This case study explores an ethical dilemma in information security and provides recommendations for actions. It discusses the ACS code of conduct and the importance of public interest.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: Ethical Dilemma0 Ethical Dilemma Case study Student name
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Ethical Dilemma1 Contents Case study 7................................................................................................................................................2 Introduction.................................................................................................................................................2 ACS code of conduct....................................................................................................................................2 Issues in the case study...............................................................................................................................2 Public Interest.............................................................................................................................................3 Recommendations for actions.....................................................................................................................3 References...................................................................................................................................................4
Ethical Dilemma2 Case study 7 Introduction Information security is necessary for an organization and it makes many effects of the growth of the organization. The Australian government has created a code of ethics to maintain a balance between ethical and non-ethical things in a company to avoid dilemmas(globalalliancepr.org, 2019). In addition, information is the most important thing for an organization and there are many issues created because of lack of knowledge about information sharing. It is necessary to take permission before sharing any permission of a person, firm, and others(ACSC, 2019). According to the given case study, Ruby is a public server and he had a responsibility to design a website for tourism. Ruby added different web links with their government website including global news channels. The issue is that those sites have provided news on court cases, which are currently under suppression. It is an embarrassing situation for the government department. ACS code of conduct In that case, these codes of conducts are affected because of that incident, which are professionalism, honesty, competence, the primacy of the Public interest. There are many issues in an organization because of a lack of knowledge. In addition, the organization should provide training and knowledge to their employees about ethical things and implement a code of ethics in their various business processes (Jules, 2018). Professional development is necessary to avoid such types of incidents, which was happened because of less knowledge about that particular thing. Jaspreet should support education, training, and professional development in ICT, which can fulfill the needs of employees and their career development(Dobran, 2019). The primacy of the public interest is affected in this incident because intellectual property rights are affected by that incident. Jaspreet should endeavor to extend public knowledge to avoid such types of the incident in the future and understanding of ICT to improve knowledge(globalalliancepr.org, 2019).
Ethical Dilemma3 Issues in the case study Ruby was unaware of those issues, which can damage the reputation of the government department and created an embracing situation because of that incident. There should be a training session about the uses of public website links in an organization or personal usages. Moreover, Jaspreet is IT manages in thatgovernment department and she is responsiblefor that incident. Jaspreet should take responsibility for that incident because she is the responsible person in that incident. She should check all the links and search for any matter, which can create embracing situation for the department. According to laws, that incident was not problematic until a local court gave rise to a publication suppression order. In addition, Jaspreet should honest for their responsibilities, face that incident, and implementproperinstructionsandpoliciesforinvolvingexternallinksinasite (teaching.csse.uwa.edu.au, 2019). Public Interest It is necessary to aware of our limitations and takes responsibility for our work. Therefore, Jaspreet must take responsibility for their work and provide training to their teammates to avoid such types of mistakes in the future. ISO/IEC 27001 standard framework can be used for IT governance and management. It used different stages for audit the organization and found different vulnerabilities of the organization, which can be a cause of financial and regulation losses( Cobb, 2010). Recommendations for actions Ruby should upgrade his knowledge and skills to work properly and increase awareness about ICT acts to avoid issues, which can affect the profession and relationship with the public. In addition, Jaspreet should encourage his colleague to continue his or her own professional development at a high level. The department should implement information security policies in which mention about uses of information for personal and professional uses. It must beneficial for protecting whole systems from
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Ethical Dilemma4 such types of incidents(Peltier, 2016).The Australian ICT act 1988 is applied for such types of incidents because the department used unauthorized links on their websites. References Cobb, M., 2010.ISO 27001 SoA: Creating an information security policy document.[Online] Available at:https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-security- policy-document [Accessed 12 March 2019]. ACSC, 2019.Australian Government Information Security Manual (ISM).[Online] Available at:https://acsc.gov.au/infosec/ism/index.htm [Accessed 4 April 2019]. Dobran, B., 2019.Information Security Risk Management: Plan, Steps, & Examples.[Online] Available at:https://phoenixnap.com/blog/information-security-risk-management [Accessed 31 May 2019]. globalalliancepr.org, 2019.Code of Ethics.[Online] Available at:https://www.globalalliancepr.org/code-of-ethics [Accessed 26 May 2019]. Jules, D., 2018.The International Code of Ethics for Professional Accountants: Key Areas of Focus for SMEs and SMPs.[Online] Available at:https://www.ifac.org/global-knowledge-gateway/ethics/discussion/international-code- ethics-professional-accountants-key [Accessed 22 May 2019]. Peltier, T. R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management.s.l.:Auerbach Publications. teaching.csse.uwa.edu.au, 2019.Australian Computer Society Code of Ethics.[Online] Available at:http://teaching.csse.uwa.edu.au/units/CITS3200/ethics/acs-ethics.htm [Accessed 12 March 2019].