...Unit 6 Evaluating Ethics LJ IT590 Legal and Ethical Issues in IT September 22, 2015 Professor Unit 6 Evaluating Ethics Introduction: Ethics has a vital role when it comes to companies and how they are run. Baase (2013) stated, “Many professional organizations have codes of professional conduct. They provide valuable guidance for new and young members” (p. 406). Baase (2013) stated, These codes provide general statement of ethical values and remind those that are in that particular profession that ethical behavior is essential to doing their job correctly and professionally. For this assignment I will identify stakeholders, the risks, issues, problems, and consequences. I will also discuss the benefits, responsibilities of the decision makers, the rights of the stakeholders, and the impact of the actions of the options on stakeholders. Identify Stakeholders: According to Businessdictionary.com (2015), “a stakeholder is a person, group, or organization that has interest or concern in an organization” (para. 1). Stakeholders can affect or be affected by changes within the organization such as objectives, issues, problems, and policies. For this organization the stakeholders are consists of employees, directors, owners, suppliers, the community, unions, and creditors. Risks, Issues, Problems, and Consequences: The problem that lies here is that there is a loophole in which those who are not authorized to have personnel access do have it; they are able to see confidential...
Words: 1074 - Pages: 5
...Veronica McNutt IT590 Unit 4 Assignment Professor DePriest September 2, 2014 Unit 4 Assignment Essay Questions Scenario 1: You are working as a designer for a university that offers a program in Computer Science. One of the tracts is computer security. One of your colleagues has recommended adding a course addressing network security. In this course, students learn about the history of networks and study network attacks that have caused significant damage to the network that was the subject of the attack. During the second term of this two semester course, the students are taught how to hack into a system, how to create malware (including Trojan horses, viruses, and worms), and how to perpetrate a DOS attack. Choose one or more of the ethical theories discussed in Chapter 2 and combine that with research to determine whether this course should be taught. Be sure to discuss both sides of the issue before taking a specific side. Would it make a difference if this were a graduate or PhD level course instead of an undergraduate level course? Explain. Disadvantages According to research, there are many concerns for offering hands-on training to students in a computer network class. According to Trabelsi & Ibrahim (2013), UAE conducted a survey of the students who used the skills learned in the hands-on DOS attack class. Eighty five percent of students used the skills learned outside the isolated network university lab. These concerns would be the following: that the...
Words: 1270 - Pages: 6
...Assignment 3 Privacy: Perspectives, Public Information, and U.S. Legislation Maria A Castro 11/25/2014 IT590 Legal and Ethical Issue in IT Professor Ellen Raineri Kaplan University Table of Contents Abstract 1. Part 1. Explain the Fair Information Practices Act. Compare and contrast the Code of Fair Information Practices with the private sector’s use of information. Is the private sector better at self-policing than the government, or should the government’s rules be extended to include private database ………………………………………………………………………….. 4 Part 2. What are your rights with regards to the information that you post or text? Does your level of privacy increase depending on your network/cell phone provider? The social media site that you are using? Explain.................................................................................................. 6 Part 3. Research legislation related to technology that has been proposed or passed within the last five years. Describe the legislation. Indicate whether it passed, or if it is still in consideration. Then, explain the benefits and drawbacks of the legislation you chose. ………………….. 8 Conclusion Reference Abstract This paper provide an overview of what are the main points of the Fair Information Practice Act, and how this regulations are impacting the use of private and personal information within the digital transmissions. The increase number of user’s texting and sharing information in social networks...
Words: 2301 - Pages: 10