Discuss ethical behaviour in accordance

Assignment Help Computer Networking
Reference no: EM131519276

Purpose of the assessment

The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.
- Discuss ethical and social issues pertaining to IT systems'-` administration.
- Interpret professional codes of ethics developed by various industry bodies.
- Discuss ethical behaviour in accordance with professional codes.
- Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Assignment Description

Debra Shinder writes, "IT security personnel often have access to confidential data and knowledge about individuals' and companies' networks and systems that give them a great deal of power. That power can be abused, either deliberately or inadvertently."

Investigate, reflect upon and answer the following questions using Ethical Guidelines published by organisations such as: EA, ACS, ACM and IEEE.

1) Should you read the private e-mails of your network users just because you can? Is it OK to read employees' e-mail as a security measure to ensure that sensitive company information isn't being disclosed? Is it OK to read employees' e-mail to ensure that company rules (for instance, against personal use of the e-mail system) aren't being violated? If you do read employees' e-mail, should you disclose that policy to them? Before or after the fact?

2) Is it OK to monitor the Web sites visited by your network users? Should you routinely keep logs of visited sites? Is it negligent to not monitor such Internet usage, to prevent the possibility of pornography in the workplace that could create a hostile work environment?

3) Is it OK to place key loggers on machines on the network to capture everything the user types? What about screen capture programs so you can see everything that's displayed? Should users be informed that they're being watched in this way?

4) Is it OK to read the documents and look at the graphics files that are stored on users' computers or in their directories on the file server?

5) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner?

Verified Expert

This assignment was to write a report on "Discuss ethical and social issues pertaining to IT systems’-` administration ". We have written the report in MS- WORD in around 1000 words and included all the relevant points related to ethics.

Reference no: EM131519276

Questions Cloud

Calculate the npv for the investment : Consider an investment for a new manufacturing process line within a manufacturing plant. Calculate the NPV for the investment.
Define and contrast technical and moral responsibility : Define & contrast technical and moral responsibility. According to Sabini & Silver, in what way did the people who helped keep the Holocaust running confuse
Suppose european one-year put options with strike price : Now suppose European one-year put options with strike price of $100 are traded. What is their no-arbitrage price?
Analyze the four major controversies in development : Analyze the four major controversies in development in terms of the four developmental forces
Discuss ethical behaviour in accordance : MN501 - Network Management in Organisations - Identify potential ethical and social issues related to IT administration ethics and Discuss ethical and social issues
Prepare a statement of cash flows : Tiger Trade has the following cash transactions for the period.
List a few of the stereotypes or types of stereotypes : List a few of the stereotypes or types of stereotypes. What is your perspective of people who used those stereotypes
What is the duration of the bond : A newly issued bond has a maturity of 4 years and pays a 7% annual coupon. What is the duration of the bond?
How you intend to apply developmental theory : Briefly explain how you intend to apply developmental theory and research to policy and community in your program.

Reviews

inf1519276

6/29/2017 4:09:34 AM

In the event that you are searching for quality solution preparing website then Expertsmind.com is the best web based online writing service for you. They helped me a great deal when I required my task within two days and when I stuck in my research project. They are exceedingly satisfying and give fast Assignment Help.

len1519276

6/6/2017 2:46:24 AM

Grade Mark HD 80-100% DI 70-79% Excellent Very Good Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrat ed excellent ability to think critically but did not source reference material appropriatel y Analyse Logic is clear and easy to follow with strong arguments Consistency logical and convincing Evaluate/justific ation Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Reference style Clear styles with excellent source of references. Clear referencing style

len1519276

6/6/2017 2:46:14 AM

Marking criteria: Marks are allocated as follows, for each question: Aspects to be included in each answer Description of the section Marks Introduction Introduce the ethical issues in 2-3 sentences 1 Identification Identify 2 important issues 2 Analyse Analyse above identified issues 2 Evaluate/justification Evaluate the issues and write justification of your evaluation 2 Conclusion Write clear conclusion in 1-2 sentences 2 Reference style Follow IEEE reference style 1 Total 10

Write a Review

Computer Networking Questions & Answers

  How do the subnets affect the domain design

How do the subnets affect the domain design. Can security be improved by implementing a different domain model? If so, which domain model do you recommend

  Describe the routing and switching infrastructure

Describe the routing and switching infrastructure and the routing protocols used in the environment. Suggest one overall troubleshooting methodology that you would use for your troubleshooting and maintenance plan.

  Develop a network for a multisite company

The task is to develop a network for a multi site company - network should be analyzed and improvements recommended.

  Effects of cryptographic tunneling

Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model

  Network administrator to protect the network attacks

Prepare a 2-page memo outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network ..

  Explaining dynamic open architecture radio system

Discuss how initiatives like the Dynamic Open Architecture Radio System (DOARS) Project and the National Task Force on Interoperability (NTFI) are paving the way for more efficient.

  Describe possible lan topologies that could be used

IT 340 : Compare the identified LAN topology possibilities based on their relative strengths and weaknesses in regard to support practices.

  Write a report to your supervisor

Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. McBride's former Company work area.

  Describe how a web browser and web server work together

For what is HTML used? Describe how a Web browser and Web server work together to send a Web page to a user?- Can a mail sender use a 2-tier architecture to send mail to a receiver using a 3-tier architecture? Explain.

  Describe what is meant by cybersecurity architecture

Describe what is meant by Cybersecurity Architecture. List and describe the principles that must be supported.

  What forest/domain model should shiv llc implement

What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration

  Write an essay comparing the roles of web services

Write an essay comparing and contrasting the roles of web services, and analyze the benefits of treating a web service as a black box.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd