PROFESSIONAL ISSUES IN INFORMATION TECHNOLOGY EDUCATION BACKGROUND SWINBURNE UNIVERSITY OF TECHNOLOGY SARAWAK CAMPUS 4235614 Fanny Angga Kartikasari 4216989 Abdul Afiz Nuhu 4204069 Abdulahi Baba Ari 4230590 Indeewari Kumarage 4213475 Norazreen Bt Mohd Rafi 4194071 Nur Azura Mohammad PIIT Project – University Information System Table of Contents Abstract ....................................................................................................................................
Words: 11457 - Pages: 46
card detail . because of hacking and other stuff their is possible way that our personal information will be leaked and can be use by criminal or for crime. and pizza is the product that most people ordering from home and give personal detail , so chances of misleading personal information. and that arise question on personal security. so to avoid this my suggestion is to visit near by shop or restaurant and buy require stuff. Is the way this pizza shop is using information ethical or unethical? Personal
Words: 354 - Pages: 2
storage works through web app then your browser address bar looks for “https” instead of http,this extra s tells the form is using secure HTTP.Standalone cloud storage app sometimes uses encryption for its internet exchange.When it comes to hacking then it will become more dangerous .The best thing is to avoid giving password to others.Social engineering which is one of the biggest danger for security in which a trust is created between hacker and user that allows user to handover his/her
Words: 686 - Pages: 3
the Children’s Online Privacy Protection Act (COPPA), which passed into law in 1998, and the Children’s Internet Protection Act (CIPA), which became law in 2000. This paper will discuss the advances in information technology that resulted in new ethical issues necessitating the creation of these acts. As the internet grew in popularity among the public, children began to use it more and more for everything from homework, to communicating, to searching for whatever information is out there (surfing)
Words: 975 - Pages: 4
film do you want the viewer to remember? I think the viewers should remember what Nurv stands for, What they do to people and there computers when they find out there hacking or finding out what there doing, and that Milo's girlfriend is working for them, and what ever Milo tells her, she tells them. Question 12: What ethical issues become apparent as you watch the film? It helps me to understand what companies to trust, and who to
Words: 306 - Pages: 2
5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual:
Words: 3707 - Pages: 15
differ for the following situations: Accessing the web at home, at work, and in a public setting, such as a library computer lab or Wi–Fi zone. What is the basis for your expectations? Is it legal to use your neighbors’ wireless Internet signal? Is it ethical? Explain your reasoning. In our lives we are subject to privacy invasion through the electronic retrieval of our personal information which may be duplicated and misused. At home, I find that I carry the expectation that my own personal information
Words: 326 - Pages: 2
Higher secondary education from Kumaran Asan memorial higher secondary school with 63 %( state board) in 2009. * 10th board in Hindu senior secondary school with 66 % (CBSE) in 2007. Additional Certifications: * Participated in Ethical Hacking Workshop Conducted by Anna University. * Completed Creative Leadership Course Conducted by Concordia University, Newyork at Alpha Arts and Science College. Personal skills: Comprehensive problem solving abilities, excellent verbal and
Words: 350 - Pages: 2
Methods”, Cooper and Shindler (2011) define ethics as “norms or standards of behavior that guide moral choices about our behavior and our relationships with others” (p.32). Our culture and believes is what helps define and determine what is considered ethical, and what is unethical. “The goal of ethics in research is to ensure that no one is harmed or suffers adverse consequences from research activities.” (Cooper & Shindler, 2011). In the past two decades, a parade of companies has imploded in the
Words: 1119 - Pages: 5
Explain the legal and ethical issues in relation to the use of business information Legal Data Protection Act 1998 Many businesses store and use information about people. The Data Protection Act protects the information being held about people from being misused. The information stored by businesses on databases must be: * Obtained fairly and lawfully * Used only for the purposes stated during collection * Adequate, relevant and not excessive in relation to intended use
Words: 402 - Pages: 2