Challenges to Privacy in Public Services Card IT System
Verified
Added on  2023/04/20
|19
|3612
|111
AI Summary
This document discusses the key challenges to privacy that could have been considered in the development of the Public Services Card IT system. It explores the issues of security, copyright infringement, and privacy concerns. The document also explains the concept of the false privacy v. security dichotomy.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
University: Essay Title: Your Name: Date: Lecturer’s Name and Course Number:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question 1 a.Consider the IT system described in the case study as a socio-technical system. i.Draw a system map Answer: Figure 1:System Map Figure one is a general system map,which is the basis of a social-technical design of TSB system. It describes the interaction end of the systemdepending on whichusers/clients socially interact with the system andalso with thepsychologist cognitive framework. The software systemstands asa computeras perscientist information system engineers. TSB bank system infrastructure isplaced belowthe middleware,which includes boththe IT experts and data handlers within the TSB bank. The TSB hardwaresystem is the data centers hosted by IBMin the UKwhichcomprisesthe hardware engineers. ii.Developing the systemsmap into a diagram showing the three components of Technology, Organisation and People. Answer: Page2of19 HardwareSystem(IBMDataCenter)SoftwareSytem(Middleware)CognitiveandSocialSystem(User/Client)
Figure 2: Social-Technical System The componentsdiscussedin Figure 2,technology, organization and the peopleare the outcome. Technology:Inthis diagram, both the hardware and the software are referred to as emerging technologies.Similarly,computerscienceisconsideredasahybridofengineeringand mathematics. Thus,Information Technology(IT) is not a subset of computer scienceor technology but a subset of engineering. Organization:Inthe diagram, the organization comprises of technical infrastructure, system access and workflow and process. People:This section iscomprised of the Job roles, user roles and social interactions Page3of19 Techn ical infrast ructur e Syste m access workfl ow and proces s Job Roles User Roles Social Intera ctions
b.In about 150 words describe that way that the ETHICS framework could have been applied when analyzing the IT system described in the case study. Answer: During the development period,the factors liketesting analyzing, troubleshooting issues or maintaining in TSB applications and recordsought to been have possibly interrogatedif they are identified with an issue. Showing samples of pages, documents, report output or business flow in the documentation, suitable measuresrequiredbeen taken to mask the dataand toprotect the identity of the individual(s) relatedtothe information. For benefits of presentation, development, maintaining, testing, examining, or investigating,accuratemeasures are to betaken for data camouflage to ensure the personality of the individual (s)isassociated with the information. The information contained in log documents and databasesneednot be revealedbeforethe need of the IT group to create, investigate,maintainandperform diagnosticsexcluding theinstruction receivedfrom legitimate TSB or lawful specialists. Lastly, viewing any information in databases or logs that fall out of the staff accountability shall be prohibited c.In about 150 words, suggest and describe at least three issues of power between at least three of the key stakeholders in this IT system. Answer: The key stakeholders are TSB IT system is i.Developers- The developerhas the powerto request the TSB bank to run the new system concurrently with the old one beforethe bank opts for running the system for the testing purpose. Page4of19
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Thishighlightsthe issue of powers with the bank since the companyfailsto consultwith the developers beforeexecutingthe application. ii.Management- Managementstandstheprimarydepartmentof the decision making processand execution of the same decision. The execution and workability of the systemare conductedby seeking technical advice from thesources likemiddleware and IBM who were expected to monitor and run the program. iii.Middleware- Since the launch of the program, middleware isaccountable forrunning the program. Despite havingeffectiveknowledgeregardingIT, middlewarecouldhave incorporated both the IBM and the developers in the initial running of the program. Page5of19
Question 2 a.Definition of methods in system methodology Answer: Methods is a set of concept and analytic approach, which isalsoa general approach based on system methodologycomprisingof decision-making processes. The evolution of high-speed technology asthemeans of simulating mathematical models: The theory of information feedback systems and the use of mathematicalmodels highlights in simulating convoluted systems. Further, method development involves five distinct phases which are problem structuring, dynamic modeling, causal looping, scenario modeling and planning as well as execution and organizational learning. Nonetheless, methods do not require allphasesto becarried out. b.Making use of Agile Answer: Recently, an international bank decidedon perceivinghow clients would react to another email offer. This included pulling togetherofa mailing list, tidied it up, iterated on duplicate and structure and checking with legitimatefor a fewtime to get the required approvals.Seven weekslater, they were prepared to connect Agilewiththe organization's advertising system. Agile, in the marketing settingimplyinginformation and examination tocontinuouslysource promising answers or opportunities forprogressive issues, deploying tests, assessing outcomes, Page6of19
and quickly emphasizing. At scale, an advanced agile marketing organization can run many campaigns at the same time and various new conceptsas well on a constant basis. There are various requirements for agile marketing to work. A promoting organization must have a reasonable sense of what it needs to achieve with its agile activity (e.g., which client sections it needs to secure or which client decisions it needs to enhance) and have adequate information regardingthe investigation and the correct sort of advertising innovation foundation set up. This innovation segment enables marketers to catch, total, and oversee information from different frameworks.It settleson choicesdependingon cutting edge inclination and next-best-activity models.It also robotizesthe conveyance of battles and messages crosswise over channels, and feed client following and message execution into the framework. (It needs to come under notice that the tech devices do not need to be immaculate. In fact, it can be atraptofocuson them excessively. Most organizations havethesurfeit of instruments.) Another pivotalfundamentalis sponsorship andmoreover,stewardshipis considered as the attempttoagileby senior promoting leaders.They provide the key assets with critical support during unavoidable opposition and ensure better approaches are given for working experience. Whilethe above-mentionedcomponents are pivotal for progress, the most essentialdeterminant is people,responsible foruniting a little group of capable individualsable tocooperate effectivelyat speed.It’s necessary for themto have aptitudes over various capacities (both external and internal)that can bedischarged from their business as usual day occupations to cooperate all day and becollocated(War room). The mission of the war-room group is to Page7of19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
execute a progression of speedy turnaround tests intended tosway thegenuine primary concern. Page8of19
Question 3 a.The difference between reliability and availability Answer Reliability is an estimation of the likelihood of factors playing out beyond its plannedcapacity for a predefined interim under expressed conditions. There is two generallyutilizedmeasure of dependability: * MTBF (Mean TimeBetweenFailure), which is characterized as all out time in number/service of flaws * Failure Rate (λ) is characterized as a number of failures/all outoftime in administration. Availability is an Operations parameter, apparentlydefined thehardwarethatis accessibleof eighty-five per cent of the time,also developingat eighty-five per cent of the hardware's technical point of confinement. Availability canalsobe estimated as Uptime + Downtime (Uptime/Total time). b.If a system has a mean time between failures (MTBF) of 800 hours and a meantime to repair (MTTR) of 20 hours, what is its availability to three decimal places? Show your working. Answer: Availability = MTTR/MTBF Thus, 20/800 Page9of19
= 0.025 c.Evaluate the overall reliability of the system, to 3 significant digits Answer: rKR20 is the Kuder-Richardson formula 20 k = total number of test items Σ = sum σ2 = variationof the reliability Sum of reliability = 0.750 + 0.600 + 0.850 = 2.2 Σpq = 2.2 σ2 = 0.85 - 0.600 = (0.25)^2 =0.063 Substituting the values = (3/ (3-1))(1 - (2.2/0.063) = -20.600 d.Explain in around 100 words why a system using independently designed software components can still fail Page10of19
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Answer Failure of any part of the system results in thebreakdownof theentireframework.It has been discoveredwhile considering total frameworks at their fundamental subsystem level that these are organized dependability savvyfollowinga series setup. When inspecting components are designed independently, ithas beenfound that the least reliable segment has the greatest impact on the reliability quality of the framework. Nevertheless, thesection having themost astounding dependability has the greatest impact on the framework's reliability quality, since the most reliable componentwouldintotalprobability failatlas. Page11of19
Question 4 a.Using Daniel Solove’s privacy model explain three key challenges to privacy that could have been considered which may have helped Irish government ministers and officials involved in building and operating the Public Services Card IT system. Answer Security:In the toolslike the internet, hackers can find it extremely simple to get access to any system or computer as long as it is linked to theweb. Hackers can easily employ an Internet Protocol (IP) address to access a client'scomputers based informationand gather users’ confidentialdata. Similarly, the widespread network cookiesthatcollect informationat any given pointusing thenetwork would create high risksof conflicting interests and fraud. Most leadingorganizations utilize thesecookies to figure out which service or product they can promote.With the support ofonline banking, the transaction of money canbeeasily hindered by hackers andthe entire financial amount can be easilyexchanged to their ideal records, which would cause trouble forboth banks and its customer to incur severe threat who are usingweb- based managing accounting subject Copyright Infringement: It is easy for a customer to get any information or antiquity at anygiven timebyusing IT. With theadvancementsof music sharing framework and photograph recording websites, numerous uniquedevelopersin the specific domain arelosing the credibility of works, because customersin the IT domaincan obtain access with allot easiness and offer that data with peers. Free document and music downloading websites are springing up on the web each day, a lot of unique work like music albums, books, are being downloaded file that is notrequired. Page12of19
Privacy Issues:The empoweredattempts made by theIrish government to discover relevant data on the internet have been made possible by data technology. Further, it has exploited people,by creating undesirable threats forsecurity.Thereare numerous waysfoundwherepeople security is exploited.For instance,the first usage of webcams encountered computerwherecustomers couldswitch on any webcam of a given computer on the internet andwere allowedto approach their private life.Majorityof the prominentusershave been the victim of these online stalking. Secondly, theusageof informal data,where,the primary concept of the framesareto interact with old and new friendssharing several personal information on web.However, the provisionis given at apointwhensomebody getsinto itsnormal life data like pictures, they can adore and send them to their friends.This, in turn, can createseveralopportunitiesforclientshavingwrong intentions to utilize one's data, similarly, companies are known for monitoring their workers through these interpersonalplatforms. b.Explain what is meant by the false privacy v. security dichotomy. Answer Privacy is the idea of individual autonomyandthe integrity of both the unmistakable and impalpable self. It is exclusively centered on individuals (and in information protectionlawfor those individualsisalive for the law to apply. Security is likewise not a parallel – for instance, it is absolutely not the oppositeof‘in broad daylight'. Protection rights – for example not being liable to ridiculous obstruction – are qualified rights. This means that there will be conditions where the benefit of the aggregate takes higher need when in strife with the rights or inclinations of the person. For instance,one'sentitlementto move aboutin an outgoing waystops whenone isdetained on thevergeof being sentenced for Page13of19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
wrongdoing.Ones right to control data ends upconstrained when the utilization is necessary to ensure other individuals. Security is certainly not a paralleltoon/off position. The objective is to accomplish appropriate security to oversee risk inside resistances and ability. Protection of digital information, such as thoseplacedin a database,gatheredfrom the undesirable activities of unapproved users and from unsafe powers, such as a cyber attack or a data breakdown. Security of software-based solutions encodes the data to shield it from being stolen. Nonetheless, a malicious program or a hacker could corrupt the data in the request to make it irretrievable,therefore, devising the system unserviceable.Securitybasedonhardwarecananticipatecomposingandaccessingof information and subsequently offer extremely solid security against altering and sanctioned access. Security based on hardware orassistedcomputerprovidesanoptionincontrastto programming justbesidegeneralcomputer security. Safety tokens such as those using PKCS# mightbe increasingly warranted because of therequiredphysical access so as to beimperiled. Accessing the system is possible when the token is linked and the correct PIN is entered Page14of19
Question 5 a.Define professionalism and (ii) offer a comprehensive critique of the concept Answer Professionalism conduct aims, or characteristics that depict or mark a profession or askilled person; and it attributes an occupation as "a career requiring specific educationandoften long and serious scholarly preparation." Professionalism skill incorporates various distinctive traits and the propertiesthat characterize and distinguishesan expert. In spite of the fact that provable skill means keeping an obligation, doing qualityworkand having maestro status, at times the pursuance for these characteristicsmightallureone not to volunteer for tasks that fall outside their "usual range of familiarity." Nonetheless, this does not really imply that one should not attempt! Examine hazards heretofore to limit the results of misinterpretation of things, talk the truth about any aptitude gaps that one hasand workto fulfill themselves. b.What are the key differences between consequentiality, non-consequentiality and virtue ethics? Answer Teleological or Consequentialism ethics is contingent on the reason that the moral quality of an action is unexpected with the result of that action. This infers morallybasedactivitydelivering an outstanding outcome and ethically wrongthat tend tocreatea terribleoutcome. The outcomes are the impacts brought about by human activity and the nature of this outcome contingent on the numbers of positive sidesthey hold. Celebration processes are the origin and the outcomes are Page15of19
thefinal results. The consequence is characterized by various hypotheses, such as, Utilitarianism (an action is correct when it prompts satisfaction for most notable number of individuals); satisfaction {positive stimulus is essential pursuance for the humanity so people ought to attempt in increasingall-out joy (net of pains and sufferings)}; conceit (an action is correct that expands theusefulness ofoneself. Lastly,egoismprovidesan authorization to action which regards one person, however, might be harmful to another person); lucidity (forbearance from vain delights to accomplish otherworldly objectives); malevolence (to live for other person and not be concern by oneself). Deontological approach or the non-consequentiality approach or the obligation moralscentreson a misconception and rightness of the action andrather than theresults of those activities. Variations of the non-consequentiality approach are very few, like,Natural Rights Theory, Divine Command Theory; and so forth. Divine Command Theorydefinesthat action is correct if it has been supported/announced by God. In this manner, ethical commitments emerge from the order of God. Regular Rights Theoryiscreated by John Locke and Thomas Hobbesdefining those supreme and common rights, which arecharacterizedbythe content of morals and are not interdependent upon human actions. The concept formed into Human Rights subsequently. c.Define applied Ethics Answer Applied ethics alludes to the viable use of good contemplation. It isethicswith appreciation to real activities and their ethical contemplation in the zones of public andtheprivatelife, consideringthe professions, well being, innovation, law, and authority. Page16of19
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Ecologicalethicsisconcernedwithenvironmentalissues,forexample,theobligationof government and enterprises to tidy up pollution. Business ethics includes questions with respect to the obligations or obligation of 'informants' to the overall population or theirreliabilityto their employers. Applied morals are recognized from normative morals,whichconcerns models for good and bad conduct, and frommeta-morals, which concerns the idea of moral properties, explanations, judgment and attitudes. Page17of19
Bibliography Azapagic, A., 2013. The systems approach to corporate sustainability: a general management framework.Process Safety and Environmental Protection,81(5), pp.303-316. Berg, M., 2009. Patient care information systems and health care work: a sociotechnical approach.International journal of medical informatics,55(2), pp.87-101. Churchman, C.W., 2009. The systems approach and its enemies. Dahleh, M.A. and Diaz-Bobillo, I.J., 2015.Control of uncertain systems: a linear programming approach. Englewood Cliffs: Prentice Hall. Gao, W. and Hung, J.C., 2013. Variable structure control of nonlinear systems: A new approach. IEEE Transactions on Industrial Electronics, 40(1), pp.45-55. McNeece, C.A., DiNitto, D.M. and McNeece, C.A., 2014.Chemical dependency: A systems approach. Boston, MA, London: Pearson/Allyn and Bacon. Mehra, R.K. and Peschon, J., 2011. An innovations approach fault detection and diagnosis in dynamic systems. Automatica, 7(5), pp.637-640. Mumford, E. and Henshall, D., 2019.A participative approach to computer systems design: A case study of the introduction of a new computer system. London: Associated business press. Peng, F.Z., Akagi, H. and Nabae, A., 2008, October. A new approach to harmonic compensation in power systems. InConference Record of the 1988 IEEE Industry Applications Society Annual Meeting(pp. 874-880). IEEE. Page18of19
Rogers, H. and Rogers, H., 2005.Writing systems: A linguistic approach(pp. xvii+-322). Oxford: Blackwell. Spath, P.L., 2012. Error reduction in health care: a systems approach to improving patient safety.Journal of Nursing Regulation,2(4), p.60. Willems, J.C. and Polderman, J.W., 2013. Introduction to mathematical systems theory: a behavioural approach (Vol. 26). Springer Science & Business Media. Willems, J.C. and Polderman, J.W., 2013. Introduction to mathematical systems theory: a behavioural approach (Vol. 26). Springer Science & Business Media. Page19of19