Ask a question from expert

Ask now

ITC506 - Information Technology Ethics

6 Pages1381 Words121 Views
   

Charles Sturt University

   

ITC506 Topics in Information Technology Ethics (ITC506)

   

Added on  2020-03-07

About This Document

In the ITC506 Case Study, we will discuss Information Technology Ethics. The Ashley Madison Saga where clients' details have been hacked and exposed to the public, irrespective of the company claiming that they had been deleted, is one of the questionable situations related to ICT professional skills. This is one of the recent scenarios following other different cases where different websites, companies, and especially the ICT Departments fail to uphold the required ethics when handling customer details.

ITC506 - Information Technology Ethics

   

Charles Sturt University

   

ITC506 Topics in Information Technology Ethics (ITC506)

   Added on 2020-03-07

BookmarkShareRelated Documents
Running Head: TOPICS IN INFORMATION TECHNOLOGY ETHICS Topics in information technology ethicsNamesInstitutions
ITC506 - Information Technology Ethics_1
TOPICS IN INFORMATION TECHNOLOGY ETHICS 2Topics in information technology ethicsThe analysisThe Ashley Madison saga where the personal details of clients were hacked and exposed to the public, irrespective of the company claiming that they had been deleted is one of the questionable situation related to ICT professionals (Broke, 2012). This is one of the recent scenarios following other different cases where different websites, companies and especially the ICT departments fail to uphold the required ethics when handling customer details.What is going on?The Ashleymadison.com saga which involved hackers accessing confidential customer information was not just a mare hacking because it involved some activities which would ruin the users’ marital status and even allow access of their bank accounts by unknown people. This social networking website was known as one of the premier site for married individuals seeking for affairs was hacked and unknown people with unknown aim obtained carious customer detailslike passwords, physical addresses, recently posted descriptions concerning the kind of person who the users would like to have an affair with and so forth, and posted them online (Elizabeth, 2011). This issues frustrated the website users because the site administrators claimed that all customer details had been deleted after getting directions from the authorities do terminate the website.What are the facts?Exposing such details was posing risk to the customers especially those who had already uploaded their confidential details to the customers especially those who had already provided
ITC506 - Information Technology Ethics_2
TOPICS IN INFORMATION TECHNOLOGY ETHICS 3their confidential details (Joseph, 2011). This is because when such details are posted to the public, anyone can use them to various activities which can lead to negative impact to the site users. The website also had other personal information which the customers never wished to be exposed to the third party, bearing in mind that the most of the users were married people searching for affairs.What are the issues?One of the things which triggered this saga was lack of accountability among the site administrators and also lack of being honest (Kenneth, 2014). This is because before the hacking occurred, the administrators had assured its customers that their information had been deleted from their database. The main aim of this hacking seems to be either exposing the customers to the public. In this issues, the site administrators being ICT professionals had the responsibility ofensuring proper security measures for the sake of preventing their customers’ confidential information from third party access (Mark, 2012). The site administrators provided false information by assuring their clients that their details had been deleted from their database. This information gave the customers confidence that everything was secure until the hacking occurred.Who is affected?The stake holders in this case are the website users (Richard, 2012). Exposing names, phone numbers, addresses, passwords of the site users affected them in the fact that this site was basically dealing with unfaithful husbands and wives. Exposing such information can make third parties to have easy access to the customers’ money especially when the bank details are exposed. It also revealed what the site users wished to remain confidential because being married
ITC506 - Information Technology Ethics_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Threats in Maritime Industry and West Africa: Risks, Impacts, and Recommendations
|12
|3176
|136

ICT in the Education Sector Assignment
|4
|653
|201

Australian Computer Society
|4
|822
|99

Computer Security Risk Management and Legal Issues - Uber Data Breach
|3
|840
|149

Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession
|20
|1848
|225

Ethics and Professional Practice Reflective Journal
|5
|873
|142