Wikileaks Essays (Examples)

39+ documents containing “wikileaks”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Wikileaks and Governance Transparency Wikileaks
Pages: 5 Words: 1765

Chase. Inside ikileaks: My Time
with Julian Assange at the orld's Most Dangerous ebsite. New York, NY: Crown

Publishers, 2011. Print. Retrieved on 21 February, 2013 from <

http://www.amazon.co.uk/Inside-ikiLeaks-Assange-Dangerous-

ebsite/dp/0224094017#reader_0224094017

Higgins, Melissa. Julian Assange: ikileaks Founder. Edina, MI: ABDO Pub. Co, 2012.

Internet resource. Retrieved on 21 February, 2013 from <

http://books.google.co.uk/books?id=40YFSyEhBtMC&printsec=frontcover&dq=Julia

n+Assange:+ikileaks+Founder&hl=en&sa=X&ei=RwImUef5EsmqtAbiroGwAw&

ved=0CC0Q6AEwAA#v=onepage&q=transparency&f=false

Leigh, David, Luke Harding, Edward Pilkington, Robert Booth, and Charles Arthur.

ikileaks: Inside Julian Assange's ar on Secrecy. New York: Public Affairs, 2011.

Internet resource. Retrieved on 21 February 2013 from <

http://www.amazon.co.uk/ikiLeaks-Inside-Julian-Assanges-

Secrecy/dp/0852652399#reader_0852652399

Nicks, Denver. Private: Bradley Manning, ikileaks, and the Biggest Exposure of Official

Secrets in American History. Chicago, IL: Chicago Review Press, 2012. Internet resource. Retrieved on 21 February 2013 from <

http://books.google.co.ke/books?id=GE_yDipSkYQC&q=transparency#v=snippet&q

=transparency&f=false

Sifry, Micah L. ikileaks and the Age of Transparency. New York: O/R Books, 2011. Print.

Retrieved on 21 February 2013 from <

http://books.google.co.uk/books?id=qGMHADuyIQUC&q=Transparency#v=snippet &q=Transparency&f=false...

mla

Works cited

Beckett, Charlie, and James Ball. Wikileaks: News in the Networked Era. Cambridge: Polity,

2012. Print. Rretrieved on 21, February, 2013 from <

 http://books.google.co.uk/books?id=oJw2NRtXC0kC&q=transparency#v=snippet&q 

=transparency&f=false

Essay
Wikileaks Ethics Issues Raised by the Conduct
Pages: 5 Words: 1491

ikileaks
Ethics issues raised by the conduct of the American government in dealing with ikileaks and Assange

The behavior of the American government towards ikileaks raises serious ethical issues related to government intimidation of the private company. The founder of ikileaks has also experienced a great deal of harassment in light of the ikileaks scandal which has called into question the integrity of the American government in pursuing justice through means that are inconsistent with the fairness ethos the government usually espouses. Lastly the case brings to light ethical issues related to the attempt of the government to censor free speech and limit the freedom of the press. All of these issues will be explored in the subsequent discourse.

Ethical Issue 1

The most blatant ethical issue that is raised with the American Government is the way it has gone about attempting to dismantle the ikileaks site. Instead of finding legitimate and legal ways…...

mla

Works Cited

"deontology." The Blackwell Dictionary of Western Philosophy. BUNNIN, NICHOLAS and JIYUAN YU (eds). Blackwell Publishing, 2004. Blackwell Reference Online. 26 March 2011

Grading Rubric for Conference

Julian Assange: WikiLeaks faces 'very aggressive' investigation by U.S.

Essay
Wikileaks National Security vs Freedom of Information
Pages: 7 Words: 2197

ikileaks
"If I had to choose between government without newspapers, and newspapers without government, I wouldn't hesitate to choose the newspapers."

Thomas Jefferson

Founded in 2006, ikiLeaks is a non-profit organization that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Recently, the site has been responsible for publishing a multitude of military intelligence as well as diplomatic cables. For example, the ikileaks Iraq ar Logs showed that around 15,000 civilian deaths had not been admitted by the government, that U.S. authorities failed to investigate hundreds of reports of abuse by Iraqi police and soldiers, and that U.S. forces killed almost 700 civilians for coming too close to checkpoints, including pregnant women. The Afghanistan ar Logs revealed even more accounts of civilian killing including an incident in which U.S. forces dropped six 2,000-pound bombs on a compound where they believed a high value target was hiding, this…...

mla

WORKS CITED

Fowler, Andrew. The Most Dangerous Man in the World. Melbourne University Publishing Ltd., 2011.

O'Laughlin, John et al. "Peering into the Fog of War: The Geography of WikiLeaks Afghanistan War Logs, 2004-09." Eurasian Geography and Economics, No. 4: 472-95.

WikiLeaks.  http://www.wikileaks.ch/

Essay
Banking and Wikileaks Is a Global Non-Profit
Pages: 5 Words: 1633

Banking and WikiLeaks
WikiLeaks is a global non-profit media association that distributes acquiescence of otherwise unavailable documents from nameless sources and leaks. Its website, which was started in 2006, is run by The Sunshine Press (WikiLeaks, 2011). In 2010, the director of WikiLeaks, Julian Assange, said that he planned to take down a main American bank and make known a network of dishonesty with a collection of data from an executive's hard drive. With Bank of America's share price declining on the broadly held thought that the hard drive was theirs, those in charge figured out it was time to take action. Since then, a team of fifteen to twenty top Bank of America officials, led by the chief risk officer, has been managing a broad interior investigation, combing thousands of documents in the result that they become public, evaluating every instance where a computer has gone missing and looking for…...

mla

References

Banks and WikiLeaks. (2010). Retrieved May 8, 2011, from  http://www.nytimes.com/2010/12/26/opinion/26sun3.html 

Santomero, Anthony M. (n.d.). Commercial Bank Risk Management: an Analysis of the Process.

Retrieved May 8, 2011, from  http://fic.wharton.upenn.edu/fic/papers/95/9511.pdf 

Schwartz, Nelson D. (2011). Facing Threat From WikiLeaks, Bank Plays Defense. Retrieved from  http://www.nytimes.com/2011/01/03/business/03wikileaks-bank.html?pagewanted=1&_r=1

Essay
Law and Wikileaks
Pages: 15 Words: 4615

Wiki Leaks
The whistle-blowing WikiLeaks is an online organization situated in Sweden; this organization distributed records termed "the diplomatic cables" from U.S. foreign negotiators on November 28, 2010. Upon their distribution, lawmakers from all corners of the U.S. political space censured the organization (Steinmetz). Within a brief time period, WikiLeaks turned into the biggest and most famous whistle-blowing organization on the planet. Due partially to the release of huge amounts of secret information on the takeover of Afghanistan and Iraq, the reputation of its author, Julian Assange, and the trial and detainment of Chelsea Manning, WikiLeaks has become the subject of boundless consideration and debate (Christensen).

In April 2010, WikiLeaks distributed a feature titled "Collateral Murder" that demonstrated a circumstance where United States (U.S.) air forces murdered civilians and journalists during the Iraq war. The theme making the news concerning WikiLeaks in late July 2010 was that they had published more than…...

mla

Bibliography

Bergman, K. Michael. "The Deep Web: Surfacing Hidden Value." whitepaper. 2001.

Christensen, Christian. "WikiLeaks: From Popular Culture to Political Economy." International Journal of Communication (2014): 2553-2557.

Davis, W. James and Meckel Miriam. "Political Power and the Requirement of Accountability in the age of Wikileaks." Zeitschrift fur Politikwissenchaft (2012): 463-491.

Ellsberg.   n.d. 26 April 2015.http://www.ellsberg.net/bio .

Essay
Cybersecurity in October 2010 Wikileaks an International
Pages: 4 Words: 1123

Cybersecurity
In October 2010, ikileaks, an international organization that publishes submissions of private, secret, and classified media ("leaks") by anonymous sources, released "the Iraq ar Logs," almost 400,000 documents which allowed major media outlets to map every death that took place in Iraq or Iran during the recent conflict. In November 2010, ikileaks, released U.S. State Department diplomatic cables, creating an international scandal. The recent media coverage of these events and allegations against ikileaks alleged director, Julian Assange, have brought forth important questions about cybersecurity on both a national and an individual level. Can legislative action adequately protect American individuals from the dangers of the changing nature of media? Should the government be charged with protecting individuals' cybersecurity? On one hand, the role of the government is to protect its citizens against threat and the threat of cyber-attack looms large against its citizen; on the other hand, this new danger…...

mla

Works Cited

Katel, Peter. "Identity theft in cyberspace: Can Congress give Americans better protection?" CQ Researcher 15.22 (2005): 517-540.

Marshall, Patrick. "Cybersecurity: Are U.S. military and civilian computer systems safe?" CQ Researcher (2010): 169-191.

Essay
Media the Two Media News
Pages: 5 Words: 1502

Arguably, the raw data at ikiLeaks is far more powerful than anything that can be found in traditional media or satire news. The audience here must also acquire the tools necessary to properly digest the information, as an audience accustomed to uncritical digestion of mainstream media will be challenged by the raw information presented devoid of spin and context.
orks Cited:

Feldman, L. (2007). The news about comedy. Journalism. Vol 8 (4) 406-427.

Ludlow, P. (2010). ikiLeaks and hacktivist culture. The Nation. Retrieved November 27, 2011 from http://xa.yimg.com/kq/groups/7669895/771113000/name/ikileaks.pdf

McCue, D. (2009). hen news breaks, "the Daily Show" fixes it: Exposing social values through satire. University of Nevada, Las Vegas. Retrieved November 27, 2011 from http://gateway.proquest.com/openurl%3furl_ver=Z39.88-2004%26res_dat=xri:pqdiss%26rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation%26rft_dat=xri:pqdiss:1456354

Postman, N. & Power, S. (2008) How to watch TV news. Penguin Books.

Reilly, I. (2011). Satirical fake news and the politics of the fifth estate. University of Guelph. Retrieved November 27, 2011 from http://gateway.proquest.com/openurl%3furl_ver=Z39.88-2004%26res_dat=xri:pqdiss%26rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation%26rft_dat=xri:pqdiss:NR71829...

mla

Works Cited:

Feldman, L. (2007). The news about comedy. Journalism. Vol 8 (4) 406-427.

Ludlow, P. (2010). WikiLeaks and hacktivist culture. The Nation. Retrieved November 27, 2011 from http://xa.yimg.com/kq/groups/7669895/771113000/name/Wikileaks.pdf

McCue, D. (2009). When news breaks, "the Daily Show" fixes it: Exposing social values through satire. University of Nevada, Las Vegas. Retrieved November 27, 2011 from http://gateway.proquest.com/openurl%3furl_ver=Z39.88-2004%26res_dat=xri:pqdiss%26rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation%26rft_dat=xri:pqdiss:1456354

Postman, N. & Power, S. (2008) How to watch TV news. Penguin Books.

Essay
Technologies Modern Media Has the Ability to
Pages: 3 Words: 879

technologies, modern media has the ability to absorb and become influenced by cultures from all around the world. The media of the eastern world, such as in Saudi Arabia and Nigerian have been influenced by the west, particularly the United States of America. Marwan Kraidy's (2009) "Reality Television, Gender, and Authenticity in Saudi Arabia" and Brian Larkin's (2004) "Degraded Images, Distorted Sounds: Nigerian Video and the Infrastructure of Piracy" deal with the westernization of Middle Eastern and African cultures which has been thwarted by the governments of those societies.
Marwan Kraidy (2009) explores the ramifications of a pan-Arab reality show called Star Academy which is broadcast in Saudi Arabia. In that nation, the program caused considerable problems because the political basis on which the Saudi government is run was undermined by the production. Star Academy was obviously influenced by western media, such as the television programs "Pop Idol" and "The…...

mla

Works Cited:

Benklar, Y. (2011). Wikileaks and the Protect-IP Act: a new public-private threat to the internet commons. Daedalus, the Journal of the American Academy of Arts and Sciences. 154-64.

Deibert, R. & Rohozinski, R. (2010). Liberation vs. control in cyberspace. Journal of Democracy. (21:4). 43-57.

Kraidy, M. (2009). Reality television, gender, and authenticity in Saudi Arabia. Journal of Communication. International Communication Association. 59, 345-66.

Larkin, B. (2004). Degraded images, distorted sounds: Nigerian video and the infrastructure of piracy. Public Culture. Duke University Press. 289-314.

Essay
Hacktivism One Expression of the
Pages: 9 Words: 2323

Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is ikileaks.
ikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false view of what hacktivism is because Julian Assange seems to have been motivated more often by pique than by genuine political concerns for making the world a better place. This is not, as one might guess, how the ikileaks founder sees the nature of his mission.

ikileaks, like Anonymous, is based on the idea that information -- all information -- should be available to everyone. This is a radical claim, and indeed resembles radical claims made by groups in the 1960s…...

mla

Works Cited

"Analysis: WikiLeaks -- a new face of cyber-war?" Reuters.   Retrieved 8 May 2012.http://www.reuters.com/article/2010/12/09/us-wikileaks-cyberwarfare-amateur-idUSTRE6B81K520101209 .

The Atlantic Wire.   Retrieved 10 Mary 2012.http://www.theatlanticwire.com/technology/2011/07/did-lulzsec-trick-police-arresting-wrong-guy/40522/ .

Castells, Manuel. The Internet galaxy: Reflections on the Internet, business, and society. Oxford: Oxford: Oxford UP, 2001.

Old-time hacktivists: Anonymous, you've crossed the line. CNET News March 30, 2012. Retrieved 10 May 2012.

Essay
Classify Information and Democracy Classifying
Pages: 7 Words: 1933

This really depends upon which actor is selected as the begining point, the responses to the following questions will not be the same. hy is there so much beef with this website leaking information? ikiLeaks -- as it talks about on the website -- 'bring[s] significant news and info to those in the community. They give an groundbreaking, protected and anonymous way for sources to leak material to journalists' (Thomas 2012).
References:

EMEA government organizations with no documented security. (2010). International Journal of Micrographics & Optical Technology, 28(6), 8-8.

OMB issues first report on federal information technology security. (2002). The Journal of Government Financial Management, 51(2), 8-8.

Bajaj, a., & Ram, S. (2007). A comprehensive framework towards information sharing between government agencies. International Journal of Electronic Government Research, 3(2), 29-44.

Batley, S. (2007). The I in information architecture: The challenge of content management. Aslib Proceedings, 59(2), 139-151.

Brito, Jerry. "Improving Government Transparency Online." Public Manager…...

mla

Works Cited

Brito, Jerry. "Improving Government Transparency Online." Public Manager 17, no. 3 (2008): 22-26.

Galason, Peter. "What We Have Learned about Limiting Knowledge in a Democracy." Social Research, 2010: 23-34.

Essay
Networked Age
Pages: 6 Words: 2665

Public dialog in a network age can cover a lot of topics. The network age is filled with a plethora of varying interests, ideas, subjects, and issues. Some of which relate to privacy, piracy, and even technology. People often forget what an impact the Internet has made in the last couple of decades, even in just 8 years. ANON came into existence, social networking sites like Facebook, Twitter came into popularity, and the recent concept of content creators has shaped the way people view and accept media. ith all these innovative ideas that came out, what kind of impression has it left on the public? hat were the origins of some of these topics? And moreover, has the Internet shaped the identity of people in the last decade?
Several events within internet history have made public dialog important. People need to discuss and analyze things in order to fully understand something…...

mla

Works Cited

Abelson, Harold, Ken Ledeen, and Harry R. Lewis. "Naked in the Sunlight." Blown to bits: your life, liberty, and happiness after the digital explosion. Upper Saddle River, NJ: Addison-Wesley, 2008. 19-29. Print.

Auerbach, David, and Gabriela Coleman. Here Comes Nobody: Essays on Anonymous, 4 chan and the Other Internet Culture. N/A: Triple Canopy, 2012. Print.

Castells, Manuel. "Occupy Wall Street: Harvesting the Salt of the Earth." Networks of outrage and hope: social movements in the Internet age. Cambridge, UK: Polity, 2012. 156-177. Print.

Lanier, Jaron. You Are Not a Gadget: A Manifesto. NYC: Vintage, 2011. Print.

Essay
Analysis of Case Involving Julian Assange
Pages: 2 Words: 799

Julian Assange
The following will be a critique of the case of Julian Assange. It will look into it to see if he was a hacker or a supporter for human rights and freedom of speech.

The Case

Assange talked about a grandiose vocation: "If we get the chance to live only once, then it has to be a very daring adventurous life that draws from every available power... Men at their peak, once they are convicted, get tasked to take action." He made his potential fans know about his clandestine fresh plans: "This is one very confidential internal growth mailing list for the site w-i-k-i-l-e-a-k-s-.-o-r-g. Please ensure you avoid making a direct mention of that word in this whole discussion; instead, you can use the initials, 'WL.' On the 9th of December, 2006, Daniel Ellsberg got an email signed with the initials, 'WL' from the blues, renown Vietnam War whistleblower (Leigh…...

mla

References

Leigh, D., & Harding, L. (2011). News, sport and opinion from the Guardian's global edition -- The Guardian. Julian Assange: the teen hacker who became insurgent in information war -- Media -- The Guardian. Retrieved May 23, 2016, from  http://www.theguardian.com/media/2011/jan/30/julian-assange-wikileaks-profile 

Writer Thoughts

Essay
James Moor What Is Computer
Pages: 6 Words: 2011

The sheer number and variety of sites where such ostensibly private information is made public can make it impossible for someone to truly get privacy.
What is remarkable is how well Dr. Moor did at predicting the ethical issues that would continue to be part of the Computer evolution. Even if computers are simply exacerbating existing ethical dilemmas, the fact that they are capable of doing so means that they are going to continue to present ethical problems. For example, when Eli Whitney invented the cotton gin, slavery was already in existence and used through the American South. That Industrial evolution invention did not create the ethical issue of slavery. However, with the improved ability to process cotton, cotton suddenly became an incredibly profitable crop. The need for cheap labor jumped dramatically, which certainly increased the demand for slave labor. What that example makes clear is that even seemingly helpful…...

mla

References

Moor, J. (1985). What is computer ethics? Metaphilosophy, 16(4), 266-275.

Essay
Security in Healthcare the Recent Advances in
Pages: 10 Words: 3250

Security in Healthcare
The recent advances in technology -- databases that store personal medical records and information -- are bringing tools to patients, doctors and other healthcare professionals that were simply not available just a few years ago. There is hope that eventually, a doctor in Hawaii that is treating a medical emergency for a tourist from Florida, will be able to access the digitally kept medical and healthcare records for that injured tourist. In other words, there will likely be in the foreseeable future a national database -- that perhaps links state databases with each other the way the FBI and local law enforcement agencies are linked -- that will be of enormous benefit to citizens and their healthcare providers.

But before that nationally linked database can become a reality, there are a number of potential problems that need to be ironed out. For example, legislation needs to be enacted…...

mla

Works Cited

Dogac, Asuman, and Laleci, Gokce B. (2005). A Survey and Analysis of Electronic

Healthcare Record Standards. ACM Computing Surveys, 37(4), 277-315.

Glaser, John, and Aske, Jennings. (2010). Healthcare IT trends raise bar for information security.

Healthcare Financial Management, 64(7), 40-44.

Essay
Security the First 10 Years the 21st
Pages: 5 Words: 1378

Security
The first 10 years the 21st century began a seemingly new age of terror and fear where heightened alert statuses and preventive measures can be seen as taken to extremes. The macrocosmic status of the global affairs which are often riddled with warfare, strife and suspicion can be examined at the microcosmic level within the information security and data protection industry. The purpose of this essay is to examine these questions: "How should we decide how secure we want our information to be? And who should be responsible to make these decisions? I'll answer these questions using ideas connecting the rationality of fear and security. Next I'll examine how materialism has distracted technology from its true essence, to help mankind. Lastly I will offer solutions to hopefully eliminate confusing and overbearing problems that humanity's quest for security can both effectively and efficiently have serious impact on that condition.

Fear and…...

mla

Bibliography

Antonopoulos, A. (2011). " Can you have too much security? "NetworkWorld May31, 2011. Retrieved from:  http://www.networkworld.com/columnists/2011/053111-andreas.html 

CIOinsight. (2005). "Jurassic Plaque: the u-curve of security." April 21, 2005.

Fact Forum Framework. (n.d.) "Computer Security." Retrieved from  http://www.caplet.com/security/taxonomy/index.html 

Lipowicz, A. (2010). "Wikileaks fallout: white house orders classified data security review." Federal Computer Week Nov 30, 2010. Retrieved from   review.aspxhttp://fcw.com/articles/2010/11/30/white-house-wikileaks-classified-data-security -

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now