Dr Stan Lee was extremely impressed with our computing firm’s – Brainiac Systems – development of Excelsior Emporium’s Database Management System (DBMS) utilising Microsoft Access and Decision Support...

1 answer below »
the assignment must be done by reading the only PDF i have sent and exaplain in your own words but you should not used other source to answers.



Dr Stan Lee was extremely impressed with our computing firm’s – Brainiac Systems – development of Excelsior Emporium’s Database Management System (DBMS) utilising Microsoft Access and Decision Support System (DSS) utilising Microsoft Excel (Assignment 1). Stan realises that the business has a lot to learn and that the business will need to invest considerable money to bring the business into the modern online business world, from their current single computer mail order set-up. Stan has contracted our firm to advise the business on how they can grow their mail order business into a cutting-edge online presence. What are the relationships that Stan Lee’s business should be aware of when using IT workers – how should they be managed, and what key ethical issues can arise in each.? · What are the six (6) typical relationships that IT workers are involved in? How do they relate to Stan Lee’s business? · How should IT workers manage each of the six (6) typical relationship? · For each of the six (6) typical relationships, provide two (2) examples of ethical issues that can arise. How could each ethical issue affect the business? · What is a professional code of ethics and how could employing IT workers from a professional association, like the Australian Computing Society, help Stan Lee’s business avoid the ethical issues that can arise? CH010.indd 428 Part 4 Information systems in our everyday lives Learning objectives LO1 Discuss the principles and limits of an individual’s right to privacy. LO2 Discuss how privacy is governed both within Australia and internationally. LO3 Identify the issues that are faced both in the workplace and through the use of the Internet in regards to privacy. LO4 Discuss what fairness of information usage is. LO5 Discuss the privacy policy considerations that organisations should establish. LO6 Identify the steps that an individual can take to protect their personal privacy. LO7 Discuss ethics and why it is important to act according to a code of ethics. LO8 Identify the trends that have increased the risk of using information technology in an unethical manner. LO9 Describe the key characteristics that distinguish a professional from other kinds of worker, and whether an IT worker is considered a professional. LO10 Discuss the relationships an IT worker must manage, and what key ethical issues can arise in each. LO11 Describe how codes of ethics, professional organisations, and certifi cation affect the ethical behaviour of IT professionals. LO12 Describe the common ethical issues that IT users should be aware of. Chapter 10 Privacy and ethics Principles Businesses must weigh the issue of a customer or employee’s right to privacy against the need to accumulate information to improve business processes. Information system professionals need to actively follow ethical behaviour in all aspects of their work. Practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work. 428 CH010.indd 428CH010.indd 428 6/30/10 6:43:10 PM6/30/10 6:43:10 PM Chapter 10 429Chapter 10 Privacy and ethics Privacy An important social issue in information systems involves privacy. In 1890, US Supreme Court Justice Louis Brandeis stated that the ‘right to be left alone’ is one of the most ‘comprehensive of rights and the most valued by civilised man’. Basically, the issue of privacy deals with this right to be left alone or to be withdrawn from public view. With information systems, privacy deals with the collection and use or misuse of data. Data on each of us is constantly being collected and stored. This data is often distributed over easily accessed networks and without our knowledge or consent. Concerns of privacy regarding this data must be addressed. For example, the US Department of Health and Human Services received over 26 000 complaints of medical privacy breaches between 2003 and 2007. The new privacy rules went into effect in the US in 2003 [1]. With today’s computers, the right to privacy is an especially challenging problem. More data and information are produced and used today than ever before. When someone is born, takes certain high school exams, starts a job, enrols in a university course, applies for a driver’s licence, purchases a car, serves in the military, gets married, buys insurance, gets a library card, applies for a charge card or a loan, buys a house, or merely purchases certain products, data is collected and stored somewhere in computer databases. A diffi cult question to answer is, ‘Who owns this information and knowledge?’ If a public or private organisation spends time and resources to obtain data on you, does the organisation own the data, and can it use the data in any way it desires? Government legislation answers these questions to some extent for federal agencies, but the questions remain unanswered for private organisations. From a consumer perspective, the protection of individual privacy is essential. Yet, many people use the Internet without realising that their privacy may be in jeopardy. A number of companies, including Jupiter Media Metrix and Nielsen/NetRatings, help other companies monitor visits to their Internet sites. These companies often call a random sample of Internet users to gain insights into the habits and desires of Internet users. Some companies hire people to visit chat rooms on the Internet to get important marketing information. Spyware can hijack your browser, generate pop-up ads, and report your activities to someone else over the Internet. Spyware consists of hidden fi les and information trackers that install themselves secretly when you visit some Internet sites. Many Internet sites use cookies to gather information about people who visit their sites. A cookie is a text fi le that an Internet company can place on the hard disk of a computer system. These text fi les keep track of visits to the site and the actions people take. To help prevent this potential problem, some companies are developing software to prevent these fi les from being placed on computer systems. CookieCop, for example, allows Internet users to accept or reject cookies by an Internet site. Microsoft’s Internet Explorer 8 browser also has the ability to screen websites according to their privacy policy. Using the Platform for Privacy Preferences (P3P), Internet Explorer 8 can summarise the privacy policy for websites and prevent information from being transmitted from your computer to a website that doesn’t meet certain criteria. In addition, preferences in Internet browsers can be set to restrict the use of cookies. Many browsers also allow users to easily delete cookies. LO1 Discuss the principles and limits of an individual’s right to privacy. Why learn about privacy and ethics? The use of information technology in business requires balancing the needs of those who use the information against the rights and desires of the people whose information may be used, and the underlying ethical treatment of that data by IT professionals. This chapter helps you understand the right to privacy and presents an overview of information technology developments that affect this right. It also provides a comprehensive look into the way the various privacy laws govern the use of information in Australia and internationally. Further, this chapter provides an introduction to ethics, ethics in business and the importance of ethics to IT professionals in their business relationships. This chapter also emphasises the signifi cance of IT professional organisations and their codes of ethics. CH010.indd 429CH010.indd 429 6/30/10 6:43:11 PM6/30/10 6:43:11 PM 430 Part 4 Information systems in our everyday lives Privacy and the government The US federal government is the largest collector of data in the United States. Over 4 billion records exist on citizens, collected by about 100 federal agencies, ranging from the Bureau of Alcohol, Tobacco, and Firearms to the Veterans Administration. Other data collectors include state and local governments and commercial and non-profi t organisations of all types and sizes. The government must be on guard at all times to safeguard this data. For example, two workers were fi red at the State Department when electronic monitoring detected unauthorised accessing of the personal passport information of three 2008 presidential candidates [2]. The European Union has a data-protection directive that requires fi rms transporting data across national boundaries to have certain privacy procedures in place. This directive affects virtually any company doing business in Europe, and it is driving much of the attention being given to privacy in the United States. Australian federal privacy laws Information technology, and especially the Internet, has signifi cantly increased the proliferation of collection and use of personal information, which has major implications for the privacy of individuals. In the past few decades, signifi cant laws have been passed regarding an individual’s right to privacy. Others relate to business privacy rights and the fair use of data and information. The Australian Federal Privacy Act 1988 (see Figure 10.1) contains eleven Information Privacy Principles (IPPs) that regulate how Australian and ACT government agencies manage personal information, and 10 National Privacy Principles (NPPs) that apply to Australian businesses. These two sets of principles govern and protect the privacy of all Australians. LO2 Discuss the how Privacy is governed both within Australian and internationally. The Information Privacy Principles (IPPs) are the base line privacy standards which the Australian and ACT government agencies need to comply with in relation to personal information kept in their records. They cover how and when personal information can be collected, how it should be used and disclosed, and storage and security. They also allow individuals to access that information and have it corrected if it is wrong. • IPP 1: Manner and purpose of collection: The information must be necessary for the agency’s work, and collected fairly and lawfully. • IPP 2: Collecting information directly from individuals: An agency must take steps to tell individuals why they are collecting personal information, what laws give them authority to Figure 10.1 Australian government: privacy website Source: http://www.privacy.gov.au/law/states CH010.indd 430CH010.indd 430 6/30/10 6:43:11 PM6/30/10 6:43:11 PM Chapter 10 431Chapter 10 Privacy and ethics collect it, and to whom they usually disclose it. This is often done by what is called an IPP 2 notice. • IPP 3: Collecting information generally: An agency must take steps to ensure the personal information it collects is relevant, up-to-date and complete and not collected in an unreasonably intrusive way. • IPP 4: Storage and
Answered Same DayMay 23, 2021

Answer To: Dr Stan Lee was extremely impressed with our computing firm’s – Brainiac Systems – development of...

Neha answered on May 26 2021
135 Votes
What are the six (6) typical relationships that IT workers are involved in? How do they relate to Stan Lee’s business?
IT workers and employers
The employers and the workers have a multifaceted and critical relationship which needs continuous effort from both sides to keep i
t well. An employer and an IT worker hardly on and fundamental aspect of this relationship unless an employment offer is accepted by the worker.
IT workers and Client
An IT worker gives services to different clients. The clients can be from outside the organization or internal. To establish the relationship between IT workers and clients each party needs to agree in providing value to each other. The IT worker provides services, hardware, and software at some cost for the given time duration. The client takes decision regarding the project based on the recommendations, information and alternatives and shared by the IT worker.
IT workers and suppliers
The IT workers needs to deal with multiple hardware common service providers and software. Most of the IT workers start a better working relationship needs to be maintained with the suppliers to encourage the sharing of ideas and flow of communication. Such information can lead to more cost-effective and innovative ways to use the products and services provided by the suppliers.
IT workers and other professionals
The professionals have a degree of loyalty with the follow members of the profession. This results in quick help to each other and slow down the criticising of each other in public.
IT workers and users
The IT users delivers the product for the benefit of organisation and also to increase the productivity. The IT workers must understand the needs of a user and its capabilities and the need of delivering products and services which our best to meet those needs in terms of subject, budget and time.
IT workers and society
The regulatory laws are used for the safety standards of services and products to help the society. But laws are not perfect and failed to provide safety against the negative results of products or the process. When the professionals can see the effect their product will have and they can also take actions to remove the potential public risk.
How should IT workers manage each of the six (6) typical relationship?
IT workers and employers
The IT workers can set an example and follow some policies related with the ethical use of information technology. The IT workers have the knowledge and skills to abuse system all data call allow the others to perform sure stop the software piracy is an area where the IT workers can violate laws and policies
IT workers and Client
The client trusts the ID workers to use their expertise and behave best interest for client. It is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here