Challenges to Privacy in Public Services Card IT System

Verified

Added on  2023/04/20

|19
|3612
|111
AI Summary
This document discusses the key challenges to privacy that could have been considered in the development of the Public Services Card IT system. It explores the issues of security, copyright infringement, and privacy concerns. The document also explains the concept of the false privacy v. security dichotomy.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
University:
Essay Title:
Your Name:
Date:
Lecturer’s Name and Course Number:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Question 1
a. Consider the IT system described in the case study as a socio-technical system.
i. Draw a system map
Answer:
Figure 1: System Map
Figure one is a general system map, which is the basis of a social-technical design of TSB
system. It describes the interaction end of the system depending on which users/clients socially
interact with the system and also with the psychologist cognitive framework. The software
system stands as a computer as per scientist information system engineers. TSB bank system
infrastructure is placed below the middleware, which includes both the IT experts and data
handlers within the TSB bank. The TSB hardware system is the data centers hosted by IBM in
the UK which comprises the hardware engineers.
ii. Developing the systems map into a diagram showing the three components of
Technology, Organisation and People.
Answer:
Page 2 of 19
HardwareSystem(IBMDataCenter)SoftwareSytem(Middleware)CognitiveandSocialSystem(User/Client)
Document Page
Figure 2: Social-Technical System
The components discussed in Figure 2, technology, organization and the people are the outcome.
Technology: In this diagram, both the hardware and the software are referred to as emerging
technologies. Similarly, computer science is considered as a hybrid of engineering and
mathematics. Thus, Information Technology (IT) is not a subset of computer science or
technology but a subset of engineering.
Organization: In the diagram, the organization comprises of technical infrastructure, system
access and workflow and process.
People: This section is comprised of the Job roles, user roles and social interactions
Page 3 of 19
Techn
ical
infrast
ructur
e
Syste
m
access
workfl
ow
and
proces
s
Job
Roles
User
Roles
Social
Intera
ctions
Document Page
b. In about 150 words describe that way that the ETHICS framework could have been
applied when analyzing the IT system described in the case study.
Answer:
During the development period, the factors like testing analyzing, troubleshooting issues or
maintaining in TSB applications and records ought to been have possibly interrogated if they are
identified with an issue. Showing samples of pages, documents, report output or business flow in
the documentation, suitable measures required been taken to mask the data and to protect the
identity of the individual(s) related to the information. For benefits of presentation, development,
maintaining, testing, examining, or investigating, accurate measures are to be taken for data
camouflage to ensure the personality of the individual (s) is associated with the information. The
information contained in log documents and databases need not be revealed before the need of
the IT group to create, investigate, maintain and perform diagnostics excluding the instruction
received from legitimate TSB or lawful specialists. Lastly, viewing any information in databases
or logs that fall out of the staff accountability shall be prohibited
c. In about 150 words, suggest and describe at least three issues of power between at least
three of the key stakeholders in this IT system.
Answer:
The key stakeholders are TSB IT system is
i. Developers - The developer has the power to request the TSB bank to run the new system
concurrently with the old one before the bank opts for running the system for the testing purpose.
Page 4 of 19

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
This highlights the issue of powers with the bank since the company fails to consult with the
developers before executing the application.
ii. Management - Management stands the primary department of the decision making process and
execution of the same decision. The execution and workability of the system are conducted by
seeking technical advice from the sources like middleware and IBM who were expected to
monitor and run the program.
iii. Middleware - Since the launch of the program, middleware is accountable for running the
program. Despite having effective knowledge regarding IT, middleware could have incorporated
both the IBM and the developers in the initial running of the program.
Page 5 of 19
Document Page
Question 2
a. Definition of methods in system methodology
Answer:
Methods is a set of concept and analytic approach, which is also a general approach based on
system methodology comprising of decision-making processes.
The evolution of high-speed technology as the means of simulating mathematical models:
The theory of information feedback systems and the use of mathematical models highlights in
simulating convoluted systems. Further, method development involves five distinct phases which
are problem structuring, dynamic modeling, causal looping, scenario modeling and planning as
well as execution and organizational learning. Nonetheless, methods do not require all phases to
be carried out.
b. Making use of Agile
Answer:
Recently, an international bank decided on perceiving how clients would react to another email
offer. This included pulling together of a mailing list, tidied it up, iterated on duplicate and
structure and checking with legitimate for a few time to get the required approvals. Seven
weeks later, they were prepared to connect Agile with the organization's advertising system.
Agile, in the marketing setting implying information and examination to continuously source
promising answers or opportunities for progressive issues, deploying tests, assessing outcomes,
Page 6 of 19
Document Page
and quickly emphasizing. At scale, an advanced agile marketing organization can run many
campaigns at the same time and various new concepts as well on a constant basis.
There are various requirements for agile marketing to work. A promoting organization must have
a reasonable sense of what it needs to achieve with its agile activity (e.g., which client sections it
needs to secure or which client decisions it needs to enhance) and have adequate information
regarding the investigation and the correct sort of advertising innovation foundation set up. This
innovation segment enables marketers to catch, total, and oversee information from different
frameworks. It settles on choices depending on cutting edge inclination and next-best-activity
models. It also robotizes the conveyance of battles and messages crosswise over channels, and
feed client following and message execution into the framework. (It needs to come under notice
that the tech devices do not need to be immaculate. In fact, it can be a trap to focus on them
excessively. Most organizations have the surfeit of instruments.)
Another pivotal fundamental is sponsorship and moreover, stewardship is considered as the
attempt to agile by senior promoting leaders. They provide the key assets with critical support
during unavoidable opposition and ensure better approaches are given for working experience.
While the above-mentioned components are pivotal for progress, the most essential determinant
is people, responsible for uniting a little group of capable individuals able to cooperate
effectively at speed. It’s necessary for them to have aptitudes over various capacities (both
external and internal) that can be discharged from their business as usual day occupations to
cooperate all day and be collocated (War room). The mission of the war-room group is to
Page 7 of 19

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
execute a progression of speedy turnaround tests intended to sway the genuine primary concern.
Page 8 of 19
Document Page
Question 3
a. The difference between reliability and availability
Answer
Reliability is an estimation of the likelihood of factors playing out beyond its planned capacity
for a predefined interim under expressed conditions. There is two generally utilized measure
of dependability:
* MTBF (Mean Time Between Failure), which is characterized as all out time in number/service
of flaws
* Failure Rate (λ) is characterized as a number of failures/all out of time in administration.
Availability is an Operations parameter, apparently defined the hardware that is accessible of
eighty-five per cent of the time, also developing at eighty-five per cent of the hardware's
technical point of confinement. Availability can also be estimated as Uptime + Downtime
(Uptime/Total time).
b. If a system has a mean time between failures (MTBF) of 800 hours and a mean time
to repair (MTTR) of 20 hours, what is its availability to three decimal places? Show your
working.
Answer:
Availability = MTTR/MTBF
Thus, 20/800
Page 9 of 19
Document Page
= 0.025
c. Evaluate the overall reliability of the system, to 3 significant digits
Answer:
rKR20 is the Kuder-Richardson formula 20
k = total number of test items
Σ = sum
σ2 = variation of the reliability
Sum of reliability = 0.750 + 0.600 + 0.850 = 2.2
Σpq = 2.2
σ2 = 0.85 - 0.600 = (0.25)^2
=0.063
Substituting the values = (3/ (3-1)) (1 - (2.2/0.063)
= -20.600
d. Explain in around 100 words why a system using independently designed software
components can still fail
Page 10 of 19

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Answer
Failure of any part of the system results in the breakdown of the entire framework. It has been
discovered while considering total frameworks at their fundamental subsystem level that these
are organized dependability savvy following a series setup. When inspecting components are
designed independently, it has been found that the least reliable segment has the greatest impact
on the reliability quality of the framework. Nevertheless, the section having the most astounding
dependability has the greatest impact on the framework's reliability quality, since the most
reliable component would in total probability fail atlas.
Page 11 of 19
Document Page
Question 4
a. Using Daniel Solove’s privacy model explain three key challenges to privacy that could
have been considered which may have helped Irish government ministers and officials
involved in building and operating the Public Services Card IT system.
Answer
Security: In the tools like the internet, hackers can find it extremely simple to get access to any
system or computer as long as it is linked to the web. Hackers can easily employ an Internet
Protocol (IP) address to access a client's computers based information and gather users’
confidential data. Similarly, the widespread network cookies that collect information at any
given point using the network would create high risks of conflicting interests and fraud. Most
leading organizations utilize these cookies to figure out which service or product they can
promote. With the support of online banking, the transaction of money can be easily hindered by
hackers and the entire financial amount can be easily exchanged to their ideal records, which
would cause trouble for both banks and its customer to incur severe threat who are using web-
based managing accounting subject
Copyright Infringement: It is easy for a customer to get any information or antiquity at anygiven
time by using IT. With the advancements of music sharing framework and photograph recording
websites, numerous unique developers in the specific domain are losing the credibility of works,
because customers in the IT domain can obtain access with allot easiness and offer that data with
peers. Free document and music downloading websites are springing up on the web each day, a
lot of unique work like music albums, books, are being downloaded file that is not required.
Page 12 of 19
Document Page
Privacy Issues: The empowered attempts made by the Irish government to discover relevant data
on the internet have been made possible by data technology. Further, it has exploited people, by
creating undesirable threats for security. There are numerous ways found where people security
is exploited. For instance, the first usage of webcams encountered computer where customers
could switch on any webcam of a given computer on the internet and were allowed to approach
their private life. Majority of the prominent users have been the victim of these online stalking.
Secondly, the usage of informal data, where, the primary concept of the frames are to interact
with old and new friends sharing several personal information on web. However, the provision is
given at a point when somebody gets into its normal life data like pictures, they can adore and
send them to their friends. This, in turn, can create several opportunities for clients having wrong
intentions to utilize one's data, similarly, companies are known for monitoring their workers
through these interpersonal platforms.
b. Explain what is meant by the false privacy v. security dichotomy.
Answer
Privacy is the idea of individual autonomy and the integrity of both the unmistakable and
impalpable self. It is exclusively centered on individuals (and in information protection law for
those individuals is alive for the law to apply. Security is likewise not a parallel – for instance, it
is absolutely not the opposite of ‘in broad daylight'.
Protection rights – for example not being liable to ridiculous obstruction – are qualified rights.
This means that there will be conditions where the benefit of the aggregate takes higher need
when in strife with the rights or inclinations of the person. For instance, one's entitlement to
move about in an outgoing way stops when one is detained on the verge of being sentenced for
Page 13 of 19

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
wrongdoing. Ones right to control data ends up constrained when the utilization is necessary to
ensure other individuals.
Security is certainly not a parallel to on/off position. The objective is to accomplish appropriate
security to oversee risk inside resistances and ability. Protection of digital information, such as
those placed in a database, gathered from the undesirable activities of unapproved users and from
unsafe powers, such as a cyber attack or a data breakdown. Security of software-based solutions
encodes the data to shield it from being stolen. Nonetheless, a malicious program or a hacker
could corrupt the data in the request to make it irretrievable, therefore, devising the system
unserviceable. Security based on hardware can anticipate composing and accessing of
information and subsequently offer extremely solid security against altering and sanctioned
access. Security based on hardware or assisted computer provides an option in contrast to
programming just beside general computer security. Safety tokens such as those using PKCS#
might be increasingly warranted because of the required physical access so as to be imperiled.
Accessing the system is possible when the token is linked and the correct PIN is entered
Page 14 of 19
Document Page
Question 5
a. Define professionalism and (ii) offer a comprehensive critique of the concept
Answer
Professionalism conduct aims, or characteristics that depict or mark a profession or a skilled
person; and it attributes an occupation as "a career requiring specific education and often
long and serious scholarly preparation." Professionalism skill incorporates various distinctive
traits and the properties that characterize and distinguishes an expert.
In spite of the fact that provable skill means keeping an obligation, doing quality work and
having maestro status, at times the pursuance for these characteristics might allure one not to
volunteer for tasks that fall outside their "usual range of familiarity."
Nonetheless, this does not really imply that one should not attempt! Examine hazards heretofore
to limit the results of misinterpretation of things, talk the truth about any aptitude gaps that one
has and work to fulfill themselves.
b. What are the key differences between consequentiality, non-consequentiality and virtue
ethics?
Answer
Teleological or Consequentialism ethics is contingent on the reason that the moral quality of an
action is unexpected with the result of that action. This infers morally based activity delivering
an outstanding outcome and ethically wrong that tend to create a terrible outcome. The outcomes
are the impacts brought about by human activity and the nature of this outcome contingent on the
numbers of positive sides they hold. Celebration processes are the origin and the outcomes are
Page 15 of 19
Document Page
the final results. The consequence is characterized by various hypotheses, such as, Utilitarianism
(an action is correct when it prompts satisfaction for most notable number of individuals);
satisfaction {positive stimulus is essential pursuance for the humanity so people ought to attempt
in increasing all-out joy (net of pains and sufferings)}; conceit (an action is correct that expands
the usefulness of oneself. Lastly, egoism provides an authorization to action which regards one
person, however, might be harmful to another person); lucidity (forbearance from vain delights
to accomplish otherworldly objectives); malevolence (to live for other person and not be concern
by oneself).
Deontological approach or the non-consequentiality approach or the obligation morals centres on
a misconception and rightness of the action and rather than the results of those activities.
Variations of the non-consequentiality approach are very few, like, Natural Rights Theory,
Divine Command Theory; and so forth. Divine Command Theory defines that action is correct if
it has been supported/announced by God. In this manner, ethical commitments emerge from the
order of God. Regular Rights Theory is created by John Locke and Thomas Hobbes defining
those supreme and common rights, which are characterized by the content of morals and are not
interdependent upon human actions. The concept formed into Human Rights subsequently.
c. Define applied Ethics
Answer
Applied ethics alludes to the viable use of good contemplation. It is ethics with appreciation to
real activities and their ethical contemplation in the zones of public and the private life,
considering the professions, well being, innovation, law, and authority.
Page 16 of 19

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Ecological ethics is concerned with environmental issues, for example, the obligation of
government and enterprises to tidy up pollution. Business ethics includes questions with respect
to the obligations or obligation of 'informants' to the overall population or their reliability to
their employers. Applied morals are recognized from normative morals, which concerns
models for good and bad conduct, and from meta-morals, which concerns the idea of moral
properties, explanations, judgment and attitudes.
Page 17 of 19
Document Page
Bibliography
Azapagic, A., 2013. The systems approach to corporate sustainability: a general management
framework. Process Safety and Environmental Protection, 81(5), pp.303-316.
Berg, M., 2009. Patient care information systems and health care work: a sociotechnical
approach. International journal of medical informatics, 55(2), pp.87-101.
Churchman, C.W., 2009. The systems approach and its enemies.
Dahleh, M.A. and Diaz-Bobillo, I.J., 2015. Control of uncertain systems: a linear programming
approach. Englewood Cliffs: Prentice Hall.
Gao, W. and Hung, J.C., 2013. Variable structure control of nonlinear systems: A new approach.
IEEE Transactions on Industrial Electronics, 40(1), pp.45-55.
McNeece, C.A., DiNitto, D.M. and McNeece, C.A., 2014. Chemical dependency: A systems
approach. Boston, MA, London: Pearson/Allyn and Bacon.
Mehra, R.K. and Peschon, J., 2011. An innovations approach fault detection and diagnosis in
dynamic systems. Automatica, 7(5), pp.637-640.
Mumford, E. and Henshall, D., 2019. A participative approach to computer systems design: A
case study of the introduction of a new computer system. London: Associated business press.
Peng, F.Z., Akagi, H. and Nabae, A., 2008, October. A new approach to harmonic compensation
in power systems. In Conference Record of the 1988 IEEE Industry Applications Society Annual
Meeting (pp. 874-880). IEEE.
Page 18 of 19
Document Page
Rogers, H. and Rogers, H., 2005. Writing systems: A linguistic approach (pp. xvii+-322).
Oxford: Blackwell.
Spath, P.L., 2012. Error reduction in health care: a systems approach to improving patient
safety. Journal of Nursing Regulation, 2(4), p.60.
Willems, J.C. and Polderman, J.W., 2013. Introduction to mathematical systems theory: a
behavioural approach (Vol. 26). Springer Science & Business Media.
Willems, J.C. and Polderman, J.W., 2013. Introduction to mathematical systems theory: a
behavioural approach (Vol. 26). Springer Science & Business Media.
Page 19 of 19
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]