logo

Challenges to Privacy in Public Services Card IT System

   

Added on  2023-04-20

19 Pages3612 Words111 Views
 | 
 | 
 | 
University:
Essay Title:
Your Name:
Date:
Lecturer’s Name and Course Number:
Challenges to Privacy in Public Services Card IT System_1

Question 1
a. Consider the IT system described in the case study as a socio-technical system.
i. Draw a system map
Answer:
Figure 1: System Map
Figure one is a general system map, which is the basis of a social-technical design of TSB
system. It describes the interaction end of the system depending on which users/clients socially
interact with the system and also with the psychologist cognitive framework. The software
system stands as a computer as per scientist information system engineers. TSB bank system
infrastructure is placed below the middleware, which includes both the IT experts and data
handlers within the TSB bank. The TSB hardware system is the data centers hosted by IBM in
the UK which comprises the hardware engineers.
ii. Developing the systems map into a diagram showing the three components of
Technology, Organisation and People.
Answer:
Page 2 of 19
HardwareSystem(IBMDataCenter)SoftwareSytem(Middleware)CognitiveandSocialSystem(User/Client)
Challenges to Privacy in Public Services Card IT System_2

Figure 2: Social-Technical System
The components discussed in Figure 2, technology, organization and the people are the outcome.
Technology: In this diagram, both the hardware and the software are referred to as emerging
technologies. Similarly, computer science is considered as a hybrid of engineering and
mathematics. Thus, Information Technology (IT) is not a subset of computer science or
technology but a subset of engineering.
Organization: In the diagram, the organization comprises of technical infrastructure, system
access and workflow and process.
People: This section is comprised of the Job roles, user roles and social interactions
Page 3 of 19
Techn
ical
infrast
ructur
e
Syste
m
access
workfl
ow
and
proces
s
Job
Roles
User
Roles
Social
Intera
ctions
Challenges to Privacy in Public Services Card IT System_3

b. In about 150 words describe that way that the ETHICS framework could have been
applied when analyzing the IT system described in the case study.
Answer:
During the development period, the factors like testing analyzing, troubleshooting issues or
maintaining in TSB applications and records ought to been have possibly interrogated if they are
identified with an issue. Showing samples of pages, documents, report output or business flow in
the documentation, suitable measures required been taken to mask the data and to protect the
identity of the individual(s) related to the information. For benefits of presentation, development,
maintaining, testing, examining, or investigating, accurate measures are to be taken for data
camouflage to ensure the personality of the individual (s) is associated with the information. The
information contained in log documents and databases need not be revealed before the need of
the IT group to create, investigate, maintain and perform diagnostics excluding the instruction
received from legitimate TSB or lawful specialists. Lastly, viewing any information in databases
or logs that fall out of the staff accountability shall be prohibited
c. In about 150 words, suggest and describe at least three issues of power between at least
three of the key stakeholders in this IT system.
Answer:
The key stakeholders are TSB IT system is
i. Developers - The developer has the power to request the TSB bank to run the new system
concurrently with the old one before the bank opts for running the system for the testing purpose.
Page 4 of 19
Challenges to Privacy in Public Services Card IT System_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents