Assessment Details and Submission Guidelines Trimester T1, 2021 Unit Code BN201 Unit Title Professional Issues of Information Technology Assessment Author Min P Gurung Assessment Type Assignment 2 -...

1 answer below »
just need to do discussion and conclusion around 300 words


Assessment Details and Submission Guidelines Trimester T1, 2021 Unit Code BN201 Unit Title Professional Issues of Information Technology Assessment Author Min P Gurung Assessment Type Assignment 2 - Group Report Assessment Title Ethical issues arising from use of ICT technologies Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. a. Explain management concepts applied in ICT organisations and society; c. Interpret ethical, professional standards and codes of practice to ICT systems; d. Understand the importance of team work, collaboration and life-long learning in the workplace. Weight 30% Total Marks 100 Word range 1200 - 1500 Due Date Week-11 Sunday, 3rd /06/2021 at 23:59 PM. Submission Guidelines · All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. · The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. · Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension · If an extension of time to submit work is required, a Special Consideration Application must be submitted online to AMS follow the link below you may require to login. You must submit this application three working days prior to the due date of the assignment. https://online.mit.edu.au/ams/PublicDocs/Student/MIT_Special_Consideration_Application.pdf Academic Misconduct · Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: https://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/AcademicIntegrityPolicyAndProcedure For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: Min P GurungModerated by: Dr Karthik NagarajanMay, 2021 Assignment Description Students should form a group of three (3) students from the same laboratory class. You must not change the group membership unless approved by your tutor. Tutor will then allocate one of the topics listed in Table 1 to each group. You must adopt the structure that is included in the marking criteria Table (page 4) in analysing the allocated case study. All students must collaborate in this group assignment and contribute equally. Group leader should report their progress on a weekly basis to relevant tutor. Every student must participate in peer assessment on the Spark- Plus system. Table 1: List of topics for Assignment-2. Topic 1: Electronic Surveillance and the Bodyguard “Jon Kiggwe is a young aggressive entrepreneur, with a bright future. With several businesses doing well and a few start-ups with promising financial status, Jon is on his way to making a million dollars before his 25th birthday. Jon’s business meetings take him into tough neighbourhoods. So, for him to feel secure, Jon uses a team of professional security bodyguards to shadow him almost 24 hours a day”. “In his big 10 million dollar home, Jon receives a stream of guests, including both business associates and friends. His bodyguards, besides keeping an eye on him, also see to the orderly arrival and departure of the guests. Because of this, the bodyguards keep a permanent office and sleeping quarters at Jon’s mansion”. “Without informing them, Jon installed video recording and listening gadgets in the guards’ office and sleeping quarters to record their every conversation and movement. He feels safe that way!” [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London] Investigate and report on IT surveillance and social implications raised in this case. BN201 Professional Issues of Information Technology Page 5 of 5 Prepared by: Min P Gurung Moderated by: Dr Karthik Nagarajan May, 2021 Topic 2: Who Will Pay the Price for Flawed Software? “Peter Efon works as a programmer for a major software company. The company, Cybersoft, is launching itself to be a major Internet-based platform developer and it is soon to launch a web initiative. Peter is involved in the development of a crucial component of the initiative. The company has trust in Peter for he has worked for it since he left college 15 years ago. Since his arrival at the company, Peter has pioneered a number of major software development projects. Peter has followed, and is very much aware of, the losses suffered by other businesses due to defective software. He even knows that in 2000, US companies suffered a whopping $100 billion loss due to bad software. He and his company, Cybersoft, are determined to target quality as the major focus of their new web initiative. Peter dreams of the success of the web initiative and the recognition it might bring both to his company and him. However, a few days before the launch of the much-awaited initiative, as Peter makes his final quality checks, he discovers a flaw in the core component of the initiative whose magnitude he could not determine. To do so would mean a few weeks delay at best, a major blow to the company’s efforts. The company had mounted an advertising blitz on all major media outlets. Even a few weeks delay would cause major financial losses and the public’s loss of confidence in the right company. This must never happen. Peter decides to see to it”. [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London] Investigate and report on the role of risk management in software systems design and construction raised in this case. Marking criteria: You must use the following aspects as headings for your report. Aspects Description of the section Marks 1. Introduction to the case / scenario Introduce the ethical issue/s that arise in the case/scenario. 10 2. Identification of ethical values Identify at least 2 important ethical values related to the scenario and explain their relevance to the case. Use peer reviewed academic sources such as conference paper or Journal article. 20 3. Analysis of ethical issues using ethical theories framework Conduct an ethical analysis using ethical theories framework (consequence, duty, contract and character based theories). Use ethical principles from these theories, apply it to the scenario, and conduct your analysis. Arguments need to be stated clearly and backed up using peer-reviewed sources. 30 4. Discussion your findings Discuss your findings here in detail. What would be your final decision? Explain why this is the best decision. 20 5. Conclusion Write the final evaluative statement, and state your final decision. No new information should be included in the conclusion 10 6. Referencing Follow IEEE referencing style 10 Total 100 Marking Rubric: Grade Mark HD 80-100% DI 70-79% CR 60-69% P 50-59% Fail <50% excellent very good good satisfactory unsatisfactory introduction to the case/scenario /10 information is excellent. case is explained very succinctly case information is clearly presented case explanation is presented and good attempt at it case explanation is satisfactory case is not clear. hard to follow identification of ethical values /20 demonstrated excellent ability to think critically and sourced reference material appropriately. ethical values discussed using demonstrat ed very good ability to think critically. ethical values are listed and demonstrated ability to think critically and sourced reference material appropriately. ethical values demonstrated ability to think critically and did not source reference material appropriately. ethical values did not demonstrate ability to think critically and did not source reference material appropriately. peer reviewed explained are explained. need to be ethical values academic sources using academic justified clearly are not academic sources are not discussed sources integrated fully analysis of logic is clear and very good good attempt ethical theories no evidence of ethical issues easy to follow with discussion at explaining are integrated ethical theories using ethical strong arguments. of ethical the ethical within the case and their theories excellent theories in theories in the to some extent. relevance to framework integration of the context context of the however the case /30 ethical theories in of the case case using requires more the context of the supported some academic extensive work case through sources academic argument discussion of excellent very good good attempt made some poor discussion your findings discussion of discussion at discussion of effort in of findings. /20 findings in the case of findings findings in the discussing the lacks study. clear in the case case. final case study coherence and justification of study. final decision is findings. no justification their final decision decision in listed but clear evidence in the case using the case requires more of justification arguments explained work of decision conclusion is conclusion conclusion conclusion conclusion is conclusion excellent offering is very good discusses the includes not written /10 insights in to the and case and major summary of very well and case and summary provides findings work but has new of report insights in requires more information to case and work summary of work referencing clear styles with clear generally good sometimes lacks /10 excellent source of referencing referencing clear consistency references. style style referencing with many style errors excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" to="" the="" case/scenario="" 10="" information="" is="" excellent.="" case="" is="" explained="" very="" succinctly="" case="" information="" is="" clearly="" presented="" case="" explanation="" is="" presented="" and="" good="" attempt="" at="" it="" case="" explanation="" is="" satisfactory="" case="" is="" not="" clear.="" hard="" to="" follow="" identification="" of="" ethical="" values="" 20="" demonstrated="" excellent="" ability="" to="" think="" critically="" and="" sourced="" reference="" material="" appropriately.="" ethical="" values="" discussed="" using="" demonstrat="" ed="" very="" good="" ability="" to="" think="" critically.="" ethical="" values="" are="" listed="" and="" demonstrated="" ability="" to="" think="" critically="" and="" sourced="" reference="" material="" appropriately.="" ethical="" values="" demonstrated="" ability="" to="" think="" critically="" and="" did="" not="" source="" reference="" material="" appropriately.="" ethical="" values="" did="" not="" demonstrate="" ability="" to="" think="" critically="" and="" did="" not="" source="" reference="" material="" appropriately.="" peer="" reviewed="" explained="" are="" explained.="" need="" to="" be="" ethical="" values="" academic="" sources="" using="" academic="" justified="" clearly="" are="" not="" academic="" sources="" are="" not="" discussed="" sources="" integrated="" fully="" analysis="" of="" logic="" is="" clear="" and="" very="" good="" good="" attempt="" ethical="" theories="" no="" evidence="" of="" ethical="" issues="" easy="" to="" follow="" with="" discussion="" at="" explaining="" are="" integrated="" ethical="" theories="" using="" ethical="" strong="" arguments.="" of="" ethical="" the="" ethical="" within="" the="" case="" and="" their="" theories="" excellent="" theories="" in="" theories="" in="" the="" to="" some="" extent.="" relevance="" to="" framework="" integration="" of="" the="" context="" context="" of="" the="" however="" the="" case="" 30="" ethical="" theories="" in="" of="" the="" case="" case="" using="" requires="" more="" the="" context="" of="" the="" supported="" some="" academic="" extensive="" work="" case="" through="" sources="" academic="" argument="" discussion="" of="" excellent="" very="" good="" good="" attempt="" made="" some="" poor="" discussion="" your="" findings="" discussion="" of="" discussion="" at="" discussion="" of="" effort="" in="" of="" findings.="" 20="" findings="" in="" the="" case="" of="" findings="" findings="" in="" the="" discussing="" the="" lacks="" study.="" clear="" in="" the="" case="" case.="" final="" case="" study="" coherence="" and="" justification="" of="" study.="" final="" decision="" is="" findings.="" no="" justification="" their="" final="" decision="" decision="" in="" listed="" but="" clear="" evidence="" in="" the="" case="" using="" the="" case="" requires="" more="" of="" justification="" arguments="" explained="" work="" of="" decision="" conclusion="" is="" conclusion="" conclusion="" conclusion="" conclusion="" is="" conclusion="" excellent="" offering="" is="" very="" good="" discusses="" the="" includes="" not="" written="" 10="" insights="" in="" to="" the="" and="" case="" and="" major="" summary="" of="" very="" well="" and="" case="" and="" summary="" provides="" findings="" work="" but="" has="" new="" of="" report="" insights="" in="" requires="" more="" information="" to="" case="" and="" work="" summary="" of="" work="" referencing="" clear="" styles="" with="" clear="" generally="" good="" sometimes="" lacks="" 10="" excellent="" source="" of="" referencing="" referencing="" clear="" consistency="" references.="" style="" style="" referencing="" with="" many="" style="">
Answered Same DayJun 03, 2021BN 201

Answer To: Assessment Details and Submission Guidelines Trimester T1, 2021 Unit Code BN201 Unit Title...

Nithin answered on Jun 03 2021
136 Votes
Discussion :
Information and communication technology often faces large amounts of ethical issues
and security violations. One of the major ethical issues which arises from the use of ICT is one’s personal privacy. The information and communication industry makes sure that people have their own devices such as personalized hardware, operating systems etc which are often connected to their fellow teammates using internet or local area networks. When this network distribution scales to a larger scale, there is often a chance for disclosing private information which inturn violates the privacy of either an individual or a group. Another issue in information and communication technology...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here