Disciplinary ethical codes allow an ICT professional to define standard of conduct and ensure the individual practitioners to meet those standards (Fleischmann, Hui and Wallace 2017). This study will discuss the case ethical issue caused by Edward Snowden in NSA. Moreover, the study will analyze this situation using Doing Ethics Technique. Apart from that, the study will also analyze the situation based on the ACS code of ethics. Both the technique will evaluate the ethical issues of the situation from the perspective of ICT professional. Moreover, the study will also provide a suitable recommendation for resolving the case.
In June 2013, the computer expert and former CIA system administrator Edward Snowden leaked the confidential information about the surveillance program of National Security Agency (NSA) (Philosophytalk.org 2015). The U.S Government used to gather and perform data mining on hundreds of internet traffic and U.S phone through this surveillance program. Moreover, the intension of this surveillance program was to identify the possible link to the known terrorists. However, Edward Snowden has violated the Espionage Act through leaking out the state secret. The computer expert has violated the secrecy agreement of the U.S Government by breaching the ethical codes (Allen 2018). Such unethical behavior of Snowden has just wasted the vision of U.S government towards tracking the activities of the terrorists, which can be dangerous for the country.
NSA should renew the surveillance program for tracking the activities of the terrorists. Moreover, the Federal Bureau of Investigation (FBI) should have to satisfy more legal requirements prior to access the Americans’ communication from the NSA database for the investigation of the agency (Raab and Szekely 2017). In such legal requirement, the FBI would get a warrant before searching the information from the NSA database. Hence, it would be very difficult for someone to pass on any information to unauthentic person. Apart from that, NSA can also use Homomorphic encryption, which can be use towards aggregating the encrypted data (Kalogridis et al. 2014). It would help in both privacy of secure information in the NSA database and useful aggregate information.
Among the above mentioned 3 options, access control for handling confidential data would be best for resolving such case. As per Kalogridis et al. (2014), in case of more legal requirement for accessing data, it might be possible for someone within the FBI members to avoid the alert on request of getting access to confidential data. Furthermore, Raab and Szekely (2017) stated that in encryption process, it might be possible for someone within the NSA to help the unauthentic person in understanding the encrypted form of confidential information. Such person may easily unethically violate his/her duty to pass on the confidential information to the enemies. However, Raab and Szekely (2017) opined that in case of access control for handling confidential information, the permission for accessing confidential information would be system generated through Data Steward. Moreover, the request for accessing data would fit the critical business requirement in the Data Steward. Hence, no person, even within the NSA members can unethically violate their duties by unnecessary accessing database information and pass on them to unauthentic persons.
In this code of ethics, an ICT professional is supposed to place the interest of public above those of his/her personal interests or sectional interests. In this case, the NSA surveillance program was initiated for tracking the contacts of the persons with the known terrorists. Moreover, the interest of this program was to protect the U.S public from the threats of terrorists. However, Edward Snowden gave priority of his personal interest to be hero to the public by revealing the data mining process of NSA (Whitehouse et al. 2016). In this way, Edward Snowden has underestimated the public interest of being protected from the terrorists.
In this code of ethics, an ICT professional is supposed to enhance the quality of life of the people, who are affected by his/her work. However, in this case, Edward Snowden interrupted the surveillance program of NSA, which used to track the contacts of the terrorists. In this way, this person has caused harm to the national security, which can directly harm the quality of life of the U.S citizen (Díaz-Campo and Segado-Boj 2015). Hence, Edward Snowden has actually violated the ACS Code of Ethics.
Honesty
In this code of Ethics, an ICT professional is supposed to be honest his/her representing the skills, knowledge and service. However, in this case, Edward Snowden has demonstrated dishonesty in representing his service by leaking out the confidential information of NSA to the public. Moreover, this computer expert was not actually loyal to his profession.
Competence
In this code of Ethics, an ICT professional is supposed to work competently and diligently for his/her stakeholders. Being an ICT professional, Edward Snowden should be his prime duty to protect the confidential information of NSA competently and diligently. However, Edward Snowden failed to maintain his competence and diligence of this duty by revealing the confidential information of U.S government to the public.
In this code of ethics, an ICT professional is supposed to enhance his/her own professional development as well as his/her colleagues’ professional development. However, in this case, being an ICT professional, Edward Snowden has violated the national security and set a negative example for his other colleagues (Valentine, Fleischman and Bateman 2015). In this way, he actually hindered his own as well as his colleagues’ professional development.
Professionalism
In this code of ethics, an ICT professional is supposed to enhance the integrity of the society and respect the members for each other. However, in this case, Edward Snowden has not demonstrated his professionalism by leaking out the confidential information of NSA to the public. Moreover, he has just exploited his position for disintegrating the society by causing harm to the national security.
Conclusion
While concluding the situation using Doing Ethics Technique, it can be said that Edward Snowden has just violated the ethical norms by leaking out the information of NSA surveillance program. Moreover, he has caused harm to the national security of U.S. Such situation can be handled through access control on handling the confidential information of NSA database. On the other hand, as per ACS code of ethics, being an ICT professional, Edward Snowden was not at all professional to his profession. He was incapable of protecting the confidential information of NSA.
NSA should provide proper training to its ICT professionals for enhancing their professional development. In this way, such ICT professionals would be loyal to their duties and roles and protect the confidential information of the NSA database. On the other, NSA should strongly initiate the access control for handling the confidential information of database. Moreover, in such privacy system, any ICT professional would require permission from the Data Steward for getting access to confidential information. Hence, it would not be possible for any NSA members to access the confidential information unnecessary and reveal them to unauthentic persons.
References
Allen, N. 2018. Edward Snowden: the quiet Hawaii life of the NSA whistleblower. [online] Telegraph.co.uk. Available at: https://www.telegraph.co.uk/news/worldnews/northamerica/usa/10110342/Edward-Snowden-the-quiet-Hawaii-life-of-the-NSA-whistleblower.html
Bannister, F. and Connolly, R., 2014. ICT, public values and transformative government: A framework and programme for research. Government Information Quarterly, 31(1), pp.119-128.
BBC News. 2014. How the US spy scandal unravelled. [online] Available at: https://www.bbc.com/news/world-us-canada-23123964
Díaz-Campo, J. and Segado-Boj, F., 2015. Journalism ethics in a digital environment: How journalistic codes of ethics have been adapted to the Internet and ICTs in countries around the world. Telematics and Informatics, 32(4), pp.735-744.
Dodds, N. 2013. Five Eyes spying alliance will survive Edward Snowden: experts. [online] The Sydney Morning Herald. Available at: https://www.smh.com.au/it-pro/security-it/five-eyes-spying-alliance-will-survive-edward-snowden-experts-20130717-hv0xw.html
Fleischmann, K.R., Hui, C. and Wallace, W.A., 2017. The societal responsibilities of computational modelers: Human values and professional codes of ethics. Journal of the Association for Information Science and Technology, 68(3), pp.543-552.
Gotterbarn, D. and Miller, K.W., 2017. Yes, but… our response to:“professional ethics in the information age”. Journal of Information, Communication and Ethics in Society, 15(4), pp.357-361.
Kalogridis, G., Sooriyabandara, M., Fan, Z. and Mustafa, M.A., 2014. Toward unified security and privacy protection for smart meter networks. IEEE Systems Journal, 8(2), pp.641-654.
Lyon, D., 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), p.2053951714541861.
Murata, K., Adams, A.A. and Lara Palma, A.M., 2017. Following Snowden: a cross-cultural study on the social impact of Snowden’s revelations. Journal of Information, Communication and Ethics in Society, 15(3), pp.183-196.
Murata, K., Fukuta, Y., Adams, A.A. and Ronghua, D., 2017. How Snowden’s revelations have influenced youngsters’ attitude and behaviour in the PRC and Taiwan. Journal of Information, Communication and Ethics in Society, 15(3), pp.213-231.
Near, J.P. and Miceli, M.P., 2016. After the wrongdoing: What managers should know about whistleblowing. Business Horizons, 59(1), pp.105-114.
Philosophytalk.org. 2015. Edward Snowden and the Ethics of Whistleblowing | Philosophy Talk. [online] Available at: https://www.philosophytalk.org/snowden
Raab, C. and Szekely, I., 2017. Data protection authorities and information technology. Computer Law & Security Review, 33(4), pp.421-433.
Raab, C. and Szekely, I., 2017. Data protection authorities and information technology. Computer Law & Security Review, 33(4), pp.421-433.
Valentine, S., Fleischman, G. and Bateman, C.R., 2015. An Exploratory Study Of Professional Ethical Standards, Positive Budgeting Orientation, And The Mediating Role Of Corporate Ethical Values. Accounting & Taxation, 7(1), p.1.
Walsh, P.F. and Miller, S., 2016. Rethinking ‘Five Eyes’ security intelligence collection policies and practice post Snowden. Intelligence and National Security, 31(3), pp.345-368.
Whitehouse, D., Duquenoy, P., Kimppa, K.K., Burmeister, O.K., Gotterbarn, D., Kreps, D. and Patrignani, N., 2016. Twenty-five years of ICT and society: codes of ethics and cloud computing. ACM SIGCAS Computers and Society, 45(3), pp.18-24.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download