logo

ICT Professional Practice | Assignment

   

Added on  2020-03-16

9 Pages3624 Words50 Views
ICT PROFESSIONAL PRACTICESTUDENT NAME:STUDENT ID:

IntroductionThe advancement of technology in the contemporary world has enhanced the sector of ICT(information and communications technology). It refers to the integrated telecommunicationsystems (wireless signals and telephone lines), middleware, enterprise software, computers,audio-visual systems and such devices and such. It emphasizes on the factor of unifiedcommunications. The ICT helps the individuals to store, transmit, access as well as manipulateinformation when and if required. Many corporate and government organizations acknowledgesand uses the facility of ICT, leading to the development of the industry in the process. However,it should be stated that while working in the industry there are certain rules and regulationswhich the ICT professional or any other individual need to consider (Brotherton et al. 2016).These norms and laws are mentioned in the ACS code of ethics, for instance.ICT industry has improved the overall economic condition of several business companies ororganizations. The organized and systematic methods enabled due to the ICT sector has made iteasy to keep track records, access, review and transit crucial information (be it organizational,financial, personal information) and so on. Most of the processes are done with technical aids.Hence, it can be easily understood that the risk to manipulate and manhandle information anddata is always present. Considering the point the essay strives to identify and analyze the ethicalissues related to the sector of ICT and to understand the structure of the ICT which is legitimateand justified. Analysis of the situation using the Doing Ethics TechniqueThe consulting business of Diana is successful and it has been three years since its establishment.At present Diana is working for a medium sized organization. She believes that transparency isimportant and therefore involved the important stakeholders of the company, the computingdirector, the director of personnel and the CEO. During the time of designing the managementsystem of database, the stakeholders showed active participation. However, conflict arose duringthe time of decision making process regarding the level of security which would be installed(Francisco et al. 2017). Diana presented several security options to the client, however the costof the systems as per the functions the systems provide. The better the degree of security system,the higher is the cost (Miguel, 2014). The client has decided that it is not necessary to install

costly security system for the company. The client company possibly believes that Diana istrying to sell the costly security system to the company which is not necessary for the company.However, Diana thinks that it is not sufficient to install less security system as the informationwhich the company is going to store will be sensitive. Information such as salaries, medicalrecords, insurance claims, and overall performance evaluation records will be kept and managedwith the help of the database. Considering and assessing the case scenario of Diana and herclient, it can be said that each holds their respective perspectives (Meiring et al. 2016).Diana thinks that the company wills store its crucial and sensitive information about thecompany, the employees, and its customers within the particular database. Therefore, it isnecessary for the company to take extra measures to strengthen the level of security system ofthe database. Diana puts stress on the necessity of security system; she is aware of the fact thatanybody can get access and manipulate the company database. She knows that cyber crime canbe a big risk for the company. Rather than losing valuable information, it is better to invest incostly security system to ensure the overall safety and certainty of the database (Mannay andMorgan, 2015). However, the client of the company is a medium sized organization, thecompany is trying to save money and avoid unnecessary cost and expense. The client thinks thatit is insignificant to invest in for the security system of the database management. Moreover, thestakeholders think that they have the option of installing advanced security measures if requiredin future. For the present, the extra cost for the security system seems unnecessary at present.Diana also thinks about the other stakeholders related to the company. She is of the opinion thatthe lack of sufficient security of the database increases the chance of manipulation, falsificationand manhandling of the information and data (Van and Swierstra, 2013). Due to this, theinformation regarding the customers and consumers associated with the company possess thechance of potential risks. Hackers can easy access to the company information. This can harmand affect the image and reputation of the company. However, the director of personnel andcomputing and the CEO think that the company database can be sufficed with less securitysystem.Considering the scenario of the case, Diana’s consultant business is successful. She has hiredseveral people working for the consultant. The fact states that she has the knowledge andexpertise regarding the work field that she has opted. While working for the medium sized

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ICT Developments and Ethical, Social, and Legal Issues - Desklib
|11
|733
|277

Ethical Issues in Client Database: Doing Ethics Technique and Australian Computer Society Code of Ethics
|11
|3540
|397

ITC506 - The Un-Tested System Ethical Issue
|6
|1465
|71

ICT Professionalism Assignment
|13
|3425
|113

IT Management Issues - Sample Assignment
|6
|839
|55

Accounting Information System
|17
|3075
|467