Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

La Trobe Business School BUS5PB 1 BUS5PB - Principles of Business Analytics Assignment 03: Data Ethics and Privacy Marks: 30% Assignment Type: Individual Due Date: 11:00 PM Sunday 2nd June 2019...

1 answer below »
La Trobe Business School BUS5PB

1

BUS5PB - Principles of Business Analytics
Assignment 03: Data Ethics and Privacy
Marks: 30%
Assignment Type: Individual
Due Date: 11:00 PM Sunday 2nd June 2019 (submit online to LMS).

The third assignment focuses on the important topic of ethics and privacy in relation to business
analytics. There are three case studies provided and you are required to analyse and provide answers to
the questions outlined below. You can use lecture material and literature to support your responses.


1.0 Case Study – Prevention better than litigation? Monitoring of employee computer use:

1.1 Is it ethical for organisations to monitor employees to detect access to pornography and
then sack them if they have accessed it? Discuss. (6 marks)
1.2 Giving consideration to your response to 1.1, present an Analytical solution that can avoid
the ethical and privacy issues raised while helping the organisation achieve what they want
to. For your specific solution, discuss the ethical and privacy concerns that may arise and
how they are dealt with. (6 marks)

2.0 Case Study – The Ethics of Classification:
2.1 Do you think that using attributes such as weight, chronic illness and marital status is ethical
in this specific case study? Why or why not. (3 marks)
2.2 Giving consideration to 2.1, what attributes will you consider in your classification model to
achieve the same outcome for the hospital? (3 marks)
2.3 Is there a better alternative to 2.2’s classification model in your view as a data scientist? If so,
discuss your solution to help achieve the hospital’s desired outcome(s)? (3 marks)
2.4 In the context of 2.3, discuss the measures that the hospital can take to protect their
patients’ data from being used unethically? (3 marks)

3.0 Case Study – Privacy and security
eaches at Acxiom:

3.1 What could Acxiom do to increase the security and privacy of its customers’ data? (2 marks)

3.2 Based on the article cited in this case study and your own research, do you think the
government should have access to private-sector data? (2 marks)

3.3 In addition to government, what organisations might need access to private data for security
easons? (2 marks)

La Trobe Business School BUS5PB

2

Report guidelines

1. Your final report should include answers to all the case study questions, and a reference list
written in Microsoft Word (font size 11) and submitted as a single Word file.
Marking ru
ic

A grade will be awarded to each of the questions and then an overall mark determined for the entire
assessment. The ru
ic below gives you an idea of what you must achieve to earn a certain ‘grade’.
As a general rule, to meet a ‘C’, you must first satisfy the requirements of a ‘D’. And for an ‘A’, you must
first satisfy the requirements of a ‘B’, which must of course first meet the requirements of a ‘C’ and so on.

Giving the nature of these questions, we have a single marking ru
ic as follows.

Criterion A B C D
Case Study answer Pretty much faultless,
achieving what a B
grade has done but
taken to a level where
the argument
presented is highly
thought-out, well-
connected between
one another, and
clearly demonstrates an
understanding of the
case presented. If
equired, relevant
assumptions are made
and these assumptions
are logical and evidence
driven. Additional
esearch undertaken to
support arguments of
ethics and privacy is
also further supported
y literature about the
problem context.
There is good depth to
the discussion and the
arguments presented
goes beyond what is
covered in the lecture
material. It is logical,
articulated and well-
acked by research into
ethics and privacy.
There is evidence that
the answer is well-
thought out and there
is a demonstrated
understanding of ethics
and privacy concerns in
the relevant local
context and the context
of the problem.
The answer presented
is given some thought
ut draws its discussion
points from inadequate
or limited sources. The
arguments presented is
logical and articulated.
While the argument is
acceptable, it could be
stronger or more
considered. The
answers should
demonstrate a step up
from a “common
sense” response.
The most basic answer
is provided but the
arguments are unclear,
incomplete or shows a
lack of thought. The
answers clearly draw
materials and insights
from a limited source
or is put together just
enough to present an
argument. Answer
appears to be
esponding from the
“common sense” of an
individual rather than
taking time to
understand the deeper
aspects of ethics and
privacy.

Other information
• Standard plagiarism and collusion policy, and extension and special consideration policy of
this university apply to this assignment.
• By submitting your work online, the declaration on the university’s assignment cover sheet
is implied and agreed to by you.









La Trobe Business School BUS5PB

3























La Trobe Business School BUS5PB

4


La Trobe Business School BUS5PB

5


La Trobe Business School BUS5PB

6
Answered Same Day May 28, 2021 BUS5PB La Trobe University

Solution

Soumi answered on Jun 01 2021
148 Votes
BUS5PB - PRINCIPLES OF BUSINESS ANALYTICS
ASSIGNMENT 03: DATA ETHICS AND PRIVACY
Table of Contents
1.0 Case Study: Prevention better than litigation? Monitoring of employee computer use:    3
1.1    3
1.2    3
2.0 Case Study: The Ethics of Classification:    4
2.1    4
2.2    4
2.3    4
2.4    4
3.0 Case Study: Privacy and security
eaches at Acxiom:    5
3.1    5
3.2    5
3.3    5
References    6
1.0 Case Study: Prevention better than litigation? Monitoring of employee computer use:
1.1
In the 21st century, with the growth of technology, the misuse of the internet has also headed up in a remarkable amount, which is most evident in the organizations. The employees of different organizations are under company surveillance in the absence of their concern. Contemporarily, three-fourths of the organizations have started the process of employee surveillance. According to some research, 72 per cent of the companies have reconciled the misuse of the internet in the workplace in the United Kingdom, followed by ve
al warnings. One of the most important issues, which this case study is consisting of, is the access to pornography in the workplace. The problem of watching online porn is growing rapidly in workplaces nowadays (Crane & Matten, 2016).
Generally, the emails that are received and sent by an employee using the company account do not come under the privacy of an employee. In most of the companies, employees are allowed to surf the internet for their work, until or unless they are caught in performing some illegal activities, which points out the misemployment of an employee or more. These usages are prohibited inside a workplace, as it can be a major cause of server collision and email crash within a company. Apart from all these facts, it can be a significant mean of management cost; this can be harmful to the financial structure of a company. As stated by Web sense, a huge number of employees were dismissed by some companies around the world, as they were caught performing internet misconduct in the office premise. These companies took this stern decision as such conducts by an employee can affect the work environment.
1.2
The misuse of the internet is alerting the well-being of an organization and the other employees. To prevent internet misconduct by employees within a company should be strictly prohibited. If an employee is caught executing such illegal behaviour inside the workplace, the first thing which can be done is giving them a warning in a quiet tone. To avoid this situation in a company, the employer can notify the employee about their information that, the activities are being monitored (Blaikie & Priest, 2019). To stop these activities in...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here