Topic 1 If you were writing a code of ethics, what would be the most important practices to include in your company`s acceptable use policy, Internet use policy, or acceptable conduct policy? Topic 2 Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. How can cultural values, traditions, religion, the desire for higher economic status, or poor local law enforcement possibly affect the ability to regulate copyright piracy or other illicit activity globally? Topic 3 Cyber Vigilantism is a term that describes what may occur when an organization decides to hack back, or employ another company to launch a cyberattack against a suspected hacker that has disrupted their assets. When this is done by an organization, it may be actions taken for revenge or to protect important assets against future cyberattacks by using a “Pro-Active Defense". Is this practice currently illegal, and what could be some possible consequences if an organization engages in cyber vigilantism? What are other possible options for a "Pro-Active Defense"?
DISCUSSION W2 Student`s Name: Professor`s Name: Course Title: Date: Topic 1 According to Walker (2005), important practices to include in a company`s acceptable use policy, internet use policy, or acceptable conduct policy include: * Principles of ethics: Such principles include behaviors in the workplace as well as respect for all people. * Accountability: Accountability practices include ethical use of information, carrying out duties with due diligence to avoid conflicts of interest, and exercising responsibility for