Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Network Management in Organisations Assessment - Ethical issues arising from use of ICT technologies

Purpose of the assessment - The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

  • Identify potential ethical and social issues related to IT administration ethics.
  • Discuss ethical and social issues pertaining to IT systems-administration.
  • Interpret professional codes of ethics developed by various industry bodies.
  • Discuss ethical behaviour in accordance with professional codes.
  • Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Assignment Description -

Smart technologies are on the rise. There is a body of literature discussing the key benefits of Smart Technologies; however smart technologies also introduce many ethical issues.

0) Driverless car technology has attracted significant interest in manufacturing industry over the recent years. Please identify what ethical issues arise from use of driverless cars. Will you embrace this emerging technology from ethical perspective?

1) Cyberbullying has been a significant issue globally over the past few years. Cyber-technology has exacerbated this problem due to proliferation of mobile applications in the marketplace. You receive notification from a third party through one of the Apps that you use inviting you to participate in an event. You are not sure how they received your details. Discuss what security issues arise due to sharing of too much personal information on social media Apps.

2) Smart phones are being used by nurses for clinical communications and workflow in hospitals. Using smart phones to record patient data introduces ethical issues involving patient privacy. Identify what privacy risks arise in such a context and explain the risks in detail.

3) Technologies such as google glass and smart watches are coming into workplace. Given the intrusive natures of these technologies it is easy for employees to take video or photographs of other people at work and share it with others. What ethical issues arise from use of wearable technologies in workplace?

4) There are many apps available for download for consumers (for example, health monitoring, booking taxi, banking apps). While these Apps are user friendly and improve user experience, there is also a security concern that hackers can use some loopholes in such apps to modify or delete customer information. Discuss an App that you have used recently and if there have been privacy breaches? Is it ethical for companies to introduce Apps with only basic level of security?

Investigate and reflect upon one of the above scenarios using Ethical Guidelines published by organisations such as: EA and ACS.

Students  with ID ending with

Answer the scenario number

0 or 5

0

1 or 6

1

2 or 7

2

3 or 8

3

4 or 9

4

You must use the following aspects as headings for your answer -

Introduction  - Introduce the ethical  issues in 3-5 sentences.

Identification  - Identify at least 2 important ethical issues. 

Analyse  - Analyse the above identified issues.

Evaluate/justification - Evaluate the issues and write justification of your evaluation.

Conclusion  - Write clear conclusion in 2-3 sentences.

Reference style - Follow APA or IEEE reference style.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93074599
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Assessment taskstarting from the logical network design

Assessment Task Starting from the logical network design that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

With smaller companies saving thousands and larger

With smaller companies saving thousands and larger companies saving billions through flexible manufacturing, if you are a discrete parts manufacturer seeking to be more lean, it is important to consider whether this migh ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As