Ethics, Sustainability, and Social Impact
VerifiedAdded on 2022/12/27
|10
|3017
|38
AI Summary
This document discusses the importance of ethics, sustainability, and social impact in information technology and international business. It explores topics such as unrestricted access to personal information, worst-case scenarios of digital communications, data protection in private email accounts, relevant ethical principles in IT, arguments for closing the digital divide, and ethical issues in international business. The document also provides key messages from research reports on garment worker exploitation and forced labor in the ICT sector.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Ethics Sustainability
and Social Impact
and Social Impact
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction.....................................................................................................................................4
Main Body.......................................................................................................................................4
Task A Ethics in information technology.......................................................................................4
1.Should law enforcement agencies be allowed unrestricted access to such complete and
intrusive information on people’s lives?....................................................................................4
2.What would be the worst-case scenario you could personally imagine in regard to
unrestricted access to the digital communications of the general population?..........................4
3.Should we afford data stored in private email accounts as much protection as letters in a
locked desk drawer, that is, stored where law enforcement agencies would otherwise need a
warrant to access and review the documents?............................................................................5
4.Describe which ethical principles are most relevant to information technology. Support
each of them with an example in relation to IT..........................................................................6
5.What are the arguments as to why closing the digital divide is important?............................6
Task B Ethical issues in international business...............................................................................7
1.With examples, identify which ethical principles are most relevant to international business.
....................................................................................................................................................7
2.What were the research methods and were they sound?.........................................................7
3.What are the key messages?....................................................................................................8
4. What were the research methods and were they sound?........................................................8
5.What are the key messages?....................................................................................................8
6. Are there any common observations to be made from both reports?.....................................9
Conclusion.......................................................................................................................................9
References.....................................................................................................................................10
Introduction.....................................................................................................................................4
Main Body.......................................................................................................................................4
Task A Ethics in information technology.......................................................................................4
1.Should law enforcement agencies be allowed unrestricted access to such complete and
intrusive information on people’s lives?....................................................................................4
2.What would be the worst-case scenario you could personally imagine in regard to
unrestricted access to the digital communications of the general population?..........................4
3.Should we afford data stored in private email accounts as much protection as letters in a
locked desk drawer, that is, stored where law enforcement agencies would otherwise need a
warrant to access and review the documents?............................................................................5
4.Describe which ethical principles are most relevant to information technology. Support
each of them with an example in relation to IT..........................................................................6
5.What are the arguments as to why closing the digital divide is important?............................6
Task B Ethical issues in international business...............................................................................7
1.With examples, identify which ethical principles are most relevant to international business.
....................................................................................................................................................7
2.What were the research methods and were they sound?.........................................................7
3.What are the key messages?....................................................................................................8
4. What were the research methods and were they sound?........................................................8
5.What are the key messages?....................................................................................................8
6. Are there any common observations to be made from both reports?.....................................9
Conclusion.......................................................................................................................................9
References.....................................................................................................................................10
Introduction
In the era of technology computers and IT's are used by every individual and every part
of the world. Ethics in IT sector aimed to construct tools that can be applied in overall system
for development and use them in considerably ethical aspects (Alshehhi and et. al., 2018).
However, IT tool now affecting sensitivity of data that have direct impact on its effectiveness
and changing the user experience. Ethics are the moral philosophy which guide the path of an
individual whether to do good or bad defining by own discipline . Ethics deal with every
question at all level in decision making since, its the principle value. The report is based on
Ethics and its use in information technology and issues while engage international business.
Main Body
Task A Ethics in information technology
1.Should law enforcement agencies be allowed unrestricted access to such complete and
intrusive information on people’s lives?
There should be no provided right to access any personal information of individual. Whether it
is law enforcement body as against the case of NSA where they have used private informations
which create anger among the internet user as they feel watched every time. There should be
some guidelines that ensure such acts require proper permission from the holder of the data.
There should be respect for private life of every individual (Mani and et. al., 2016). However in
saying from agents that using data and metadata to have surveillance over people to protect any
misuse of digital power thus needed access on data is not proper solution to avoid crime. It is
nothing but risking the personal lives of innocent individual where Government officials can't
provide guarantee of protection of those lives of people who have not provided their consent on
it (Warner, 2013).
2.What would be the worst-case scenario you could personally imagine in regard to unrestricted
access to the digital communications of the general population?
Different worst case scenarios can be imagined and possibly they could be real
happening and can effect the life of people and so many loss they face due to them (Costa and
Pesci, 2016). Some of the case can be like Spoofing. It is a now becoming a popular IT forgery
term which means unauthorized party can access to any restricted web address,. It serve the
In the era of technology computers and IT's are used by every individual and every part
of the world. Ethics in IT sector aimed to construct tools that can be applied in overall system
for development and use them in considerably ethical aspects (Alshehhi and et. al., 2018).
However, IT tool now affecting sensitivity of data that have direct impact on its effectiveness
and changing the user experience. Ethics are the moral philosophy which guide the path of an
individual whether to do good or bad defining by own discipline . Ethics deal with every
question at all level in decision making since, its the principle value. The report is based on
Ethics and its use in information technology and issues while engage international business.
Main Body
Task A Ethics in information technology
1.Should law enforcement agencies be allowed unrestricted access to such complete and
intrusive information on people’s lives?
There should be no provided right to access any personal information of individual. Whether it
is law enforcement body as against the case of NSA where they have used private informations
which create anger among the internet user as they feel watched every time. There should be
some guidelines that ensure such acts require proper permission from the holder of the data.
There should be respect for private life of every individual (Mani and et. al., 2016). However in
saying from agents that using data and metadata to have surveillance over people to protect any
misuse of digital power thus needed access on data is not proper solution to avoid crime. It is
nothing but risking the personal lives of innocent individual where Government officials can't
provide guarantee of protection of those lives of people who have not provided their consent on
it (Warner, 2013).
2.What would be the worst-case scenario you could personally imagine in regard to unrestricted
access to the digital communications of the general population?
Different worst case scenarios can be imagined and possibly they could be real
happening and can effect the life of people and so many loss they face due to them (Costa and
Pesci, 2016). Some of the case can be like Spoofing. It is a now becoming a popular IT forgery
term which means unauthorized party can access to any restricted web address,. It serve the
purpose of doing illegal activity using internet system. Using the technique of spoofing cyber
bullies can camouflage themselves and modify the address of the computer from which it
was launched. Using this can be dangerous, to understand an example can help. Suppose a
scenario spoofing any manufacturing company with false sales order that may seen as legitimate
customer. If this get undetected by company can bring loss depending on the amount they are
trying to steal from the company (Burhan and Rahmanti., 2012). It recent times these crimes
have grown as the technology is getting smarter with time. Such type of crimes where company
did get chance to recognise and no estimates are in record that how much money have lost with
spoofing.
3.Should we afford data stored in private email accounts as much protection as letters in a
locked desk drawer, that is, stored where law enforcement agencies would otherwise need
a warrant to access and review the documents?
Since there are two methods followed to secure data of any individual or any company
either using manual method where data is kept secure using hard copies in personal space where
they can feel safe such as locker, bank or any other location and another method is using online
services where data are located which enable different features to the online users. Currently
everyone is using online methods to secure data as these are accessible at any time from any
place. However the method suffer lots of cons due to technology and cyber thefts and bullies,
who use theses data to manipulate them and use the illegally. Therefore online users need to be
stay alert all the time (Grieco, Michelini and Iasevoli, 2015). Moreover different companies
now offering secured storage of data into private email accounts with lots of paid facilities.
Where individual get informed and alert notification if accessed by any unknown sources. These
require the permission of the holder of the data whether it is any law body. Though there is
question arise if everyone can afford such facilities or not. Since it is concerning matter and
importantly privacy of life therefore company owners who provide such services need to charge
lower so that everyone can enjoy the service and live life without any surveillance on them
Wilding and et. al., 2012.
bullies can camouflage themselves and modify the address of the computer from which it
was launched. Using this can be dangerous, to understand an example can help. Suppose a
scenario spoofing any manufacturing company with false sales order that may seen as legitimate
customer. If this get undetected by company can bring loss depending on the amount they are
trying to steal from the company (Burhan and Rahmanti., 2012). It recent times these crimes
have grown as the technology is getting smarter with time. Such type of crimes where company
did get chance to recognise and no estimates are in record that how much money have lost with
spoofing.
3.Should we afford data stored in private email accounts as much protection as letters in a
locked desk drawer, that is, stored where law enforcement agencies would otherwise need
a warrant to access and review the documents?
Since there are two methods followed to secure data of any individual or any company
either using manual method where data is kept secure using hard copies in personal space where
they can feel safe such as locker, bank or any other location and another method is using online
services where data are located which enable different features to the online users. Currently
everyone is using online methods to secure data as these are accessible at any time from any
place. However the method suffer lots of cons due to technology and cyber thefts and bullies,
who use theses data to manipulate them and use the illegally. Therefore online users need to be
stay alert all the time (Grieco, Michelini and Iasevoli, 2015). Moreover different companies
now offering secured storage of data into private email accounts with lots of paid facilities.
Where individual get informed and alert notification if accessed by any unknown sources. These
require the permission of the holder of the data whether it is any law body. Though there is
question arise if everyone can afford such facilities or not. Since it is concerning matter and
importantly privacy of life therefore company owners who provide such services need to charge
lower so that everyone can enjoy the service and live life without any surveillance on them
Wilding and et. al., 2012.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4.Describe which ethical principles are most relevant to information technology. Support each of
them with an example in relation to IT.
The concept of Informed consent is the main principle of ethics in context to IT. It refers to
granting permission with full acknowledging of possible consequences. There are three most
common ethical principles needs to be followed while using or rendering IT services:
Design for Security, Integrity and Privacy: In the world with digital transformation
integrity and privacy should be the core value. Whether it is individual or organisation
must use data in responsible way. Being transparent with policies and values ensure the
state of the intentions regarding data usage and allow the other party's consent who's data
is going to be used.
Promoting Trust: Those who use data must value this principle by ensuring data
integrity. Thus consumers no matter whether it is individual or organisation or any group
must be able to trust the different digital services they are using.
Promote Ethical Culture: Values are the important as these emphasised on company or
any individual stands for them. To promote ethical culture people must respect the
privacy of life of every individual who are the user of any such technology. Thus value
driven people are those who actively demonstrate their values and use them in away to
guide their action even in a toughest situation.
5.What are the arguments as to why closing the digital divide is important?
It is now observed that closing the the digital divide is necessary and some of the major
arguments are stated below (Digital Divide. 2020):
Economic Equality: It is normally think that access of internet is the basic component of
human life and in some countries whether developed or developing nations both aim to
guarantee such facilities to its people. The vital information of people, their life and
safety etc. are now increasingly open and compromised via internet facilities.
Economic Growth: People think that the development in information infrastructure and
active using of these can be a shortcut for economic growth for under developed nations.
In general IT relates to association with productivity and improvements. (Chell and et.
al., 201) The usage of the latest technologies may provide industries of many countries
chance to gain competitiveness.
them with an example in relation to IT.
The concept of Informed consent is the main principle of ethics in context to IT. It refers to
granting permission with full acknowledging of possible consequences. There are three most
common ethical principles needs to be followed while using or rendering IT services:
Design for Security, Integrity and Privacy: In the world with digital transformation
integrity and privacy should be the core value. Whether it is individual or organisation
must use data in responsible way. Being transparent with policies and values ensure the
state of the intentions regarding data usage and allow the other party's consent who's data
is going to be used.
Promoting Trust: Those who use data must value this principle by ensuring data
integrity. Thus consumers no matter whether it is individual or organisation or any group
must be able to trust the different digital services they are using.
Promote Ethical Culture: Values are the important as these emphasised on company or
any individual stands for them. To promote ethical culture people must respect the
privacy of life of every individual who are the user of any such technology. Thus value
driven people are those who actively demonstrate their values and use them in away to
guide their action even in a toughest situation.
5.What are the arguments as to why closing the digital divide is important?
It is now observed that closing the the digital divide is necessary and some of the major
arguments are stated below (Digital Divide. 2020):
Economic Equality: It is normally think that access of internet is the basic component of
human life and in some countries whether developed or developing nations both aim to
guarantee such facilities to its people. The vital information of people, their life and
safety etc. are now increasingly open and compromised via internet facilities.
Economic Growth: People think that the development in information infrastructure and
active using of these can be a shortcut for economic growth for under developed nations.
In general IT relates to association with productivity and improvements. (Chell and et.
al., 201) The usage of the latest technologies may provide industries of many countries
chance to gain competitiveness.
Democracy: Many people feel that the using of internet services can lead to a healthier
democratic system any how. They think that it can increase the public participation in
elections and decision making processes of the country.
Task B Ethical issues in international business
1.With examples, identify which ethical principles are most relevant to international business.
Since business ethics play key role to promote company's image and the concept of
business get more wider when company is operated at international level (Ethical Principle for
Business. 2017). Some of the guiding ethical principles that are useful to international business
are mentioned below:
Fairness: It is imperative for company to disclose its operations fairly manner to all its
stakeholder and also for the people who directly or indirectly connected with them. It
reflect company's concern for its stakeholders by providing transparency and fairness in
operations. For example The Equality Act 2010, in UK, business entities are mandate to
follow this act as it ensure any kind of discriminations at workplace which also reflect
the fairness principle of Ethics in organisation operated at global level.
Responsibility: When company operated on a global level it is important for company to
have responsibility of its duties and work they are following and implementing. The
company provide its employee some term of trade which mention authenticity of the
company's working and legal framework for any misleading work in terms of both
employee and employer. For example company follow Human Right Act Or Conflicts
of Interest Policy to maintain the responsibility at individual level.
2.What were the research methods and were they sound?
In “top fashion brands’ business practices are undermining progress on ending garment
worker exploitation” research report the researcher have used Interview method where he/ she
have asked direct question to the participant, they are largely; the workers, leaders, NGOs and
unions etc. who posses knowledge regarding the information that served the purpose of research
related to area they are concerned (Parrott, 2014). Hence the method of collecting information
regarding the research is Primary Method as the information are collected for first time by
researcher himself.
democratic system any how. They think that it can increase the public participation in
elections and decision making processes of the country.
Task B Ethical issues in international business
1.With examples, identify which ethical principles are most relevant to international business.
Since business ethics play key role to promote company's image and the concept of
business get more wider when company is operated at international level (Ethical Principle for
Business. 2017). Some of the guiding ethical principles that are useful to international business
are mentioned below:
Fairness: It is imperative for company to disclose its operations fairly manner to all its
stakeholder and also for the people who directly or indirectly connected with them. It
reflect company's concern for its stakeholders by providing transparency and fairness in
operations. For example The Equality Act 2010, in UK, business entities are mandate to
follow this act as it ensure any kind of discriminations at workplace which also reflect
the fairness principle of Ethics in organisation operated at global level.
Responsibility: When company operated on a global level it is important for company to
have responsibility of its duties and work they are following and implementing. The
company provide its employee some term of trade which mention authenticity of the
company's working and legal framework for any misleading work in terms of both
employee and employer. For example company follow Human Right Act Or Conflicts
of Interest Policy to maintain the responsibility at individual level.
2.What were the research methods and were they sound?
In “top fashion brands’ business practices are undermining progress on ending garment
worker exploitation” research report the researcher have used Interview method where he/ she
have asked direct question to the participant, they are largely; the workers, leaders, NGOs and
unions etc. who posses knowledge regarding the information that served the purpose of research
related to area they are concerned (Parrott, 2014). Hence the method of collecting information
regarding the research is Primary Method as the information are collected for first time by
researcher himself.
Yes the method of research sound effective since they found some basis of the poor
labour system and its working in Southern Part of India. Since the researcher address the key
issues and try to resolve by organising taskforce in Tripura to resolve the issues faced by these
clothing industries.
3.What are the key messages?
Following key messages can drawn from the mentioned research report:
Cheap demand for fast fashion for many recognised brands have made these
manufacturing units to force unpleasant work conditions. Brands like, H&M, Nike,
Primark etc.
Workers are manipulate and get mislead by the suppliers of the units.
The researcher also found extreme violation of human right at workplace and even basic
rights of human. Include Gender discrimination, unfair pay, freedom to speak etc.
These business have close competition with other countries workers who provide more
cheaper rate of worker and their work such as, Ethiopia, Bangladesh.
4. What were the research methods and were they sound?
In the the 2020 Information and Communication Technology benchmark findings report
(June 2020) research report, the researcher have adopted both method that is Primary and
Secondary as their source of conducting research. The report emphasized on the disclosure and
several companies on the basis of seven benchmark. The report have highlighted the nature of
forced labour risks in the ICT sector and explores the role of industry associations. It also
enlighten changes in company practices over time and highlights how companies address forced
labour risks in the lower tiers of their supply chains.
5.What are the key messages?
The key message can be drawn from the report are as follows (Information and
communication technology. 2020):
It have addressed the forced labour in their supply chains in many companies and further
explosion of these gaps are further exposed by the impact of Covid-19 and if companies
are equipped to deal with the increased risk of forced labour.
labour system and its working in Southern Part of India. Since the researcher address the key
issues and try to resolve by organising taskforce in Tripura to resolve the issues faced by these
clothing industries.
3.What are the key messages?
Following key messages can drawn from the mentioned research report:
Cheap demand for fast fashion for many recognised brands have made these
manufacturing units to force unpleasant work conditions. Brands like, H&M, Nike,
Primark etc.
Workers are manipulate and get mislead by the suppliers of the units.
The researcher also found extreme violation of human right at workplace and even basic
rights of human. Include Gender discrimination, unfair pay, freedom to speak etc.
These business have close competition with other countries workers who provide more
cheaper rate of worker and their work such as, Ethiopia, Bangladesh.
4. What were the research methods and were they sound?
In the the 2020 Information and Communication Technology benchmark findings report
(June 2020) research report, the researcher have adopted both method that is Primary and
Secondary as their source of conducting research. The report emphasized on the disclosure and
several companies on the basis of seven benchmark. The report have highlighted the nature of
forced labour risks in the ICT sector and explores the role of industry associations. It also
enlighten changes in company practices over time and highlights how companies address forced
labour risks in the lower tiers of their supply chains.
5.What are the key messages?
The key message can be drawn from the report are as follows (Information and
communication technology. 2020):
It have addressed the forced labour in their supply chains in many companies and further
explosion of these gaps are further exposed by the impact of Covid-19 and if companies
are equipped to deal with the increased risk of forced labour.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The report find that no worker should pay for a job. Instead in reality in electronics
supply chains that workers have to pay fees up to several times from their monthly
salary.
Companies are putting efforts on the theme on Worker voice is limited. It has the lowest
average score of all the benchmark themes on the basis which report is to be drawn
which is 12/100 only. Freedom of association is the only indicator in the benchmark on
which all companies score zero.
In order to create leading change for workers, companies need to adapt their purchasing
practices to ensure that payments enable their suppliers to pay their workers competitive
wages. Ensure different practices such as; forecasting and lead times don't result in
workers being put under force to work over-hours in order to deliver on tight deadlines.
6. Are there any common observations to be made from both reports?
Since both the report are based on labour and their exploitation at organisational level
can be seen. Both the report highlight the excessive work and extended working hours and their
effects on the workers are very depressing. Whether it well equipped work place or Unpleasant
workers must be provide with some basic rights at work place and any violation should be made
penalised.
Conclusion
From above reports and their analyse give raise to importance of ethics at all level.
Whether it is individual or organisation all needs to understand its importance and their values
according to ethics implemented by them. Ethics have power to change perspective and look-
ward in different situation on the basis of where they needs to be applied.
supply chains that workers have to pay fees up to several times from their monthly
salary.
Companies are putting efforts on the theme on Worker voice is limited. It has the lowest
average score of all the benchmark themes on the basis which report is to be drawn
which is 12/100 only. Freedom of association is the only indicator in the benchmark on
which all companies score zero.
In order to create leading change for workers, companies need to adapt their purchasing
practices to ensure that payments enable their suppliers to pay their workers competitive
wages. Ensure different practices such as; forecasting and lead times don't result in
workers being put under force to work over-hours in order to deliver on tight deadlines.
6. Are there any common observations to be made from both reports?
Since both the report are based on labour and their exploitation at organisational level
can be seen. Both the report highlight the excessive work and extended working hours and their
effects on the workers are very depressing. Whether it well equipped work place or Unpleasant
workers must be provide with some basic rights at work place and any violation should be made
penalised.
Conclusion
From above reports and their analyse give raise to importance of ethics at all level.
Whether it is individual or organisation all needs to understand its importance and their values
according to ethics implemented by them. Ethics have power to change perspective and look-
ward in different situation on the basis of where they needs to be applied.
References
Books and Journals
Jenkins, W., 2013. The future of ethics: sustainability, social justice, and religious creativity.
Georgetown University Press.
Alshehhi, A., and et. al., 2018. The impact of sustainability practices on corporate financial
performance: Literature trends and future research potential. Sustainability, 10(2), p. 494.
Mani, V., and et. al., 2016. Social sustainability in the supply chain: Construct development and
measurement validation. Ecological Indicators, 71, pp. 270-279.
Costa, E. and Pesci, C., 2016. Social impact measurement: why do stakeholders
matter?. Sustainability Accounting, Management and Policy Journal
Mani, V., Agrawal, R. and Sharma, V., 2015. Supply chain social sustainability: A
comparative case analysis in indian manufacturing industries. Procedia-Social and
Behavioral Sciences, 189, pp. 234-251.
Burhan, A.H.N. and Rahmanti, W., 2012. The impact of sustainability reporting on company
performance. Journal of Economics, Business, & Accountancy Ventura, 15(2), pp.257-
272.
Grieco, C., Michelini, L. and Iasevoli, G., 2015. Measuring value creation in social enterprises:
A cluster analysis of social impact assessment models. Nonprofit and voluntary sector
quarterly, 44(6), pp.1173-1193.
Parrott, L., 2014. Values and ethics in social work practice. Learning Matters.
Chell, E., and et. al., 2016. Social entrepreneurship and business ethics: Does social equal
ethical?. Journal of business ethics, 133(4), pp. 619-625.
Warner, M.E., 2013. Private finance for public goods: social impact bonds. Journal of economic
policy reform, 16(4), pp. 303-319.
Wilding, R., and et. al., 2012. Extending sustainability to suppliers: a systematic literature
review. Supply Chain Management: an international journal.
Online
Reading: Security Issues in Electronic Communication. 2020. [Online] Available through:<
https://courses.lumenlearning.com/baycollege-introbusiness/chapter/reading-security-
issues-in-electronic-communication/ >
Books and Journals
Jenkins, W., 2013. The future of ethics: sustainability, social justice, and religious creativity.
Georgetown University Press.
Alshehhi, A., and et. al., 2018. The impact of sustainability practices on corporate financial
performance: Literature trends and future research potential. Sustainability, 10(2), p. 494.
Mani, V., and et. al., 2016. Social sustainability in the supply chain: Construct development and
measurement validation. Ecological Indicators, 71, pp. 270-279.
Costa, E. and Pesci, C., 2016. Social impact measurement: why do stakeholders
matter?. Sustainability Accounting, Management and Policy Journal
Mani, V., Agrawal, R. and Sharma, V., 2015. Supply chain social sustainability: A
comparative case analysis in indian manufacturing industries. Procedia-Social and
Behavioral Sciences, 189, pp. 234-251.
Burhan, A.H.N. and Rahmanti, W., 2012. The impact of sustainability reporting on company
performance. Journal of Economics, Business, & Accountancy Ventura, 15(2), pp.257-
272.
Grieco, C., Michelini, L. and Iasevoli, G., 2015. Measuring value creation in social enterprises:
A cluster analysis of social impact assessment models. Nonprofit and voluntary sector
quarterly, 44(6), pp.1173-1193.
Parrott, L., 2014. Values and ethics in social work practice. Learning Matters.
Chell, E., and et. al., 2016. Social entrepreneurship and business ethics: Does social equal
ethical?. Journal of business ethics, 133(4), pp. 619-625.
Warner, M.E., 2013. Private finance for public goods: social impact bonds. Journal of economic
policy reform, 16(4), pp. 303-319.
Wilding, R., and et. al., 2012. Extending sustainability to suppliers: a systematic literature
review. Supply Chain Management: an international journal.
Online
Reading: Security Issues in Electronic Communication. 2020. [Online] Available through:<
https://courses.lumenlearning.com/baycollege-introbusiness/chapter/reading-security-
issues-in-electronic-communication/ >
The top five ethical | moral principles for digital transformation. 2018. [Online] Available
through:< https://www.consultancy.uk/news/16602/the-top-five-ethical-moral-
principles-for-digital-transformation >
ANGER SWELLS AFTER NSA PHONE RECORDS COURT ORDER REVELATIONS. 2013.
[online] Available through:< https://goldsteinreport.com/anger-swells-after-nsa-phone-
records-court-order-revelations/ >
Digital Divide. 2020. [Online] Available through:<
https://www.internetworldstats.com/links10.htm >
Ethical Principle for Business. 2017. [Online] Available through:<
https://www.southuniversity.edu/news-and-blogs/2017/07/ethical-principles-for-
business-38725 >
Information and communication technology. 2020. [Online] Available through:<
https://knowthechain.org/wp-content/uploads/2020-KTC-ICT-Benchmark-Report.pdf >
through:< https://www.consultancy.uk/news/16602/the-top-five-ethical-moral-
principles-for-digital-transformation >
ANGER SWELLS AFTER NSA PHONE RECORDS COURT ORDER REVELATIONS. 2013.
[online] Available through:< https://goldsteinreport.com/anger-swells-after-nsa-phone-
records-court-order-revelations/ >
Digital Divide. 2020. [Online] Available through:<
https://www.internetworldstats.com/links10.htm >
Ethical Principle for Business. 2017. [Online] Available through:<
https://www.southuniversity.edu/news-and-blogs/2017/07/ethical-principles-for-
business-38725 >
Information and communication technology. 2020. [Online] Available through:<
https://knowthechain.org/wp-content/uploads/2020-KTC-ICT-Benchmark-Report.pdf >
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.