Answer To: Task back to top Proceed according to the following instructions. Identify a recent (within the last...
Kuldeep answered on Aug 11 2020
Title of Media Article
Title of Media Article
SCHOOL OF COMPUTING AND MATHS, Charles Sturt University
Cyber security
Assignment 1: Three Distinct Perspectives of Applied Ethics
Your Name
Student Number
Word Count:
1. Introduction
Ethics are regarded as moral value, which helps to respect, integrity and other variables; to ensure the trustworthiness, privacy and security of the organizational environment, because the maintenance of the organization depends entirely on organization's environment. Conversely, ICT is also characterized by IT as well as communication technologies such as hardware, the Internet, software, and telephones for sharing moreover communicating basic data inside and outside the firm. So, I analysed the ethical issues or ethical dilemmas that my organization faced four months ago with information and communication technologies. Here I discuss about the ethical dilemma my organization faces as I am using workplace example so to maintain the confidentiality I am not using real names. I work in CBD organization and our organization is one of the reputed firms working in IT business. I and other members of the management team found some whistleblowers who continually shared the organization’s important and delicate data illegally with others. Workers use the Internet, printers and laptops and more software and hardware to share or reveal necessary or secret information. Staffs use their mobile phones to send or send secret data to others. In this case, employees share important information about the organization with the organization's competitors to obtain additional facilities and funding. Management team used to conduct research activities to look for who is stealing and sharing important data of the organization with competitors. Team notice that with the help of mobile phone and official email IDs important information was completely distributed with the help of some white collar criminals. Our team found that the upcoming strategies we discussed in previous conferences have been driven by competitors on the market. Organization’s marketing team complained to the higher level management about such fraudulent activity by sending an email to the official email ID.
2. Professional Ethics Perspectives
The purpose of ethics is to identify and analyse the ethical responsibilities of computer/information technology (IT) professionals. Cyber ethics is the area which identifies as well as analyses the ethical or moral responsibility of the computer professionals so that they take care of designing, developing, as well as maintaining computer hardware plus software systems in this manner is the job of computer professionals so that there are no network security issues. Suppose the programmer discovers that the software product she is working on is about to be released to the public for sale, even if it is unreliable because it contains "wrong" software, and she should whistle whenever he/she notices white-collar data security criminals. The individuals who see organize morals as a branch of expert morals may utilize analogies in different subject matters, for example, prescription and law (Bakshtanovskii & Sogomonov, 2007). They will bring up that in medicinal morals and legitimate morals, the fundamental focal point of the examination is to impact the person's ethical duty as an individual from these callings. By similarity, they will keep on arguing that a similar reason should apply to the field of system morals, that is, the fundamental focal point of system morals, and maybe even the focal point of flexibility ought to be on the ethical duty of PC/IT experts. For example, our organization hires programmers to design features that support anonymity, which can be used by individuals who post certain types of personal information (for example, personal diaries like Cutler) to share this information with a limited audience. The content of the blog, not the blog, is intended to be made available to the entire "online world." In addition, we encourage our organization to include applications that will certainly prevent all whistleblowers from being blocked by subtle data. Online articles are being advertised, and individuals begin to correctly understand the organization's work standards in society (Bustard, 2017). The management team also installed new software to easily track all reporting team members during their activities. Management has been appointed as a review team to promptly check the technical equipment used by our workers to prevent dishonest activities. The first option is for management to pay the group based on market prices and conduct an annual...