Ethics in IT
VerifiedAdded on 2023/01/13
|9
|2309
|2
AI Summary
This report discusses the importance of ethics in IT and the need to secure personal information of customers. It explores the implementation of secure networks and cloud-based services for information security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: Ethics in IT 0
Ethics in IT
Report
Student names
Ethics in IT
Report
Student names
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Ethics in IT 1
Table of Contents
Part- a...............................................................................................................................................2
Part –b..............................................................................................................................................3
Part –c..............................................................................................................................................4
Part –d..............................................................................................................................................5
References........................................................................................................................................6
Table of Contents
Part- a...............................................................................................................................................2
Part –b..............................................................................................................................................3
Part –c..............................................................................................................................................4
Part –d..............................................................................................................................................5
References........................................................................................................................................6
Ethics in IT 2
Part- a
OZ Dispatch is a well-known company in marketplace. They collect personal information of
their customers to deliver their orders. They are generally using a registration form, which is
used to collect this information, such as contact numbers, addresses, e-mail-id and payment
details. Therefore, it is an important responsibility to secure their personal information from any
data breaches. It is a moral duty of all the staff members that they secure and safe the
information of their customers. Ethics are important for an organization to make their reputation
in market. All staff members can access the database of OZ Dispatch and get customers
information to deliver packet. The delivery staff members are responsible to secure customer’s
personal information because it is sensitive and confidential. Data breaches can be possible for
personal benefits from internal sources, such as staff members. According to (LEE, et al., 2016),
delivery staff should follow the ethical framework of business and do not share customers
information to anyone for their personal benefits.
There are different types of ethics based on their culture, such as business ethics, personal ethics,
and virtue ethics. Therefore, it is necessary to follow business ethic by delivery staff of OZ
Dispatch (Mason, 2017). Based on (McDermid, 2008), government is strict about the rule and
regulations of data security. Information Communication and Technology (ICT) is highly used in
business to take competitive advantage and save cost and money (McDermid, 2015).
In business, ethics matter a lot, because reputation is cannot earn from money. Therefore, it is
necessary to make trust between their customers, suppliers, and stakeholders. It affects the
performance of the employees and organization. OZ Dispatch is not having an information
management system. Therefore, it is a tough job to manage customer’s personal information in a
personal computer system or on the web without any security system (Meredith , 2018).
According to ( Norén, 2016), ethics are beneficial to make a good image in front of their
customers. In present era, Information Technology (IT) is highly used in the different business
processes. Therefore, it is necessary to secure them from internal and external threats and
vulnerabilities. Delivery staff should follow the ethics and secure personal information of tier
customer from other persons, which can use that information for their personal benefits. It is also
Part- a
OZ Dispatch is a well-known company in marketplace. They collect personal information of
their customers to deliver their orders. They are generally using a registration form, which is
used to collect this information, such as contact numbers, addresses, e-mail-id and payment
details. Therefore, it is an important responsibility to secure their personal information from any
data breaches. It is a moral duty of all the staff members that they secure and safe the
information of their customers. Ethics are important for an organization to make their reputation
in market. All staff members can access the database of OZ Dispatch and get customers
information to deliver packet. The delivery staff members are responsible to secure customer’s
personal information because it is sensitive and confidential. Data breaches can be possible for
personal benefits from internal sources, such as staff members. According to (LEE, et al., 2016),
delivery staff should follow the ethical framework of business and do not share customers
information to anyone for their personal benefits.
There are different types of ethics based on their culture, such as business ethics, personal ethics,
and virtue ethics. Therefore, it is necessary to follow business ethic by delivery staff of OZ
Dispatch (Mason, 2017). Based on (McDermid, 2008), government is strict about the rule and
regulations of data security. Information Communication and Technology (ICT) is highly used in
business to take competitive advantage and save cost and money (McDermid, 2015).
In business, ethics matter a lot, because reputation is cannot earn from money. Therefore, it is
necessary to make trust between their customers, suppliers, and stakeholders. It affects the
performance of the employees and organization. OZ Dispatch is not having an information
management system. Therefore, it is a tough job to manage customer’s personal information in a
personal computer system or on the web without any security system (Meredith , 2018).
According to ( Norén, 2016), ethics are beneficial to make a good image in front of their
customers. In present era, Information Technology (IT) is highly used in the different business
processes. Therefore, it is necessary to secure them from internal and external threats and
vulnerabilities. Delivery staff should follow the ethics and secure personal information of tier
customer from other persons, which can use that information for their personal benefits. It is also
Ethics in IT 3
legal according to law that they should safe information of their customers from any data breach
or cyber-attack ( Norén, 2016).
Part –b
OZ Dispatch’s delivery staff will be appointed at 20 collection and distribution centres. It will
have 20 delivery staff, the manager, and there will be no other staff member for any kind of
work. The company will provide smartphones with necessary application for business purpose.
They will be connected with the personal Wi-Fi connection and they are having an internet
collection to manage all the works. It is necessary to secure the personal data of customers in
mobile phones and server. The company is not requires any cloud-based solution for the
protection of business and customer information. They will implement a highly secure network
for the security of business and customers information in servers.
It is a way to secure all the information of customers and business information in server through
highly secure network. According to (Campbell, 2016), manager will have responsibilities to
secure the information at servers as well as on the network. He or she will create policies in
firewalls configuration to secure unauthorized access of network and servers. There is much
vulnerability in a network, such as firewall configuration, weak password, and many others. In
addition, network is secure through firewalls as well as patches for servers and operating
systems, which are provided by the vendors. Therefore, it is necessary to install patches and
latest operating system to secure network and data. ISO/IEC 27001 standard is securing all the
resource of the company and monitor all the activities by the information security mangers using
different policies for security purpose. It will stop to all the staff members from handling
information unethically. All the delivery staff will have a limited access of the system and they
cannot make any changes in database of the company. It will secure the customers and business
information at servers ( Cobb, 2010).
OZ Dispatch will measure risks of unethically access of information system by any employees
using firewall and security policies. It will provide a list of unauthorized access with related
information, such as physical address and IP address of machine. It uses to identify the person,
who has tried to access the system without permission. Ethical hacking is way to secure the data
of an organization. However, organization will secure their resources from unethical processes
legal according to law that they should safe information of their customers from any data breach
or cyber-attack ( Norén, 2016).
Part –b
OZ Dispatch’s delivery staff will be appointed at 20 collection and distribution centres. It will
have 20 delivery staff, the manager, and there will be no other staff member for any kind of
work. The company will provide smartphones with necessary application for business purpose.
They will be connected with the personal Wi-Fi connection and they are having an internet
collection to manage all the works. It is necessary to secure the personal data of customers in
mobile phones and server. The company is not requires any cloud-based solution for the
protection of business and customer information. They will implement a highly secure network
for the security of business and customers information in servers.
It is a way to secure all the information of customers and business information in server through
highly secure network. According to (Campbell, 2016), manager will have responsibilities to
secure the information at servers as well as on the network. He or she will create policies in
firewalls configuration to secure unauthorized access of network and servers. There is much
vulnerability in a network, such as firewall configuration, weak password, and many others. In
addition, network is secure through firewalls as well as patches for servers and operating
systems, which are provided by the vendors. Therefore, it is necessary to install patches and
latest operating system to secure network and data. ISO/IEC 27001 standard is securing all the
resource of the company and monitor all the activities by the information security mangers using
different policies for security purpose. It will stop to all the staff members from handling
information unethically. All the delivery staff will have a limited access of the system and they
cannot make any changes in database of the company. It will secure the customers and business
information at servers ( Cobb, 2010).
OZ Dispatch will measure risks of unethically access of information system by any employees
using firewall and security policies. It will provide a list of unauthorized access with related
information, such as physical address and IP address of machine. It uses to identify the person,
who has tried to access the system without permission. Ethical hacking is way to secure the data
of an organization. However, organization will secure their resources from unethical processes
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Ethics in IT 4
from internal as well as external sources. Security policies are implemented on the all employees
and they are responsible for their computer system and process. Therefore, system can be more
secure form cyber-attack.
Part –c
In present era, most of the organizations are expending business in market. Therefore, it is
necessary to implement cloud-based services in InfoSec program of OZ Dispatch. Cloud-based
approach in business is most popular thing in present time. It will provide competitive advantage
to the organization as well as more security and flexibility. It is a basic need of an information
system to include cloud-based services to enhance their services. Data warehouse and business
intelligence will be beneficial for OZ dispatch in terms of economic advantages. Business
intelligence will provide a new face to their market. It will helpful in the decision-making.
According to (teaching.csse.uwa.edu.au, 2019), ethics should maintain in the system to avoid
unethical activities in a system by staff member. According to many survey, it founded that
internal staff members are also provided help in data breaches for their personal benefits.
Therefore, it is necessary to design code of ethics to secure customers and business data, such as
sales and product information. To make more secure, they can involve biometric authentication
to verify details of all the employees. It will provide high security to the organization. It is not
too much expensive, as it will require basic biometric devices and software to manage all the
things. Information security requires holistic approaches to secure customers and business
information from the cyber-attacks as well as internal unethical access of personal data of the
customers, such as emails, mobile numbers, and many others (Soomro, et al., 2016).
Business Intelligence is highly used in present time in analysis of data by the data analyst, which
will provide analysis reports and analysis templates. Those things are useful for the decision-
making by managing director and other mangers (Baars & Kemper, 2008).
They should implement latest server, which can manage different domains of the organization, as
the company will establish headquarter at a single place. Therefore, they will require access of
all the systems and sites from headquarter. The company can manage all the things from a single
place, with the help of better servers and network. They will have large volumes of product,
sales, and customers information in their system. Therefore, they will involve data warehouse to
from internal as well as external sources. Security policies are implemented on the all employees
and they are responsible for their computer system and process. Therefore, system can be more
secure form cyber-attack.
Part –c
In present era, most of the organizations are expending business in market. Therefore, it is
necessary to implement cloud-based services in InfoSec program of OZ Dispatch. Cloud-based
approach in business is most popular thing in present time. It will provide competitive advantage
to the organization as well as more security and flexibility. It is a basic need of an information
system to include cloud-based services to enhance their services. Data warehouse and business
intelligence will be beneficial for OZ dispatch in terms of economic advantages. Business
intelligence will provide a new face to their market. It will helpful in the decision-making.
According to (teaching.csse.uwa.edu.au, 2019), ethics should maintain in the system to avoid
unethical activities in a system by staff member. According to many survey, it founded that
internal staff members are also provided help in data breaches for their personal benefits.
Therefore, it is necessary to design code of ethics to secure customers and business data, such as
sales and product information. To make more secure, they can involve biometric authentication
to verify details of all the employees. It will provide high security to the organization. It is not
too much expensive, as it will require basic biometric devices and software to manage all the
things. Information security requires holistic approaches to secure customers and business
information from the cyber-attacks as well as internal unethical access of personal data of the
customers, such as emails, mobile numbers, and many others (Soomro, et al., 2016).
Business Intelligence is highly used in present time in analysis of data by the data analyst, which
will provide analysis reports and analysis templates. Those things are useful for the decision-
making by managing director and other mangers (Baars & Kemper, 2008).
They should implement latest server, which can manage different domains of the organization, as
the company will establish headquarter at a single place. Therefore, they will require access of
all the systems and sites from headquarter. The company can manage all the things from a single
place, with the help of better servers and network. They will have large volumes of product,
sales, and customers information in their system. Therefore, they will involve data warehouse to
Ethics in IT 5
manage all the data in a structured way. All the processes are having unstructured data, which are
not suitable for analysis.
manage all the data in a structured way. All the processes are having unstructured data, which are
not suitable for analysis.
Ethics in IT 6
Part –d
For OZ Dispatch, it must follow the defend security policies and standards, which are provided
by the Australian government and agencies. It is a necessary step to secure the information
security system more secure from cyber-attacks and internal security. According to ( Cobb,
2010), ISO/IEC27001 standard is beneficial to secure different resources of the organization,
such as servers, networks, computers, and many others. It is a necessary and required standard to
secure information assets of an organization. Australian government Information Security
Manual (ISM) will be followed to design a secure network for the customers and business
information security (ACSC, 2019). ISM secures all the tangible and non-tangible resources of
the organization, such as data, security system, and many others. It will prevent all resources
form cyber-attacks as well as any disaster. There should be a backup server that has a backup of
all the data and information of customers and business, which is useful for the business
continuity after any disaster or cyber-attack on the system.
Ethical framework of IT will be followed to make secure whole system form internal and
external attacks. For personal benefits, employees provide their personal authentication to others.
Therefore, it is necessary to implement the entire security essential to secure all the system.
Information security policies will be designed based on the Australian government and computer
security agencies guidelines. It will stop all the bad things in the network and it will provide
details responsibilities of employees in the organization (Dunham, 2018).
According to ( Kostadinov, 2018), information security policy is playing a huge role in security
of data. That policy is having many key elements, which will provide security to personal
information of customers and business. According to (Humphreys, 2008), information security
standards are beneficial for the governance, compliance and risk management of the
organization. It will provide vulnerabilities of the whole system using risk assessment and it will
provide proper risk controls to handle those risks, if they will occur in future. Organization
should make code of conduct to secure their resources and information assets through laws, rule,
regulations, and policies. They can also use intellectual property rights for their resources and
innovations. It makes them secure as per the rules and laws. OZ dispatch will secure their
servers and network through security policies and firewalls configurations.
Part –d
For OZ Dispatch, it must follow the defend security policies and standards, which are provided
by the Australian government and agencies. It is a necessary step to secure the information
security system more secure from cyber-attacks and internal security. According to ( Cobb,
2010), ISO/IEC27001 standard is beneficial to secure different resources of the organization,
such as servers, networks, computers, and many others. It is a necessary and required standard to
secure information assets of an organization. Australian government Information Security
Manual (ISM) will be followed to design a secure network for the customers and business
information security (ACSC, 2019). ISM secures all the tangible and non-tangible resources of
the organization, such as data, security system, and many others. It will prevent all resources
form cyber-attacks as well as any disaster. There should be a backup server that has a backup of
all the data and information of customers and business, which is useful for the business
continuity after any disaster or cyber-attack on the system.
Ethical framework of IT will be followed to make secure whole system form internal and
external attacks. For personal benefits, employees provide their personal authentication to others.
Therefore, it is necessary to implement the entire security essential to secure all the system.
Information security policies will be designed based on the Australian government and computer
security agencies guidelines. It will stop all the bad things in the network and it will provide
details responsibilities of employees in the organization (Dunham, 2018).
According to ( Kostadinov, 2018), information security policy is playing a huge role in security
of data. That policy is having many key elements, which will provide security to personal
information of customers and business. According to (Humphreys, 2008), information security
standards are beneficial for the governance, compliance and risk management of the
organization. It will provide vulnerabilities of the whole system using risk assessment and it will
provide proper risk controls to handle those risks, if they will occur in future. Organization
should make code of conduct to secure their resources and information assets through laws, rule,
regulations, and policies. They can also use intellectual property rights for their resources and
innovations. It makes them secure as per the rules and laws. OZ dispatch will secure their
servers and network through security policies and firewalls configurations.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Ethics in IT 7
References
Cobb, M., 2010. ISO 27001 SoA: Creating an information security policy document. [Online]
Available at: https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-
security-policy-document
[Accessed 12 March 2019].
Kostadinov, D., 2018. Key Elements of an Information Security Policy. [Online]
Available at: https://resources.infosecinstitute.com/key-elements-information-security-policy/
[Accessed 12 March 2019].
Norén, L., 2016. Law and Ethics for Data Managers. [Online]
Available at: https://cds.nyu.edu/law-ethics-data-managers-spring-2016-ds-ga-3001-003/
ACSC, 2019. Australian Government Information Security Manual (ISM). [Online]
Available at: https://acsc.gov.au/infosec/ism/index.htm
[Accessed 4 April 2019].
Baars, H. & Kemper, H. G., 2008. Management support with structured and unstructured data—
an integrated business intelligence framework. Information Systems Management, 25(2), pp.
132-148.
Campbell, T., 2016. The Information Security Manager. Berkeley: Apress.
Dunham, . R., 2018. Information Security Policies: Why They Are Important To Your
Organization. [Online]
Available at: https://linfordco.com/blog/information-security-policies/
[Accessed 12 March 2019].
Humphreys, E., 2008. Information security management standards: Compliance, governance and
risk management. information security technical report, 13(4), pp. 247-255.
LEE, W. W., ZANKL, W. & CHANG, H., 2016. An Ethical Approach to Data Privacy
Protection. Isaca Journal.
References
Cobb, M., 2010. ISO 27001 SoA: Creating an information security policy document. [Online]
Available at: https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-
security-policy-document
[Accessed 12 March 2019].
Kostadinov, D., 2018. Key Elements of an Information Security Policy. [Online]
Available at: https://resources.infosecinstitute.com/key-elements-information-security-policy/
[Accessed 12 March 2019].
Norén, L., 2016. Law and Ethics for Data Managers. [Online]
Available at: https://cds.nyu.edu/law-ethics-data-managers-spring-2016-ds-ga-3001-003/
ACSC, 2019. Australian Government Information Security Manual (ISM). [Online]
Available at: https://acsc.gov.au/infosec/ism/index.htm
[Accessed 4 April 2019].
Baars, H. & Kemper, H. G., 2008. Management support with structured and unstructured data—
an integrated business intelligence framework. Information Systems Management, 25(2), pp.
132-148.
Campbell, T., 2016. The Information Security Manager. Berkeley: Apress.
Dunham, . R., 2018. Information Security Policies: Why They Are Important To Your
Organization. [Online]
Available at: https://linfordco.com/blog/information-security-policies/
[Accessed 12 March 2019].
Humphreys, E., 2008. Information security management standards: Compliance, governance and
risk management. information security technical report, 13(4), pp. 247-255.
LEE, W. W., ZANKL, W. & CHANG, H., 2016. An Ethical Approach to Data Privacy
Protection. Isaca Journal.
Ethics in IT 8
Mason, R. O., 2017. Four ethical issues of the information age. In Computer Ethics, 1(1), pp. 41-
48.
McDermid, D., 2008. Ethics in ICT: An Australian Perspective, Frenchs Forest N.S.W..
Australia: Pearson Education Australia.
McDermid, D., 2015. Ethics in ICT: an Australian perspective. 2nd ed. Australia : Pearson
Higher Education AU..
Meredith , D., 2018. Ethical Hacking: Vulnerability Analysis. [Online]
Available at: https://www.pluralsight.com/courses/ethical-hacking-vulnerability-analysis
[Accessed 14 March 2019].
Soomro, Z. A., Shah, M. H. & Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, pp.
215-225.
teaching.csse.uwa.edu.au, 2019. Australian Computer Society Code of Ethics. [Online]
Available at: http://teaching.csse.uwa.edu.au/units/CITS3200/ethics/acs-ethics.htm
[Accessed 12 March 2019].
Mason, R. O., 2017. Four ethical issues of the information age. In Computer Ethics, 1(1), pp. 41-
48.
McDermid, D., 2008. Ethics in ICT: An Australian Perspective, Frenchs Forest N.S.W..
Australia: Pearson Education Australia.
McDermid, D., 2015. Ethics in ICT: an Australian perspective. 2nd ed. Australia : Pearson
Higher Education AU..
Meredith , D., 2018. Ethical Hacking: Vulnerability Analysis. [Online]
Available at: https://www.pluralsight.com/courses/ethical-hacking-vulnerability-analysis
[Accessed 14 March 2019].
Soomro, Z. A., Shah, M. H. & Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, pp.
215-225.
teaching.csse.uwa.edu.au, 2019. Australian Computer Society Code of Ethics. [Online]
Available at: http://teaching.csse.uwa.edu.au/units/CITS3200/ethics/acs-ethics.htm
[Accessed 12 March 2019].
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.