StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Issues of Australian Computer Society - Assignment Example

Cite this document
Summary
The assignment "Ethical Issues of Australian Computer Society" focuses on the critical analysis of the ethical issues in the above case about codes of ethics in the Australian Computer Society (ACS). It will illustrate ethical guidelines relevant to this scenario…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful

Extract of sample "Ethical Issues of Australian Computer Society"

Name: xxxxxxxxxxx Code: xxxxxxxxxxx Course: xxxxxxxxxxx Title: Ethics and Social Issues - Formal report and Survey and analysis of the IT employment market Word count: 1253/855 @ 2010 Assignment 2- Formal report Executive Summary Leikkessa Jones established her software consulting company after quitting her job as a system designer. Currently, her company got a contract to establish a database management system for a company that manufactures toys. In the course of the design process Leikkessa informed the company’s CEO, Director of personnel and the Director of information concerning the progress of the system. However, when it came to deciding the degree of security that the system should have the Leikkessa and the company had varied opinions. The company’s officials preferred a system that incorporates basic security so as to save on the costs. On the other hand, Leikkessa prefers a system that incorporates high security since the information that will be stored is sensitive because it includes medical records for insurance claims, salaries and performance evaluations. Furthermore, Leikkessa strongly feels that designing a system with pitiable security would be violating her professional ethics (Johnson & Miller 2009). This paper seeks to explore ethical issues in the above case in reference to codes of ethics in the Australian Computer Society (ACS). It will illustrate ethical guidelines relevant to this scenario. Moreover, this paper will seek to give recommendations to Leikkessa whether or not she should refuse to design the system according to the company’s specifications. Introduction Information security in databases involves protecting sensitive information from unauthorized access and modifications. The enhancement of information security is imperative in a company’s database since it promotes integrity and confidentiality. In most cases corporations amass sensitive information that requires confidentiality about their employees and key operations. The breach of security can lead to business losses, bankruptcy and law suits. Therefore, it is essential to enhance information security in the company’s databases. The enhancement of security in the information system of a company is not only a business requirement, it also ethical and a legal requirement (Dhillon 2007). The Australian Computer Society (ACS) code of ethics The Australian Computer Society (ACS) is a body that aims at promoting professional excellence and integrity in information technology. This association has a set of codes of ethics that seek to govern and give guidelines to personnel in the field of information technology. These codes of ethics have stipulations on what is ethical and unethical amongst professionals in practice in the field of information technology. In reference to the scenario involving Leikkessa’s Company and the toy manufacturing company there are a number of codes of ethics from the Australian Computer Society (ACS)that are quite relevant to issues revolving around the security of information systems(ACS 2008). For instance, the standards of conduct set out in the Australian Computer Society codes of ethics stipulate that professions in this field must strive to be forthright, impartial and competent in their profession, they should also serve the community loyally. Ideals and values stipulated in the codes of ethics give provisions of dealing with clientele in this field. The provisions stipulate that professions must strive to enhance integrity and the quality of life through their skills. Furthermore, professions must work competently and diligently for their clients or employers (ACS 2008). Standards of conduct provided by the Australian Computer Society in the codes of ethics further stipulate that the priorities of professions in information technology should endeavor to preserve continuity of services. Professions must at all cost endeavor to maintain integrity and security of other people’s information. Moreover, professions must uphold respect for the proprietary nature of other people’s information. In addition, professions must strive to maintain confidentiality in regard to the information of others. According to the set ethical codes information technology professions should strive to advice their client on the potential legal and ethical implications of the specifications of the assignments they are bound to embark on (ACS 2008). In regards to competence these codes of ethics stipulate that professions must make themselves aware of relevant standards in the practice and work according to these standards. Moreover, professions in information technology must protect the propriety interests of their clients or employers. These codes further stipulate that professions must responsibility for their work therefore it is vital that they should give accurate advice to their clients or employers in case the proposed project is not at the best interest of the client or employer(Johnson & Miller 2009). Nevertheless, according to these codes of ethics professions in the field of information technology must go beyond their brief when necessary so as to act professionally. Furthermore, professions should give realistic and accurate estimates for the project under their control. All in all the codes of ethics provided by the Australian Computer Society require that professions in the field of information technology should that their practice is in accordance to the stipulated codes of ethics (ACS 2008). Practice application In reference to the codes of ethics provided by the Australian Computer Society it would be unethical for Leikkessa’s company to design a system with poor security that holds sensitive information regarding employee medical information, performance evaluation and other personal information. Since it is stipulated in the codes of ethics that professions in the field of information technology should endeavor to maintain integrity and security of other people’s information. Moreover, professions must uphold respect for the proprietary nature of other people’s information. Additionally, professions must strive to maintain confidentiality in regard to the information of others (Quinn 2009). On the other hand, Leikkessa’s company has an obligation to design a database to the toy manufacturing company since the two parties had entered into a contract agreement. In reference to the codes of ethics provided by the Australian Computer Society professions in the field of information technology need to work diligently and competently so as to meet the needs of the clientele. Furthermore, they must take responsibility for their work and if necessary they should go beyond their brief so as to preserve continuity of service. Recommendations It is imperative for Leikkessa to advice the toy manufacturing company appropriately on the legal, business and ethical implications of designing an information system that has low security. Leikkessa should point out to the company’s management since the data base incorporates sensitive and personal information there is need for a more advanced security system. Moreover, Leikkessa should explain to the company’s management that the design of an information system with low security can lead to law suits against the company and business losses. In case the company’s management turns down the offer to build a more advanced security system so as to enhance the security of personal information, Leikkessa’s company should refuse to design the system since it would be against the set ethics. Alternatively, Leikkessa’s company could go beyond their brief by designing an advanced security system that is cost effective so as to promote the continuity of services (Quinn 2009). Conclusion Codes of ethics provided by the Australian Computer Society stipulate that professions in the field of information technology must at all times strive to maintain integrity and security of other people’s information. Furthermore, professions must uphold respect for the proprietary nature of other people’s information. In addition, professions must strive to maintain confidentiality in regard to the information of others. On the other hand, professions should work diligently and competently so as to meet the needs of their clientele. In the above scenario Leikkessa should refuse to design an information system with low security since it unethical. Alternatively, Leikkessa could design an advanced security system that is cost effective so as to maintain the continuity of services (Johnson & Miller 2009). Bibliography Australian Computer Society (ACS), 2008, Codes of Ethics, Retrieved on January 24, 2010 http://www.acs.org.au/index.cfm?action=show&conID=coe Dhillon, G, 2007, Principles of Information Systems Security: text and cases, John Wiley & Sons Publishers, New York. Johnson, G & Miller, W, 2009, Computer ethics, 4th Ed, Pearson Education International, Upper Saddle. Quinn, J, 2009, Ethics for the information age, 3rd Ed, Pearson Education, Boston. Survey and Analysis of the IT job market Introduction This paper seeks to analyze the IT job market. It will illustrate the role and functions of two IT streams that I endeavor to work in subsequent to completing my course. This paper will highlight the proponents of six IT job streams as advertised. Moreover, this paper will identify and illustrate the functions of societies/ bodies that oversee the ethical and profession conduct of professions in the IT field. In addition, this paper will comment on how one can prepare for a vocation in these IT fields in regard to personal attributes, knowledge, skills and experience. IT Technical Officer Subsequent to completing my course at the University, I endeavor to work as an IT Technical Office or Senior Content Producer.Key responsibilities of an IT Technical Officer include, assisting the staff in the education and training institute in their operation and set-up of IT hardware and software. This position also entails performing audits and making recommendations on the institute’s infrastructure and IT assets. In addition the job involves the maintenance of the institution’s IT assets and data bases. The functions of an IT Technical Officer vary from one organization to another. However in most cases the functions of a technical officer involves making contributions as part of an organization’s support team so as to provide high quality services revolving around information technology. A technical officer helps the managing personnel in the day to day maintenance of the organization’s technical services. Furthermore, an IT Technical officer also maintains the organizations records and assists the staff in an organization to understand and effectively use the information technology facilities and assets found in an organization. IT Technical officers can function in settings such as the hotel industries, hospitals and tourist agencies among many other settings. Senior Content Producer Key responsibilities of a senior content producer include delivering a client-centered web content based on user research. This job also entails, giving advice in regards to online communications content and its applications in diverse businesses. The major job function of a senior content involves the production online content. In the settings of an organization, a senior content producer can coordinate and ensure the smooth running of on-line communications. Survey on the IT job market The identified IT job advertisements include, Senior Database Administrator, IT support consultant, Multimedia Officer, senior system engineer, SQL server developer and IT security manager. Senior system engineer On January 5, 2010, the position of a senior system engineer was advertised online through the website http://mycareer.com.au/. According to the advertisement the applicants should have a MCSE certificate with four years of experience in the management and implementation of windows 2003/08 servers. Salary enumerations are $2094.60 to 3107.60 per month. SQL server developer On January 10, 2010, the position of a SQL server developer was advertised on line through the website http://www.careerone.com.au. This position is a six month contract bound for an extension. Salary enumerations are $50 to $58 dollars per hour. According to the advertisement this job entails developing and maintaining SQL servers. IT security manager On January 3, 2010, the position of an IT security manager was advertised on line through the website http://www.seek.com.au. In reference to the advertisement this job entails ensuring that the organization’s information system complies with the set security policies. The requirements for this position include five years experience in IT security and MCSE training. Salary enumerations are $ 42500 to $60 500 per annum. Multimedia Officer The position of a multimedia officer was advertised through the Queensland government website http://www.jobs.qld.gov.au in the smart jobs segment. According to the advertisement this position is required for Parliamentary service in Brisbane. The applicant’s requirements include, Degree in IT, experience in the development of websites and desktop publishing. Salary enumerations are $2184.40 to$ 2402.00 per fortnight. IT support consultant The Position of an IT Support Consultant was advertised through the Queensland government website http://www.jobs.qld.gov.au in the smart jobs segment. According to the advertisement, this job position is based in the Solaris and Red Hat system administrators, which gives expert advice and support to a wide range of clients such CITEC. The advertisers specified that the applicants should be enthusiastic and keen team players experienced in UNIX system administration Salary enumerations are $2912 to $ 3119 per fortnight. Senior Database Administrator On January 12, 2010, the position of a senior database administrator was advertised website http://www.jobs.qld.gov.au. In reference to the advertisement the wage enumeration is $2904.60 to $3107.60 per fortnight. The job entails, designing and maintaining information systems. Societies/ Bodies in Information Technology There exist several bodies that oversee the ethical and professional conduct of the professions in the field of information technology. Key among these bodies includes the Australian Computer Society (ACS) and the International Organization for standardization (ISO). The main function of these bodies is to enhance and maintain professional excellence and integrity in information technology. Preparing for a career in IT A career in IT will require adequate preparation, foremost knowledge and skill in the configuration of IT hardware and software is necessary. Secondly there is need to enhance my communication and team work skills. Bibliography http://www.jobs.qld.gov.au http://www.seek.com.au http://www.careerone.com.au http://mycareer.com.au/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Ethics And Social Issues - Formal Report And Survey And Analysis Of, n.d.)
Ethics And Social Issues - Formal Report And Survey And Analysis Of. https://studentshare.org/religion-and-theology/2044345-ethics-and-social-issues-formal-report-and-survey-and-analysis-of-the-it-employment-market
(Ethics And Social Issues - Formal Report And Survey And Analysis Of)
Ethics And Social Issues - Formal Report And Survey And Analysis Of. https://studentshare.org/religion-and-theology/2044345-ethics-and-social-issues-formal-report-and-survey-and-analysis-of-the-it-employment-market.
“Ethics And Social Issues - Formal Report And Survey And Analysis Of”. https://studentshare.org/religion-and-theology/2044345-ethics-and-social-issues-formal-report-and-survey-and-analysis-of-the-it-employment-market.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical Issues of Australian Computer Society

Phenomenon of Ethical Hacking

This report "Ethical Hacking" discusses the term hacker that has more than one meaning in the industry of information technology, hacker is considered a computer operator who gives preferences to gaining additional and far stretched information about computer systems and the information.... Initially, these intrusions were conducted for small purposes such as for fun and to steal computer time, but as restrictions increased, the degree of harm done by these break-ins became adverse....
7 Pages (1750 words) Report

Key Characteristics of Australian Media

The "Key Characteristics of australian Media" paper examines contemporary Australian media that focuses more on entertainment rather than information.... Australian Associated Press, John Fairfax Holdings, The Seven Network, APN News and Media, and many others shape the characteristics of australian media in a way that media's most important public role is largely dependent on the game played by private corporations.... Media characteristics differ in every country due to culture and beliefs as well as the bases that the society has established in terms of how media is defined and how it should function....
7 Pages (1750 words) Report

Record Sentence for Computer Sabotage

This essay "Record Sentence for computer Sabotage" discusses a situation with Apple that is more complex and deserves a more concrete explanation.... However, there is nothing stopping Apple from releasing an update to its Mac OS X system which stops the computer from running if an 'unauthorized' system is detected.... n the other hand, Yung-Hsun Lin also engaged in the act of sabotage as he went about sabotaging the computer systems of his employer in the hope that he would get to keep his job....
6 Pages (1500 words) Essay

ETHICS, LAW AND CHANGE MANAGEMENT

This can take place for the reason that "business and corporate ethics is a large and murky area as well as the place of work is full of ethical problems and issues.... These business philosophies are looking similar on the Although, the augmenting complexity of business, because of the extensive transformations and developments of the technologies and globalization offers an apparent indication that now we have in an extremely complex business environment and is turning out to be more complex due to novel ethical, cultural, social and legal transformations (Maniam & Teetz, 2009)....
20 Pages (5000 words) Essay

What Is Computer Ethics by James Moor

The paper "What Is Computer Ethics by James Moor" cites the code of ethics of the australian computer society that encompasses all Information and Communications Technology Professionals as its members.... James Moor commented on ethics in relation to information and computer technology in the following words: 'computer ethics is not a fixed set of rules which one shellacs and hangs on the wall.... Nor is computer ethics the rote application of ethical principles to a value-free technology....
4 Pages (1000 words) Article

Ethics of Metadata Retention

The second part is about International Codes of Ethics, whereby the australian computer society (ACS) and the Association for Computer Machinery (ACM) have been examined with the view of the metadata case study.... The third part is about the ethical issues of advancing technology, specifically ownership, privacy, and security.... One of the ethical issues cited in this report is that metadata retention may create a honeypot for cyber-criminals and hackers; thus, resulting in the infringement of privacy....
10 Pages (2500 words) Report

Unprofessional and Unethical Computer Technicians' Behaviors

his report is on theft and privacy of data as ethical issues.... The most common issues in computer ethics involve intellectual property (for example, copy write patent issues), privacy, and the effects that computer has in the society.... The paper 'The Issues That Arise from Unprofessional and Unethical computer Technicians' Behaviors' is a breathtaking example of a case study on human resources.... The paper 'The Issues That Arise from Unprofessional and Unethical computer Technicians' Behaviors' is a breathtaking example of a case study on human resources....
11 Pages (2750 words) Case Study

Cyber Ethics for Business

This research work deals with issues concerning cyber ethics pertaining to businesses, as well as individuals.... This research work deals with issues concerning cyber ethics pertaining to businesses, as well as individuals.... This research work deals with issues concerning cyber ethics pertaining to businesses, as well as individuals.... With regard to individuals, privacy, smartphones, Facebook, and cybersecurity issues will be analyzed....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us