Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Task back to top Proceed according to the following instructions. Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are...

1 answer below »

Task

back to top

Proceed according to the following instructions.

  • Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.
    • a. If using a workplace example, to maintain confidentiality, do not use real names.
    • b. If you use a media article you must include the link to the media article in the references list of your assignment.
  • Identify the key ethical issues contained in your chosen case and use the three distinct perspectives of applied ethics including professional, philosophical, sociological/descriptive ethics to analyse the ethical issues involved in the case. The word limit should be between XXXXXXXXXXwords. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicates in brackets the word count of your assignment excluding those items mentioned above.
  • Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at least THREE (3) quality academic references (one for each ethical perspective) from different sources. Please note that these references are in addition to those provided to you through this subject (for example, you still must reference, Tavani textbook, the Interact subject lecture notes etc BUT these references cannot be used as one of your three quality academic references from different sources). Only include references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

NOTE:Please use the template provided in resources section of this subject site.
Answered Same Day Aug 09, 2020 ITC506 Charles Sturt University

Solution

Kuldeep answered on Aug 11 2020
139 Votes
Title of Media Article
Title of Media Article
SCHOOL OF COMPUTING AND MATHS, Charles Sturt University
Cyber security
Assignment 1: Three Distinct Perspectives of Applied Ethics
Your Name
Student Numbe
Word Count:
1. Introduction
Ethics are regarded as moral value, which helps to respect, integrity and other variables; to ensure the trustworthiness, privacy and security of the organizational environment, because the maintenance of the organization depends entirely on organization's environment. Conversely, ICT is also characterized by IT as well as communication technologies such as hardware, the Internet, software, and telephones for sharing moreover communicating basic data inside and outside the firm. So, I analysed the ethical issues or ethical dilemmas that my organization faced four months ago with information and communication technologies. Here I discuss about the ethical dilemma my organization faces as I am using workplace example so to maintain the confidentiality I am not using real names. I work in CBD organization and our organization is one of the reputed firms working in IT business. I and other members of the management team found some whistleblowers who continually shared the organization’s important and delicate data illegally with others. Workers use the Internet, printers and laptops and more software and hardware to share or reveal necessary or secret information. Staffs use their mobile phones to send or send secret data to others. In this case, employees share important information about the organization with the organization's competitors to obtain additional facilities and funding. Management team used to conduct research activities to look for who is stealing and sharing important data of the organization with competitors. Team notice that with the help of mobile phone and official email IDs important information was completely distributed with the help of some white collar criminals. Our team found that the upcoming strategies we discussed in previous conferences have been driven by competitors on the market. Organization’s marketing team complained to the higher level management about such fraudulent activity by sending an email to the official email ID.
2. Professional Ethics Perspectives
The purpose of ethics is to identify and analyse the ethical responsibilities of compute
information technology (IT) professionals. Cyber ​​ethics is the area which identifies as well as analyses the ethical or moral responsibility of the computer professionals so that they take care of designing, developing, as well as maintaining computer hardware plus software systems in this manner is the job of computer professionals so that there are no network security issues. Suppose the programmer discovers that the software product she is working on is about to be released to the public for sale, even if it is unreliable because it contains "wrong" software, and she should whistle whenever he/she notices white-collar data security criminals. The individuals who see organize morals as a
anch of expert morals may utilize analogies in different subject matters, for example, prescription and law (Bakshtanovskii & Sogomonov, 2007). They will
ing up that in medicinal morals and legitimate morals, the fundamental focal point of the examination is to impact the person's ethical duty as an individual from these callings. By similarity, they will keep on arguing that a similar reason should apply to the field of system morals, that is, the fundamental focal point of system morals, and maybe even the focal point of flexibility ought to be on the ethical duty of PC/IT experts. For example, our organization hires programmers to design features that support anonymity, which can be used by individuals who post certain types of personal information (for example, personal diaries like Cutler) to share this information with a limited audience. The content of the blog, not the blog, is intended to be made available to the entire "online world." In addition, we encourage our organization to include applications that will certainly prevent all whistleblowers from being blocked by subtle data. Online articles are being advertised, and individuals begin to co
ectly understand the organization's work standards in society (Bustard, 2017). The management team also installed new software to easily track all reporting team members during their activities. Management has been appointed as a review team to promptly check the technical equipment used by our workers to prevent dishonest activities. The first option is for management to pay the group based on market prices and conduct an annual...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here