of various software that helps in retaining the important information away from the outsiders and even provide very limited access to the employees. What are the options? The various options that can be implemented by the organization in order to handle the situation is being discussed in this section of the report. It helps in the understanding of the different steps that are undertaken by the management of the organization. The various options that can be undertaken by the organization in order to handle the situation are: Review of the policies The company must take steps in order to review the policies of the security in order to keep the classified documents secured and away from the cyber crime. It will be helping the organization in retaining the secrecy of the information safe and away from breaches and leaks. Introduction of a firewall The introduction of a firewall through the implementation of a software, which might help the organization in keeping the records safe and away from disclosure. It helps the organization in safeguarding the classified information away from the disruptions in the systems. Limited access to the employees Ensuring the limited access to the employees also helps the organization in monitoring over the security of the information and therefore prevent data theft from affecting the systems of the undertakings of the agency. What is the best option and why? The best option that can be counted by the organization is based on the level of security systems and the importance of the documents that are required to be secured. The best option that might be undertaken by the agency is the introduction of a firewall, which will actually help the organization in preventing invaders from looking into the confidential documents of the organization. The NSA must take steps in order to implement the software in the best possible manner in order to prevent data theft and disclosure of classified information of the agency. Analysis of the situation using ACS code of ethics ACS code of ethics is an essential component of the Australian constitution. According to the standard and protocols of ACS code of ethics, maintaining the honor, dignity of the personnel is very important in order to abide by the workplace ethics (Jensen and Delany 2016). These aspects contradict the situation of NSA, as one of the personnel, Edward Snowden, leaked the private and confidential data of the operations. As he leaked the private and confidential information, it can be considered that he neglected the public interest of his colleagues, managers and other staffs. This negligence strained the relationship between Snowden and the organization. Herein lays the appropriateness of the instance, suggesting different perceptions regarding Snowdens deeds. Delving deep into the perspective, the intensity of crime is so high, that any initiative from Snowdens end would not bear positive result. This is in terms of raising the standard of living of his colleagues. Snowdens deeds lack honesty in the practical application of the learnt skills in the workplace operations. This is reflected from his unethical revelations of the confidential data to the third party. This revelation also indicates Snowdens lack of competence regarding catering to the needs, demands and requirements of the stakeholders (Erford 2017). Absence of these skills stalls the professional development of personnel like Snowden. Along with this, it also acts as an obstacle towards the professional development of his colleagues, as they are compelled to bear with the illegal issues and scandals. Viewing it from broader perspective, obstacles in the professional development adds an ombre shade to the professionalism of Snowden as well as the other staffs of NSA. Countering this, obstacles in the professional development aggravates complexities towards enhancing the quality of life. This is applicable both in cases of Snowden and his colleagues in NSA. These complexities reflect the misutilization of the preconceived competencies by people like Snowden compelling the organization to encounter losses (Rogers and Braunack 2015). Confessing regarding the crime can be considered as the presence of honesty within Snowdens characteristic traits. However, in terms of the loss, which NSA had to face, this honesty is of no use. Leaking the information to terrorists is Snowdens unethical approach, adding interrogative parameter to Snowdens professional career. Fleeing from the country nullifies the attribute of honesty in case of Snowden. Avoiding the federal charges reflects the negligent attitude of Snowden towards performing the duties of a faithful citizen. Being a whistle blower raises doubts over Snowdens post as an employee. Violation of the civil rights and constitutional elements attaches questions regarding the Snowdens citizenship as well as the post offered (Congress 2017). In view of this parameter, perspectives his prosecution is appropriate. Herein lays the appropriateness of the term traitor. Countering this, his confession regarding committing a crime reduces the intensity of prosecution. In his confession, the names of Newspaper agencies emerge, which spoils the reputation of NSA. Revealing the information to these agencies reflects the foolishness of Snowden in terms of ensuring the betterment of the organization, of which he is an employee. This foolishness contradicts the true essence of ethics in workplace. As a matter of specification, ACS code of ethics indicates the responsibility of the individuals to adhere to the societal values for adding value and weightage to their citizenship (Komi?, Marui? and Marui? 2015). In view of this, Snowdens citizenship is at stake. This is because he has assisted terrorists in misutilizing confidential data about the organization. Taking into consideration all these aspects, perceiving Snowden as a traitor is appropriate. Along with this, prosecution is also justified. Delving deep into the aspect, Snowdens activities makes him a violator of security in his own country. Revealing details of the surveillance programs can be Snowdens disinterest towards keeping track of the information, which flows from the internal to the external environment of NSA. Known terrorists can be correlated with the fact that without the information of the Agency, Snowden was practicing illegal alliance with the terrorists, supplying them with confidential information and data (Holtzhausen 2015). Delving deep into Snowdens position, he works for a defence contractor Booz Allen Hamilton. This side parting with the terrorist puts Hamilton in an awkward situation. However, this is just an assumption. The word code in the AcS code of ethics represents the customs, rules and regulations developed by an organization for maintaining the workplace decorum. All the employees, upon their recruitment are expected to abide by these rules and regulations. However, Snowden is an exception, as he violates the Agency norms. This connotation raises doubts over the ways and means adopted by him to gain this position (Parsons 2016). Along with this, violation of the constitutional rights contradicts the aspect of public interest in case of Snowden. In view of this connotation, the aspect of professional development is nullified. This is in terms of neglecting the interest of his colleagues, managers and the organization as a whole. Viewing it from the perspective of ICT industry as a whole, the loss of secret and confidential data degrades the reputation. Violation of the code of ethics compels the employees like Snowden to encounter illegal instances, which can go up to the extent of termination. Accepting this consequence reflects the absence of competence from Snowdens end regarding the application of learnt skills to the execution of the workplace operations (Barker and Branson 2014). This incompetence can be perceived in terms of intentional or incapability. In case of Snowden, it is intentional as Snowden neglects public interest as well as the interest of his colleagues. Overall, it can be said that in case of Snowden, none of the elements of AcS code of ethics is applicable. He is not at all conscious towards protecting the of his colleagues, which reflects the lack of competence towards the proper application of the learnt skills. This lack contradicts honesty, stalling the professional development of employees like Snowden. Consistency in this approach acts obstacle in the enhancement of professionalism for these employees, degrading their quality of life (Brinkman et al. 2016). Perceptions about Snowden are the consequences of his own actions. The adjectives whistle blower and traitor degrade his individualism. However, confessing that he has commited a heinous crime, reflects his consciousness about the consequences, which he has to face on violation of the constitutional rights. Placing the personal interests above the organizational interest makes him self-centred, nullifying the aspect of ensuring the benefit of organization as a whole (Holtzhausen 2015). This type of approach is against the workplace ethics, raising doubts over his adherence to the position offered. Conclusion This assignment emerges successful in providing an insight into the workplace ethics. The consideration of the analytical tools of Doing the Ethics and ACS code of ethics enliven the ways and means in which the workplace ethics can be preserved. The example of NSA enhances the clarity of the readers in this regards. Doing the ethics analysis mainly enlightens the knowledge of the readers regarding the issues and the solutions in which these issues can be resolved. AcS code of ethics is relevant with the requirements of the assignment. The case study of Edward Snowden reflects unethical approach towards the workplace activities. This approach stalls the professional development of such employees, degrading their individualism. References Barker, R.L. and Branson, D.M., 2014.Forensic social work: Legal aspects of professional practice. Routledge. Brinkman, B., Gotterbarn, D., Miller, K.W. and Wolf, M.J., 2016. All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity.ACM SIGCAS Computers and Society,46(3), pp.5-8. Chou, T.S., 2013. Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), p.79. Cohen, A.I., 2016. Ethics and professional practice. InPracticing Professional Ethics in Economics and Public Policy(pp. 237-244). Springer, Dordrecht. Congress, E.P., 2017. What social workers should know about ethics: Understanding and resolving practice dilemmas.Social Work Ethics, p.1909. Erford, B.T., 2017.Orientation to the counseling profession: Advocacy, ethics, and essential professional foundations. Pearson. Guo, K.H., 2013. Security-related behavior in using information systems in the workplace: A review and synthesis.Computers Security,32, pp.242-251. Holtzhausen, D.R., 2015. The unethical consequences of professional communication codes of ethics: A postmodern analysis of ethical decision-making in communication practice.Public Relations Review,41(5), pp.769-776. Jain, P., 2012. Security Issues and their solution in cloud computing.International Journal of Computing Business Research, pp.2229-6166. Jensen, G. and Delany, C., 2016. The Discourse on Ethics and Expertise in Professional Practice. InProfessional Practice Discourse Marginalia(pp. 73-82). SensePublishers, Rotterdam. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges.Wireless Networks,20(8), pp.2481-2501. Komi?, D., Marui?, S.L. and Marui?, A., 2015. Research integrity and research ethics in professional codes of ethics: Survey of terminology used by professional organizations across research disciplines.PloS one,10(7), p.e0133662. Kshetri, N., 2014. Big data? s impact on privacy, security and consumer welfare.Telecommunications Policy,38(11), pp.1134-1145. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing.The journal of supercomputing,63(2), pp.561-592. Moore, J.F. and Labovitch, B.A., NewsILike Media Group Inc, 2013.Security systems and methods for use with structured and unstructured data. U.S. Patent 8,347,088. Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive data.Network Security,2012(12), pp.5-8. Nsa.gov (2018).NSA.gov. [online] Nsa.gov. Available at: https://www.nsa.gov/ [Accessed 6 Feb. 2018]. Parsons, P.J., 2016.Ethics in public relations: A guide to best practice. Kogan Page Publishers. Rogers, W. and Braunack-Mayer, A., 2015. General practice ethics: inter-professional responsibilities.Australian family physician,44(7), p.519. Verma, S. and Singh, A., 2012, December. Data theft prevention endpoint protection from unauthorized USB devicesImplementation. InAdvanced Computing (ICoAC), 2012 Fourth International Conference on(pp. 1-4). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.