Ethical implications for the privacy

Assignment Help Other Subject
Reference no: EM132141127 , Length: word count:2500

Assessment - Privacy, Security and Ethical Reflection

Task

This assignment is designed to enable you to reflect on privacy, security and ethics based on your studies in this subject. You may include personal approaches and feelings on privacy, security and the ethics of some of these approaches.

Consider:

The charity scenario introduced in assignment 4. This assignment looked at the practice of Governments divesting some of their administrative functions to NGOs (Non GovernmentOrganisations). This practice often, but not always, includes paying the NGO a sum of money to process and administer clients on behalf of the Government. This assignment saw the NGO process members of society, who they would normally help and support, on behalf of the Government for various support services. This also included identifying the client and assisting them to create a digital ID to access these services.

But, any approach to divestment comes with risks to information security and privacy and may also have an ethical effect.

Tasks:

1. Discuss what you see as the personal and ethical implications for the privacy of individual clients of an NGO that has adopted the MySupport approach. Will these personal implications lead to possible behaviouralchanges?(30 marks)

2. Discuss what you see as the personal and ethical implications for the security of individual clients of an NGO that has adopted the MySupport approach. (30 marks)

3. Discuss what you would recommend to a client of an NGO that has adopted the MySupport approach in order to protect their individual privacy and the security of their information and digital ID. (40 marks)

Your overall score for this assignment will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words.

Reference no: EM132141127

Questions Cloud

The differences between fact tables and dimension table : Please describe a few differences between fact tables and dimension tables. In what case(s) might they be used interchangeably?
Confidence interval for the mean consumption : Construct the 98% confidence interval for the mean consumption of milk among people over age 32. Round your answers to one decimal place.
Receiving the new treatment : As the treatment i not experimental, both participants and researcher do no know whether, a specific participant is receiving the new treatment or not.
Analyze the design process for defining customized security : CIS402 : Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant.
Ethical implications for the privacy : Discuss what you see as the personal and ethical implications for the privacy of individual clients of an NGO that has adopted the MySupport approach
Team of researcher randomly separates their study : A team of researcher randomly separates their Study's participants into two groups, giving one group a placebo and the other a new
Determine the necessary service level agreements : Determine the necessary Service Level Agreements (SLA) needed from your carrier services, along with the quality of service expectations required.
What is the central limit theorem : What is the Central Limit Theorem? Why does it make the use of the common inferential tools possible even if the raw data is not distributed normally?
Describe how you would start this incident off correctly : Describe how you would start this incident off correctly by properly protecting and securing the evidence.

Reviews

len2141127

10/15/2018 4:17:25 AM

hi, kindly make this assignment. please don't include any reference in no of words. add atleast 10 references. please make it quick. please Submission method options: Alternative submission method This subject assumes that you understand what constitutes plagiarism, cheating and collusion. If you are a new student we expect you to complete the modules called Academic Integrity

len2141127

10/15/2018 4:15:59 AM

Q3. Privacy and security recommendations (40 marks) Comprehensive exploration of steps to take to enhance security and privacy of mobile devices Thorough exploration of steps to take to enhance security and privacy of mobile devices Good exploration of steps to take to enhance security and privacy of mobile devices Adequate exploration of steps to take to enhance security and privacy of mobile devices Incomplete or inadequate exploration of steps to take to enhance security and privacy of mobile devices

len2141127

10/15/2018 4:15:51 AM

Q2. Personal and ethical implications for security (30 marks) Comprehensive exploration of security & sensitive data issues from both personal and ethical viewpoints Thorough exploration of security & sensitive data issues with many personal and ethical viewpoints Good exploration of security & sensitive data issues with some personal and ethical viewpoints Adequate discussion of security & sensitive data issues with some personal and ethical viewpoints Inadequate or incomplete discussion of security & sensitive data issues that does not discuss personal and behavioural viewpoints

len2141127

10/15/2018 4:15:36 AM

This assessment task will assess the following learning outcome/s: • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud. Q1. Personal and ethical implications for privacy (30 marks) Comprehensive exploration of privacy and ethical issues from both personal and behavioural viewpoints Thorough exploration of privacy and ethical issues with good personal and behavioural viewpoints Good exploration of privacy and ethical issues with some personal and behavioural viewpoints Adequate discussion of privacy and ethical issues with some personal and behavioural viewpoints Incomplete or inadequate exploration of privacy/ethical issues that does not discuss personal and behavioural viewpoints

Write a Review

Other Subject Questions & Answers

  Review both comments relared to nursing

My executive summary will be on change of shift admissions and effects on patient care. Change of shift is a vulnerable time for both patients and nurses.

  How have the operations of production companies evolved

How have the operations of production companies evolved over time for past 10 years?

  Identify age spiritual values and cultural variables

Identify age, spiritual values, and cultural variables that were considered and how these variables influenced your interviews or health history.

  Discuss how it appears in hughes poem

"The Negro Speaks of Rivers" also connects a people to a symbol that is timeless and 'of the earth'. This is not the first work we've seen that discusses rivers. Water is a symbol in many works. Discuss how it appears in Hughes's poem and in two o..

  Develop an agenda for an upcoming meeting

Develop an agenda for an upcoming meeting. Develop a meeting goal or goals, and identify the sequence of agenda items.

  Explain the researcher role in qualitative research

Explain the researcher's role in qualitative research. Discuss the unique issues that researchers should be concerned about in regards to their role in research, and explain how this is specifically a challenge in ethnographical research

  Explicate the diplomatic doctrine the president followed

Explicate the diplomatic doctrine the president followed, with reference to specific actions or events that occurred.

  What dose the video suggest about government and revolution

What dose the video suggest about government and revolution. Dose democracy have a historical inevitability according to the video. Describe in detail

  Describe smart goals related to your education

Describe two or three challenges you will need to address to be successful as a health care administrator and/or to promote positive social change.

  Discuss acute versus chronic exacerbation of the illnesses

Coding of respiratory diseases can be confusing due to the similarities and acute versus chronic exacerbation of the illnesses.

  Locally hosted service and service provided using an saas

Describe the difference between a locally hosted service and a service provided using an SaaS provider. What are the critical points, other than cost, that an enterprise would need to consider in choosing to migrate from a locally hosted service to..

  Briefly describe mandatory release and good-time release

Describe the loss of the right to vote for inmates who are incarcerated.Is race is an underlying issue in this process? Provide one supporting fact to justify your response. Do you believe that inmates should have the right to vote? Provide one ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd