{"id":30225,"date":"2026-04-16T09:24:23","date_gmt":"2026-04-16T09:24:23","guid":{"rendered":"https:\/\/academicwritersbay.com\/solutions\/the-australian-computer-society-code-of-legit-habits-2014-is-expected-to-be-applied-by-all-computing-professionals-in-australia-it-sets-out-six-values-but-stresses-the-primacy-of-the-public-passion-a\/"},"modified":"2026-04-16T09:24:23","modified_gmt":"2026-04-16T09:24:23","slug":"the-australian-computer-society-code-of-legit-habits-2014-is-expected-to-be-applied-by-all-computing-professionals-in-australia-it-sets-out-six-values-but-stresses-the-primacy-of-the-public-passion-a","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/solutions\/the-australian-computer-society-code-of-legit-habits-2014-is-expected-to-be-applied-by-all-computing-professionals-in-australia-it-sets-out-six-values-but-stresses-the-primacy-of-the-public-passion-a\/","title":{"rendered":"The Australian Computer Society Code of Legit Habits 2014 is expected to be applied by all Computing Professionals in Australia. It sets out six values but stresses the primacy of the public passion as the overriding rate."},"content":{"rendered":"<h1 id=\"comp3425-data-mining-assignment-1-2026-australian-national-university-anu\">COMP3425 Files Mining Assignment 1 2026 | Australian National College (ANU)<\/h1>\n<h2 id=\"comp3425-data-mining-assignment-1\">COMP3425 Files Mining Assignment 1 <\/h2>\n<p>This project specification would possibly perhaps be updated to copy clarifications and changes after it is miles first issued.<\/p>\n<p>You are required to put up a single file within the form of a single PDF file with a file name that choices your College U-number ID. The principle web page must bear a clearly identified title and author, with both name and college U-number, that would possibly perhaps form a separate duvet web page. You may well perhaps perhaps merely additionally connect supporting information as appendices within the same PDF file. Appendices would possibly perhaps no longer be marked. <\/p>\n<p>Here&#8217;s a single-person project and desires to be carried out on your bear. It be necessary to make employ of quality reference cloth and reasonably reference via in-text citations, together with cloth offered to you within the course. Any cloth that you quote must bear the provision clearly referenced. It is unacceptable to display masks any piece of another author&#8217;s work as your bear. Anyone found doing so will be penalised in marks. Moreover to, ANU plagiarism procedures notice. This course introduces foremost ideas that would possibly perhaps doubtlessly be addressed by obvious Generative AI tools (e.g., ChatGPT). Hence, the employ of any Generative AI tools isn&#8217;t any longer approved in graded assessments inner this course. <\/p>\n<p>You are strongly encouraged to initiate engaged on the project straight away. You may well perhaps perhaps put up as time and again as you desire. Supreme the last submission at the due date will be assessed.<\/p>\n<h3 id=\"task\">Job<\/h3>\n<p>The Australian Computer Society Code of Legit Habits 2014 is expected to be applied by all Computing Professionals in Australia. It sets out six values but stresses the primacy of the public passion as the overriding rate. In 2018, the Australian Authorities Office of the Australian Files Commissioner launched the Files to Files Analytics and the Australian Privateness Principles (APP). In 2022, UNESCO published the Recommendation on the Ethics of Artificial Intelligence (SHS\/BIO\/PI\/2021\/1) for voluntary application by Member States. The advice is tall in scope and much-reaching in implementation responsibilities over the complete AI way lifecycle. It comprises an announcement of values and 10 principles that must be revered by all actors within the AI lifecycle, together with \u201cinformation scientists, cease-customers, industrial enterprises, universities and public and non-public entities\u201d (p. 10). These three documents are offered with this project specification.<\/p>\n<p>Moreover to to those papers, you&#8217;d like to additionally read Clarke R. (2018), \u201cPointers for the Responsible Utility of Files Analytics\u201d, Computer Law &#038; Security Overview 34, 3 (Jul-Aug 2018), which is equipped with this project specification and hereafter usually known as the Pointers. It be necessary to additionally read the paper, Du, Liu and Hu (2020) \u201cTactics for Interpretable Machine Studying\u201d, Communications of the ACM 63(1), which is additionally offered with the project.<\/p>\n<p>You are to take into fable the application of the ACS code of conduct, the 10 UNESCO Principles, Clarke\u2019s Pointers and Du et al\u2019s Tactics to the following fictitious insider detection scenario. You may well perhaps perhaps merely additionally employ the APP e-book, which is handy.<\/p>\n<p><strong>Insider Detection Scenario<\/strong> (from Clarke R. (2016) \u201cGargantuan Files, Gargantuan Dangers\u201d, Files Methods Journal 26, 1 (January 2016) 77-90, PrePrint at http:\/\/www.rogerclarke.com\/EC\/BDBR.html)<\/p>\n<p>A executive company receives terse directions from the executive to rep out ahead of the whistleblower threat, with Brutus, Judas Iscariot, Macbeth, Manning and Snowden invoked as examples of trusted insiders who became. The company increases the intrusiveness and frequency of worker vetting and lowers the threshold at which obvious vetting is undertaken. To lengthen the pool of readily accessible information, the company workout routines its powers to develop rep admission to to border actions, credit rating history, court docket records, regulation enforcement companies\u2019 persons-of-passion lists, and financial monitoring indicators. It applies great information analytics to a consolidated database comprising no longer fully these sources, but additionally all inner communications, and all postings to social media gathered by a specialist external services corporation.<\/p>\n<p>The principle execute of these measures is to additional minimize worker loyalty to the organisation. To the extent that productivity is measurable, it sags. The fraudulent positives increasing from information analytics explode thanks to the leap in negative sentiments expressed on inner networks and in social media, and within the vituperative language that the postings comprise. The fraudulent positives drastically lengthen the scale of the haystack, making the presumed needles even more sturdy to safe. The toxic ambiance increases the alternatives for a vindictive insider to obfuscate their activities and even to safe entertaining collaborators. In the end, frosty heads prevail by declaring how few contributors ever primarily leak information without authority.<\/p>\n<p>The wave of over-reaction slowly subsides, leaving a bruised and dissatisfied staff with a coarse taste in its mouth. [Section 4].<\/p>\n<p>It be necessary to acknowledge the following questions, clearly indicating which put a question to you are answering inner your submission. The safe page lengths urged for every put a question to here are for steering fully; the given web page length restrict for the final project is critical.<\/p>\n<p><strong>Demand 1<\/strong>. (1 web page) Lift into consideration the ACS code of conduct. For every of the six values, taking fable of any associated sub-way, discuss whether or no longer the associated rate become demonstrated within the scenario and to what extent. At the same time as you assess any rate as largely irrelevant to the scenario, then a extraordinarily transient motive for this overview is enough.<\/p>\n<p><strong>Demand 2<\/strong>. (1\/2 web page) Lift into consideration the 10 UNESCO Principles [S III.2]. Taking a look closely at Precept Proportionality and Enact No Damage [p20], discuss how this principle is applied (or no longer) within the scenario and title any attainable hurt that would possibly perhaps merely want ensued.<\/p>\n<p><strong>Demand 3. <\/strong>(2 pages) Lift into consideration the numbered tricks in Desk 2 of Clarke\u2019s Pointers for the in fee application of information analytics. From every segment (1 Long-established, 2 Files Acquisition, 3 Files prognosis, and 4 Utilize of the Inferences), resolve one guideline that you are taking into fable would bear been applied within the scenario. Its application would possibly perhaps merely no longer be explicit within the scenario description, but it completely must be associated and necessary to the scenario, and which that you can argue that it become applied effectively and therefore didn&#8217;t make a contribution to the negative penalties of the scenario. Whisper its role within the scenario, together with the way it will bear contributed to obvious outcomes. Define why it is miles extra associated than all and sundry among the different tricks that you are taking into fable would bear been applied within the same segment. Argue the way it is miles roughly associated than any tricks within the same segment that you are taking into fable would possibly perhaps merely bear been neglected within the scenario. Watch out to take into fable the procedure of the tricks slightly than a very literal interpretation; which that you can merely rephrase the chosen guideline for the scenario context the put precious. For added clarification of this level, look Piece 3 in Clarke\u2019s Pointers.<\/p>\n<p><strong>Demand 4. <\/strong>(1 web page) (a) Settle one, numbered guideline (e.g. guideline 3.3) in Desk 2 of the Pointers that you are taking into fable to bear been neglected within the scenario. You may well perhaps perhaps merely resolve any guideline that you didn&#8217;t resolve for Demand 3. Discuss how the failure to take into fable the guideline of thumb would possibly perhaps bear contributed to the negative  of the scenario. (b) Moreover to, title some other attainable penalties that would possibly perhaps bear occurred due to the the failure to take into fable that same guideline. For this cause, the penalties you resolve are no longer necessarily explicit accurate thru the scenario description. You may well perhaps perhaps safe it handy to take into fable this exercise as contributing to a chance overview process earlier than your hypothetical involvement within the prognosis work of the scenario.<\/p>\n<p><strong>Demand 5. (<\/strong>1 web page) Lift into consideration the paper by Du et al, Tactics for Interpretable Machine Studying. Discuss whether or no longer and the way intrinsic and put up-hoc interpretability ways will be applied to the scenario and what advantages would possibly perhaps ensue<\/p>\n","protected":false},"excerpt":{"rendered":"<p>COMP3425 Files Mining Assignment 1 2026 | Australian National College (ANU) COMP3425 Files Mining Assignment 1 This project specification would possibly perhaps be updated to copy clarifications and changes after it is miles first issued. You are required to put up a single file within the form of a single PDF file with a file [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-30225","post","type-post","status-publish","format-standard","hentry","category-solutions"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/30225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/comments?post=30225"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/30225\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/media?parent=30225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/categories?post=30225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/tags?post=30225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}