SlideShare a Scribd company logo
Information Technology, Computer Networks and Cyberspace
Kizza (2014) largely treated cyber-attacks as “cybercrime,”
conveying the assumption that these attacks are by definition
illegitimate and criminal. However, he occasionally seems to
recognize that there might be motives that are more ambiguous
and may have a social, moral, or political basis. Lessig (2006)
also referred to Internet hacker ethic as rebellious and
libertarian and not always criminal in a moral sense. One
example cited by Kizza (2014) is the Seattle WTO protest and
mass computer attacks that are “increasingly being used to
avenge what the attackers consider to be injustices” (p. 97).
Another example we discussed was the Stratfor attack. Also,
recently we see many examples of cyber security invasions by
governments and corporations.
Search the Internet to find an example of a hacking activity or
situation that represents a morally, ethically, or criminally
ambiguous situation but is different from any examples you
used in other assignments for this course.
Write a critical essay that addresses the following items:
Cite and briefly describe your example.
Apply what you have learned from the course to this point to
identify arguments both in support of and critical of the
behavior of the attackers.
Describe and explain the relationships among morality, ethics,
law, and crime as they intersect in the case example that you
have found.
Cite Winner’s “Do Artifacts Have Politics?” to identify and
explain the political, moral, and ethical choices and
consequences that may be embedded in technical choices and
artifacts described in your example.
Discuss and cite the article “Do Artifacts Have Politics?”, the
source of your example, and at least one additional credible or
scholarly source other than the course textbook to support your
analysis and positions. You may cite the course textbooks as
well if you wish. Use standards and APA style guidelines, citing
references as appropriate. Your paper should be two to three
pages in length. Before submitting your final version, be sure to
submit a draft version to the TurnItIn Checker.
I will support you with
Kizza (2014) and Lessig (2006)
Textbook

More Related Content

Similar to Information Technology, Computer Networks and CyberspaceKizza (201.docx

Defamation Essay.pdf
Defamation Essay.pdfDefamation Essay.pdf
Defamation Essay.pdf
Elizabeth Knight
 
Theory Case StudyThe course materials present a number of criminol.docx
Theory Case StudyThe course materials present a number of criminol.docxTheory Case StudyThe course materials present a number of criminol.docx
Theory Case StudyThe course materials present a number of criminol.docx
carmanl5wisc
 
Help Write A Research Paper - How To Write That Perfect
Help Write A Research Paper - How To Write That PerfectHelp Write A Research Paper - How To Write That Perfect
Help Write A Research Paper - How To Write That Perfect
Jeff Nelson
 
Due Week 4 and worth 140 pointsAccording to the text, crime ha
Due Week 4 and worth 140 pointsAccording to the text, crime haDue Week 4 and worth 140 pointsAccording to the text, crime ha
Due Week 4 and worth 140 pointsAccording to the text, crime ha
wildmandelorse
 
Plagiarism Essays
Plagiarism EssaysPlagiarism Essays
Plagiarism Essays
Lory Holets
 
Cja 415 Technology levels--snaptutorial.com
Cja 415 Technology levels--snaptutorial.comCja 415 Technology levels--snaptutorial.com
Cja 415 Technology levels--snaptutorial.com
sholingarjosh76
 
Cja 415 Enthusiastic Study / snaptutorial.com
Cja 415 Enthusiastic Study / snaptutorial.comCja 415 Enthusiastic Study / snaptutorial.com
Cja 415 Enthusiastic Study / snaptutorial.com
Stephenson25
 
Cja 415 Success Begins / snaptutorial.com
Cja 415  Success Begins / snaptutorial.comCja 415  Success Begins / snaptutorial.com
Cja 415 Success Begins / snaptutorial.com
WilliamsTaylorza40
 
Impact of History on Criminal Justice What is the focus of crimi.docx
Impact of History on Criminal Justice What is the focus of crimi.docxImpact of History on Criminal Justice What is the focus of crimi.docx
Impact of History on Criminal Justice What is the focus of crimi.docx
rochellscroop
 

Similar to Information Technology, Computer Networks and CyberspaceKizza (201.docx (9)

Defamation Essay.pdf
Defamation Essay.pdfDefamation Essay.pdf
Defamation Essay.pdf
 
Theory Case StudyThe course materials present a number of criminol.docx
Theory Case StudyThe course materials present a number of criminol.docxTheory Case StudyThe course materials present a number of criminol.docx
Theory Case StudyThe course materials present a number of criminol.docx
 
Help Write A Research Paper - How To Write That Perfect
Help Write A Research Paper - How To Write That PerfectHelp Write A Research Paper - How To Write That Perfect
Help Write A Research Paper - How To Write That Perfect
 
Due Week 4 and worth 140 pointsAccording to the text, crime ha
Due Week 4 and worth 140 pointsAccording to the text, crime haDue Week 4 and worth 140 pointsAccording to the text, crime ha
Due Week 4 and worth 140 pointsAccording to the text, crime ha
 
Plagiarism Essays
Plagiarism EssaysPlagiarism Essays
Plagiarism Essays
 
Cja 415 Technology levels--snaptutorial.com
Cja 415 Technology levels--snaptutorial.comCja 415 Technology levels--snaptutorial.com
Cja 415 Technology levels--snaptutorial.com
 
Cja 415 Enthusiastic Study / snaptutorial.com
Cja 415 Enthusiastic Study / snaptutorial.comCja 415 Enthusiastic Study / snaptutorial.com
Cja 415 Enthusiastic Study / snaptutorial.com
 
Cja 415 Success Begins / snaptutorial.com
Cja 415  Success Begins / snaptutorial.comCja 415  Success Begins / snaptutorial.com
Cja 415 Success Begins / snaptutorial.com
 
Impact of History on Criminal Justice What is the focus of crimi.docx
Impact of History on Criminal Justice What is the focus of crimi.docxImpact of History on Criminal Justice What is the focus of crimi.docx
Impact of History on Criminal Justice What is the focus of crimi.docx
 

More from widdowsonerica

Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
widdowsonerica
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
widdowsonerica
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
widdowsonerica
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
widdowsonerica
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
widdowsonerica
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
widdowsonerica
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
widdowsonerica
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
widdowsonerica
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
widdowsonerica
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
widdowsonerica
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
widdowsonerica
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
widdowsonerica
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
widdowsonerica
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
widdowsonerica
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
widdowsonerica
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
widdowsonerica
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
widdowsonerica
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
widdowsonerica
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
widdowsonerica
 
Individual ProjectIntroduction to LogisticsMon, 713151.docx
Individual ProjectIntroduction to LogisticsMon, 713151.docxIndividual ProjectIntroduction to LogisticsMon, 713151.docx
Individual ProjectIntroduction to LogisticsMon, 713151.docx
widdowsonerica
 

More from widdowsonerica (20)

Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
 
Individual ProjectIntroduction to LogisticsMon, 713151.docx
Individual ProjectIntroduction to LogisticsMon, 713151.docxIndividual ProjectIntroduction to LogisticsMon, 713151.docx
Individual ProjectIntroduction to LogisticsMon, 713151.docx
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Information Technology, Computer Networks and CyberspaceKizza (201.docx

  • 1. Information Technology, Computer Networks and Cyberspace Kizza (2014) largely treated cyber-attacks as “cybercrime,” conveying the assumption that these attacks are by definition illegitimate and criminal. However, he occasionally seems to recognize that there might be motives that are more ambiguous and may have a social, moral, or political basis. Lessig (2006) also referred to Internet hacker ethic as rebellious and libertarian and not always criminal in a moral sense. One example cited by Kizza (2014) is the Seattle WTO protest and mass computer attacks that are “increasingly being used to avenge what the attackers consider to be injustices” (p. 97). Another example we discussed was the Stratfor attack. Also, recently we see many examples of cyber security invasions by governments and corporations. Search the Internet to find an example of a hacking activity or situation that represents a morally, ethically, or criminally ambiguous situation but is different from any examples you used in other assignments for this course. Write a critical essay that addresses the following items: Cite and briefly describe your example. Apply what you have learned from the course to this point to identify arguments both in support of and critical of the behavior of the attackers. Describe and explain the relationships among morality, ethics, law, and crime as they intersect in the case example that you have found. Cite Winner’s “Do Artifacts Have Politics?” to identify and explain the political, moral, and ethical choices and consequences that may be embedded in technical choices and artifacts described in your example. Discuss and cite the article “Do Artifacts Have Politics?”, the source of your example, and at least one additional credible or scholarly source other than the course textbook to support your analysis and positions. You may cite the course textbooks as well if you wish. Use standards and APA style guidelines, citing
  • 2. references as appropriate. Your paper should be two to three pages in length. Before submitting your final version, be sure to submit a draft version to the TurnItIn Checker. I will support you with Kizza (2014) and Lessig (2006) Textbook