This document discusses the foundation of ethics in information technology, including the importance of ethics, managing relationships, cybersecurity, and privacy issues. It includes reflective journals and a bibliography.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: FOUNDATION OF ETHICS Foundation of Ethics Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1FOUNDATION OF ETHICS First Reflective Journal: In first class of the topic ‘Ethics in Information Technology’ I have learned about the overview of ethics. From the first class of ethics I successfully understood the concept of ethics within the organizational context. With that from the overview of the ethics trends regarding unethical behaviour has been learned by me. Also, I have learned important concept of good business ethics. As per the learning ethics is considered as some specific code of behaviour to which an individual person belongs. Morale is related with the ethics as morale is the principle based on which a random person takes his or her decision. I can use the knowledge from this unit learning will help me to create some IT ethical concerns within my organization as an IT professional. Second Reflective Journal: The second learning was regarding ‘Ethics for IT Workers and IT Users.’ From this unit learning I have learned about importance of ethics in Information Technology. From this chapter the most important learning was managing the relationship which is very much important for an IT worker. Also, some important things which can be done for encouraging the professionalism of IT workers has been learned by me. With that ethics related issues that is faced by IT user has been learned by me. In this context I have also learned some processes which can be done for the encouragement of the ethical behaviour of the IT professionals. From this I successfully assessed that professional code of ethics are the statement of some core values and principles which are very much important for working in a particular occupational group. I can use the knowledge from this learning to solve ethical concerns between the IT workers and the clients which will help me to manage a good relationship with my clients and that will help me in my IT carrier growth.
2FOUNDATION OF ETHICS Third Reflective Journal: From the next learning resources I have successfully learned about the factors of cybersecurity and cyberattacks. From this chapter of learning I learned why the incidents regarding computer are very much prevalent what can be the main effects of it. Regarding this I have also learned about some strong security programs which can be used for preventing cyber-attacks. Also, what are actions which must be undertaken at the time of successful security intrusion has been learned by me. I have assessed there can be various types exploits in the current market which includes worm, virus, Trojan horse and many more. Apart from that another type of exploit is the blended threat and the spams. Spams mainly comes to a user through e-mails. I can use this knowledge for protecting myself and my organization from various types of cybersecurity attacks as an IT professional. Fourth Reflective Journal: The last learning of mine was regarding privacy. In this context of privacy, what is a right of privacy has been assessed and learned by me. I also, learned about some laws which are applicable for protecting privacy of personal data. Extending the learnings I have also gainedknowledgeaboutthefactorsofe-discoveryandsurveillancetechnologies.I understood that as per the Privacy Act 1988 the personal information some kind of opinion or information about a person who is identifiable. Information privacy is the combination of the data privacy and communication privacy. In Australia the Freedom of Information Act grants the citizens to access some specific type of records and information of state, federal and local government upon valid requests. I can use the knowledge from this learning to make correct privacy regulations in my organization by following the Australian law of privacy.
3FOUNDATION OF ETHICS Bibliography: Banks, S., 2016. Everyday ethics in professional life: Social work as ethics work.Ethics and Social Welfare,10(1), pp.35-52. Johnson, T.A. ed., 2015.Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press. Martin, K.D. and Murphy, P.E., 2017. The role of data privacy in marketing.Journal of the Academy of Marketing Science,45(2), pp.135-155. Rothlin,S.and McCann,D., 2016.TheSocialEnvironment:EthicsandInformation Technology. InInternational Business Ethics(pp. 341-363). Springer, Berlin, Heidelberg.