Discuss ethical behaviour in accordance

Assignment Help Computer Networking
Reference no: EM131519276

Purpose of the assessment

The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.
- Discuss ethical and social issues pertaining to IT systems'-` administration.
- Interpret professional codes of ethics developed by various industry bodies.
- Discuss ethical behaviour in accordance with professional codes.
- Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Assignment Description

Debra Shinder writes, "IT security personnel often have access to confidential data and knowledge about individuals' and companies' networks and systems that give them a great deal of power. That power can be abused, either deliberately or inadvertently."

Investigate, reflect upon and answer the following questions using Ethical Guidelines published by organisations such as: EA, ACS, ACM and IEEE.

1) Should you read the private e-mails of your network users just because you can? Is it OK to read employees' e-mail as a security measure to ensure that sensitive company information isn't being disclosed? Is it OK to read employees' e-mail to ensure that company rules (for instance, against personal use of the e-mail system) aren't being violated? If you do read employees' e-mail, should you disclose that policy to them? Before or after the fact?

2) Is it OK to monitor the Web sites visited by your network users? Should you routinely keep logs of visited sites? Is it negligent to not monitor such Internet usage, to prevent the possibility of pornography in the workplace that could create a hostile work environment?

3) Is it OK to place key loggers on machines on the network to capture everything the user types? What about screen capture programs so you can see everything that's displayed? Should users be informed that they're being watched in this way?

4) Is it OK to read the documents and look at the graphics files that are stored on users' computers or in their directories on the file server?

5) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner?

Verified Expert

This assignment was to write a report on "Discuss ethical and social issues pertaining to IT systems’-` administration ". We have written the report in MS- WORD in around 1000 words and included all the relevant points related to ethics.

Reference no: EM131519276

Questions Cloud

Calculate the npv for the investment : Consider an investment for a new manufacturing process line within a manufacturing plant. Calculate the NPV for the investment.
Define and contrast technical and moral responsibility : Define & contrast technical and moral responsibility. According to Sabini & Silver, in what way did the people who helped keep the Holocaust running confuse
Suppose european one-year put options with strike price : Now suppose European one-year put options with strike price of $100 are traded. What is their no-arbitrage price?
Analyze the four major controversies in development : Analyze the four major controversies in development in terms of the four developmental forces
Discuss ethical behaviour in accordance : MN501 - Network Management in Organisations - Identify potential ethical and social issues related to IT administration ethics and Discuss ethical and social issues
Prepare a statement of cash flows : Tiger Trade has the following cash transactions for the period.
List a few of the stereotypes or types of stereotypes : List a few of the stereotypes or types of stereotypes. What is your perspective of people who used those stereotypes
What is the duration of the bond : A newly issued bond has a maturity of 4 years and pays a 7% annual coupon. What is the duration of the bond?
How you intend to apply developmental theory : Briefly explain how you intend to apply developmental theory and research to policy and community in your program.

Reviews

inf1519276

6/29/2017 4:09:34 AM

In the event that you are searching for quality solution preparing website then Expertsmind.com is the best web based online writing service for you. They helped me a great deal when I required my task within two days and when I stuck in my research project. They are exceedingly satisfying and give fast Assignment Help.

len1519276

6/6/2017 2:46:24 AM

Grade Mark HD 80-100% DI 70-79% Excellent Very Good Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrat ed excellent ability to think critically but did not source reference material appropriatel y Analyse Logic is clear and easy to follow with strong arguments Consistency logical and convincing Evaluate/justific ation Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Reference style Clear styles with excellent source of references. Clear referencing style

len1519276

6/6/2017 2:46:14 AM

Marking criteria: Marks are allocated as follows, for each question: Aspects to be included in each answer Description of the section Marks Introduction Introduce the ethical issues in 2-3 sentences 1 Identification Identify 2 important issues 2 Analyse Analyse above identified issues 2 Evaluate/justification Evaluate the issues and write justification of your evaluation 2 Conclusion Write clear conclusion in 1-2 sentences 2 Reference style Follow IEEE reference style 1 Total 10

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd