NIT2201- IT Profession & Ethics ASSIGNMENT 1: An Analytical Essay on Online Privacy Assignment 1: worth 25% of the grade for NIT2201 This assignment is 1,500 words essay on Online Privacy. Submission...

1 answer below »
..safsadf


NIT2201- IT Profession & Ethics ASSIGNMENT 1: An Analytical Essay on Online Privacy Assignment 1: worth 25% of the grade for NIT2201 This assignment is 1,500 words essay on Online Privacy. Submission is to be made on the VU Collaborate Assignment 1 Dropbox on or before Week 8 Friday, 4:59 PM. NO LATE SUBMISSION WILL BE ACCEPTED. ZERO MARK FOR PLAGIARISM. You need to submit your essay as a word document. File name should include your student ID number. For example: Assignment1_s1234567.docx Assignment Objectives The purpose of the assignment is to help prepare you to: 1. understand some of the important IT privacy concerns encountered by individuals and organisations dealing with digital materials, particularly the ability to control what information you reveal about yourself over the Internet, and to control who could access that information; 2. improve your library and research skills in finding relevant materials to an assignment task; 3. practise correct referencing of researched materials; 4. practise your writing of an opinion piece that incorporates and synthesizes researched materials. Deliverables 1. The essay should be about 1500 words. The essay must follow standard academic essay format with correct usages of vocabularies, grammar and language. 2. This essay should include at least 5 academic references (journal articles and/ or conference papers). 3. The background case study should provide a good starting point for research. 4. Commence your research for your essay by reading chapters from the text book Quinn (Chapter 5: Information Privacy & Chapter 6: Privacy and the Government) & Reynolds (Chapter 4: Privacy). 5. This essay should follow APA referencing style. Do not copy or cut and paste information from sources. This is plagiarism. Provide in-text references for every source of information. Provide a Reference List at the end of your essay. 6. You are recommended to complete the assessment in stages: o Stage 1 (Week 5) – Brain storm – analysing the question/topic – Draft Mind map o Stage 2 (Week 6) – Research – Literature review - References o Stage 3 (Week 7) – Write a Draft o Stage 4 (Week 8)- Edit and Write Final draft - Final submission Assignment assistance will be provided during the tutorial class only. No assignment assistance will be provided via email. Page 2 of 5 Page 1 of 6 Task details Online Privacy Read the background case study as a starting point. Then research on two more case studies on online privacy, your essay should include your own opinion and the following issues in the discussion (not as a question/answer format, but as an embedded discussion in the essay): 1. What is privacy? What is digital privacy? Describe digital privacy in Australia. 2. What are the issues of concern raised around digital materials? 3. What are the options to consider ensuring digital privacy? 4. What are the measures to ensure users are protected on platforms like Facebook, Google and iCloud? 5. Do all people need same level of privacy? Do some, who are more vulnerable in some way, need privacy more than others? 6. Do you believe that our legislators should pass new laws to protect privacy, given the new technologies and products that now collect information about us? 7. Should individuals bear the responsibility of protecting their own privacy? In your experience, do most people understand the way in which their information is accessed, collected, or otherwise used online? 8. Discuss a functional comparison between current privacy law in the European Union and in the Australia, as such laws relate to the online privacy. In completing this assignment, you are encouraged to discuss the topic with your classmates, however, you will submit an individual essay. Your writing needs to be supported by references. To complete your essay, you will need to conduct further research online and in the library to address the given questions. The references need to come from legitimate sources. Each reference needs to be given with an in-text reference and listed at the end of your essay (not part of your word count). A well supported essay will include at least 5 references. You must use APA referencing style correctly and consistently. Plagiarism is unacceptable and not tolerated by the University. Any person found plagiarising will face disciplinary action. Specific details are available in the policy on Academic Honesty and Preventing Plagiarism. Background case study Article published at the Office of the Australian Information Commissioner website. https://www.oaic.gov.au/updates/news-and-media/retail-reward-programs-whats-the-price-of-loyalty Retail reward programs: what’s the price of loyalty? Wednesday, 13 July 2016 https://www.oaic.gov.au/updates/news-and-media/retail-reward-programs-whats-the-price-of-loyalty/ Page 3 of 5 Over 80 percent of us have a loyalty card — but are we aware of how much of our personal information is collected by each card? And do we know how, and where, it is used? The Australian Privacy Commissioner has released an assessment of Coles and Woolworths’ loyalty programs, the two largest in the country, to see if the personal information they collect is handled transparently and in accordance with the Privacy Act 1988. The assessments show that both Coles’ flybuys and Woolworths Rewards each had appropriate privacy notices that were consistent with their practices. However, it’s important that we are all aware of the bargain we are making with retailers when we sign up for loyalty programs. Each swipe of our loyalty card is another package of information that can form a picture about our identity. Businesses collect this information because it’s of great value to them, and so individuals need to make sure that they’re also getting a fair deal from the exchange. A key this is to read privacy policies, ask questions about how your data is used, and understand the bargain you’re entering when signing up. Read our ten tips to protect your privacy for more advice on protecting your personal information. You can also call our office if you have any questions or concerns on 1300 363 992. Student Name:........................................................... Student ID................................ NIT 2201: IT Profession & Ethics Possible Assignment 1: Marking scheme marks: 50 E S S A Y C O N T E N T Topic Inadequate Needs improvement Acceptable Well done Points Background Privacy/Digital Privacy/ User profiling Not done or done inaccurately. (0-1) Attempted but generally poorly done. Information not clear. (2-3) Technically correct but either incomplete or a rambling description given. (4) Explanations and description are correct and coherent throughout the essay. (5-7) Loss of online privacy and threats /Comparing legislation on online privacy Insufficient information or missing information. (0-2) Attempted but generally poorly done. Information not clear. (3-4) Satisfactory discussion of all topics. Information is generally correct. (5) Explanations and description are correct and coherent throughout the essay Information is correct and relevant. (6-8) Essay Content (32) Essay Structure (18) Total http://www.theloyaltypoint.com.au/ http://www.theloyaltypoint.com.au/ https://www.oaic.gov.au/privacy-law/assessments/loyalty-program-assessment-flybuys-coles https://www.oaic.gov.au/privacy-law/assessments/loyalty-program-assessment-flybuys-coles https://www.oaic.gov.au/privacy-law/assessments/loyalty-program-assessment-woolworths-rewards https://www.oaic.gov.au/privacy-law/assessments/loyalty-program-assessment-woolworths-rewards https://www.oaic.gov.au/individuals/privacy-fact-sheets/general/privacy-fact-sheet-8-ten-tips-to-protect-your-privacy https://www.oaic.gov.au/individuals/privacy-fact-sheets/general/privacy-fact-sheet-8-ten-tips-to-protect-your-privacy Page 4 of 5 Opinion - Two case studies on Online Privacy No opinion offered or the opinion is rambling and unsupported. (0-2) Opinion is offered but it is presented in a rambling fashion. An attempt to support the opinion has been made. (3-4) Opinion is given and generally supported by references. More detail needs to be given. (5) The writer contrasts their opinion with others, offering references and evidence for their stand. (6-8) Introduction & Conclusion A very poor attempt at Introduction and Conclusion. (0-1) Some attempt at writing the Introduction and Conclusion. But, not to an appropriate level, nor is clear. (2-3) Adequate Introduction and Conclusion sections. (4) Introduction presents a good background of the essay. Conclusion includes the summary of the major issues discussed. The viewpoint of author is clear. (5) Referencing No references No paraphrasing. No in-text references. (0) Few references. Incorrect use. Incorrectly formatted as per APA style guide. No paraphrasing. No in-text references. (1-2) Few references. Appropriately used. Correctly formatted as per APA style guide. Good attempt at paraphrasing
Answered Same DaySep 12, 2021NIT2201Victoria University

Answer To: NIT2201- IT Profession & Ethics ASSIGNMENT 1: An Analytical Essay on Online Privacy Assignment 1:...

Amit answered on Sep 14 2021
135 Votes
Title of the assignment: Assignment - 1
Student’s name:
Student ID:
Professor’s name:
Course title: NIT2201- IT Profession & Ethics
Date: 9/14/2019
Table of Contents
1.    Introduction to privacy, digital privacy and its level in Australia    3
2.    Issues with digital materials    3
3.    Options for maintaining digital pri
vacy    4
4.    Ensuring privacy on social platforms    5
5.    Privacy level and access rights    5
6.    Law requirement for privacy protection    6
7.    Individual responsibility to maintain privacy    6
8.    Comparison of Australian and European privacy laws    7
9.    References:    8
1. Introduction to privacy, digital privacy and its level in Australia
The fundamental and basic right of all humans used to maintain their dignity is considered as the privacy. The complete foundation of modern society is based on set privacy of information. The privacy provides a mechanism of protection against any unwanted external interference. The boundaries of communication are maintained by privacy for making easy life of humans.
When the protection rights of unwanted external interference of digital information is required, then, digital privacy takes place. The digital privacy is a combination of individual privacy, stored information access privacy and privacy in developed communication. The implementation of digital privacy mostly required for online information stores. The online executed businesses and stores makes requirement of digital privacy for their consumers or individuals.
Australian government is very conscious about maintaining digital privacy in their country. The Australian government developed a privacy act in 1988 for the protection of individual information which may be generated and used by private agencies or government bodies. There are 13 principles are defined in this privacy act and most of the private information are protected by it.
2. Issues with digital materials
The digital materials are having long life and cannot fluid with respect to time. But use of digital materials brings certain issues to its users and such important issues with digital material are:
1. Data storage: The digital material needs storage on a secured drive or server. Maintaining physical security and security from attackers on stored digital material is important issue.
2. Maintaining data format and their meaning: The digital materials are stored in different formats. Each digital document has certain meaning for user and this meaning is decided by the selected format. So, selection of proper format is important issue with digital documents.
3. User trust towards digital material: The editing and updating digital documents are very easy. So, maintaining user trust towards digital documents is important issue.
4. Dependencies and context of digital material: The digital material has different associated dependencies and context for end user. Maintaining these dependencies and context of digital material is big challenge and issue.
3. Options for maintaining digital privacy
Maintaining digital privacy is high challenge and requires different options for its management. The following options can be used for maintaining digital privacy:
1. The response of user must...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here