8
answers
2
watching
143
views

 

A hacker, called Jarell. He was lending the rest of his savings to the hospital when his mother was sick. So, he has financial difficulties in his life. Then, Jarell wanted to make a money. PQR company saw his talent and hired him as an employee. After that, they successfully signed the contract. In addition, the CEO of PQR company required him to succeed in getting a job as a game writer and story planner. Jarell needed help attacking the other company to give him an advance on his medical bills. Besides, Jarell have promises to do well. A day, XYZ company did not check own network system. Inadvertently, PQR company have an opportunity to attack XYZ company network system. For the action, the PQR Company has access to attack XYZ Corporation's network engineering system. Afterwards, Jarell applied for ransomware. He has sent the link to XYZ Company and created an enticement for them to click on the link within 2 hours. Later, the staff opened the link quickly. Later, Jarell hacked into XYZ system. Moreover, he also sabotaged XYZ system and retrieved important documents and messages. These delete backups of important company files. In this case, XYZ company suffered a huge of income.
 
Application of two Ethical Theories (Deontology and Utilitarinism) and based on the ACM Code of Ethics and Professional Conduct, explain Two general ethical principles of the IT employee in the above scenario. (At least 200 words)

For unlimited access to Homework Help, a Homework+ subscription is required.

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Already have an account? Log in
Already have an account? Log in
Already have an account? Log in
Already have an account? Log in
Already have an account? Log in
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in

Weekly leaderboard

Start filling in the gaps now
Log in