Professional Environments: Ethical Dilemma Case Study Analysis Report
VerifiedAdded on 2023/01/12
|6
|978
|77
Case Study
AI Summary
This case study examines an ethical dilemma faced by a government department regarding the use of external website links, which inadvertently linked to news articles about court cases under suppression orders. The analysis explores violations of the ACS code of conduct, specifically concerning professionalism, honesty, competence, and public interest. The case highlights issues stemming from a lack of awareness and training regarding information security and ethical practices. It discusses the responsibilities of IT management and the importance of implementing clear policies and procedures. The study recommends upgrading knowledge and skills, encouraging professional development, and implementing information security policies to prevent similar incidents. It references relevant resources like the Australian Government Information Security Manual and the Australian ICT act.

Running Head: Ethical Dilemma 0
Ethical Dilemma
Case study
Student name
Ethical Dilemma
Case study
Student name
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Ethical Dilemma 1
Contents
Case study 7................................................................................................................................................2
Introduction.................................................................................................................................................2
ACS code of conduct....................................................................................................................................2
Issues in the case study...............................................................................................................................2
Public Interest.............................................................................................................................................3
Recommendations for actions.....................................................................................................................3
References...................................................................................................................................................4
Contents
Case study 7................................................................................................................................................2
Introduction.................................................................................................................................................2
ACS code of conduct....................................................................................................................................2
Issues in the case study...............................................................................................................................2
Public Interest.............................................................................................................................................3
Recommendations for actions.....................................................................................................................3
References...................................................................................................................................................4

Ethical Dilemma 2
Case study 7
Introduction
Information security is necessary for an organization and it makes many effects of the growth of the
organization. The Australian government has created a code of ethics to maintain a balance between
ethical and non-ethical things in a company to avoid dilemmas (globalalliancepr.org, 2019).
In addition, information is the most important thing for an organization and there are many issues
created because of lack of knowledge about information sharing. It is necessary to take permission
before sharing any permission of a person, firm, and others (ACSC, 2019).
According to the given case study, Ruby is a public server and he had a responsibility to design a website
for tourism. Ruby added different web links with their government website including global news
channels. The issue is that those sites have provided news on court cases, which are currently under
suppression. It is an embarrassing situation for the government department.
ACS code of conduct
In that case, these codes of conducts are affected because of that incident, which are professionalism,
honesty, competence, the primacy of the Public interest. There are many issues in an organization
because of a lack of knowledge. In addition, the organization should provide training and knowledge to
their employees about ethical things and implement a code of ethics in their various business processes
(Jules, 2018).
Professional development is necessary to avoid such types of incidents, which was happened because of
less knowledge about that particular thing. Jaspreet should support education, training, and professional
development in ICT, which can fulfill the needs of employees and their career development (Dobran,
2019).
The primacy of the public interest is affected in this incident because intellectual property rights are
affected by that incident. Jaspreet should endeavor to extend public knowledge to avoid such types of
the incident in the future and understanding of ICT to improve knowledge (globalalliancepr.org, 2019).
Case study 7
Introduction
Information security is necessary for an organization and it makes many effects of the growth of the
organization. The Australian government has created a code of ethics to maintain a balance between
ethical and non-ethical things in a company to avoid dilemmas (globalalliancepr.org, 2019).
In addition, information is the most important thing for an organization and there are many issues
created because of lack of knowledge about information sharing. It is necessary to take permission
before sharing any permission of a person, firm, and others (ACSC, 2019).
According to the given case study, Ruby is a public server and he had a responsibility to design a website
for tourism. Ruby added different web links with their government website including global news
channels. The issue is that those sites have provided news on court cases, which are currently under
suppression. It is an embarrassing situation for the government department.
ACS code of conduct
In that case, these codes of conducts are affected because of that incident, which are professionalism,
honesty, competence, the primacy of the Public interest. There are many issues in an organization
because of a lack of knowledge. In addition, the organization should provide training and knowledge to
their employees about ethical things and implement a code of ethics in their various business processes
(Jules, 2018).
Professional development is necessary to avoid such types of incidents, which was happened because of
less knowledge about that particular thing. Jaspreet should support education, training, and professional
development in ICT, which can fulfill the needs of employees and their career development (Dobran,
2019).
The primacy of the public interest is affected in this incident because intellectual property rights are
affected by that incident. Jaspreet should endeavor to extend public knowledge to avoid such types of
the incident in the future and understanding of ICT to improve knowledge (globalalliancepr.org, 2019).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Ethical Dilemma 3
Issues in the case study
Ruby was unaware of those issues, which can damage the reputation of the government department
and created an embracing situation because of that incident. There should be a training session about
the uses of public website links in an organization or personal usages. Moreover, Jaspreet is IT manages
in that government department and she is responsible for that incident. Jaspreet should take
responsibility for that incident because she is the responsible person in that incident. She should check
all the links and search for any matter, which can create embracing situation for the department.
According to laws, that incident was not problematic until a local court gave rise to a publication
suppression order. In addition, Jaspreet should honest for their responsibilities, face that incident, and
implement proper instructions and policies for involving external links in a site
(teaching.csse.uwa.edu.au, 2019).
Public Interest
It is necessary to aware of our limitations and takes responsibility for our work. Therefore, Jaspreet must
take responsibility for their work and provide training to their teammates to avoid such types of
mistakes in the future.
ISO/IEC 27001 standard framework can be used for IT governance and management. It used different
stages for audit the organization and found different vulnerabilities of the organization, which can be a
cause of financial and regulation losses ( Cobb, 2010).
Recommendations for actions
Ruby should upgrade his knowledge and skills to work properly and increase awareness about ICT acts
to avoid issues, which can affect the profession and relationship with the public. In addition, Jaspreet
should encourage his colleague to continue his or her own professional development at a high level.
The department should implement information security policies in which mention about uses of
information for personal and professional uses. It must beneficial for protecting whole systems from
Issues in the case study
Ruby was unaware of those issues, which can damage the reputation of the government department
and created an embracing situation because of that incident. There should be a training session about
the uses of public website links in an organization or personal usages. Moreover, Jaspreet is IT manages
in that government department and she is responsible for that incident. Jaspreet should take
responsibility for that incident because she is the responsible person in that incident. She should check
all the links and search for any matter, which can create embracing situation for the department.
According to laws, that incident was not problematic until a local court gave rise to a publication
suppression order. In addition, Jaspreet should honest for their responsibilities, face that incident, and
implement proper instructions and policies for involving external links in a site
(teaching.csse.uwa.edu.au, 2019).
Public Interest
It is necessary to aware of our limitations and takes responsibility for our work. Therefore, Jaspreet must
take responsibility for their work and provide training to their teammates to avoid such types of
mistakes in the future.
ISO/IEC 27001 standard framework can be used for IT governance and management. It used different
stages for audit the organization and found different vulnerabilities of the organization, which can be a
cause of financial and regulation losses ( Cobb, 2010).
Recommendations for actions
Ruby should upgrade his knowledge and skills to work properly and increase awareness about ICT acts
to avoid issues, which can affect the profession and relationship with the public. In addition, Jaspreet
should encourage his colleague to continue his or her own professional development at a high level.
The department should implement information security policies in which mention about uses of
information for personal and professional uses. It must beneficial for protecting whole systems from
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Ethical Dilemma 4
such types of incidents (Peltier, 2016). The Australian ICT act 1988 is applied for such types of incidents
because the department used unauthorized links on their websites.
References
Cobb, M., 2010. ISO 27001 SoA: Creating an information security policy document. [Online]
Available at: https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-security-
policy-document
[Accessed 12 March 2019].
ACSC, 2019. Australian Government Information Security Manual (ISM). [Online]
Available at: https://acsc.gov.au/infosec/ism/index.htm
[Accessed 4 April 2019].
Dobran, B., 2019. Information Security Risk Management: Plan, Steps, & Examples. [Online]
Available at: https://phoenixnap.com/blog/information-security-risk-management
[Accessed 31 May 2019].
globalalliancepr.org, 2019. Code of Ethics. [Online]
Available at: https://www.globalalliancepr.org/code-of-ethics
[Accessed 26 May 2019].
Jules, D., 2018. The International Code of Ethics for Professional Accountants: Key Areas of Focus for
SMEs and SMPs. [Online]
Available at: https://www.ifac.org/global-knowledge-gateway/ethics/discussion/international-code-
ethics-professional-accountants-key
[Accessed 22 May 2019].
Peltier, T. R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective
information security management. s.l.:Auerbach Publications.
teaching.csse.uwa.edu.au, 2019. Australian Computer Society Code of Ethics. [Online]
Available at: http://teaching.csse.uwa.edu.au/units/CITS3200/ethics/acs-ethics.htm
[Accessed 12 March 2019].
such types of incidents (Peltier, 2016). The Australian ICT act 1988 is applied for such types of incidents
because the department used unauthorized links on their websites.
References
Cobb, M., 2010. ISO 27001 SoA: Creating an information security policy document. [Online]
Available at: https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-security-
policy-document
[Accessed 12 March 2019].
ACSC, 2019. Australian Government Information Security Manual (ISM). [Online]
Available at: https://acsc.gov.au/infosec/ism/index.htm
[Accessed 4 April 2019].
Dobran, B., 2019. Information Security Risk Management: Plan, Steps, & Examples. [Online]
Available at: https://phoenixnap.com/blog/information-security-risk-management
[Accessed 31 May 2019].
globalalliancepr.org, 2019. Code of Ethics. [Online]
Available at: https://www.globalalliancepr.org/code-of-ethics
[Accessed 26 May 2019].
Jules, D., 2018. The International Code of Ethics for Professional Accountants: Key Areas of Focus for
SMEs and SMPs. [Online]
Available at: https://www.ifac.org/global-knowledge-gateway/ethics/discussion/international-code-
ethics-professional-accountants-key
[Accessed 22 May 2019].
Peltier, T. R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective
information security management. s.l.:Auerbach Publications.
teaching.csse.uwa.edu.au, 2019. Australian Computer Society Code of Ethics. [Online]
Available at: http://teaching.csse.uwa.edu.au/units/CITS3200/ethics/acs-ethics.htm
[Accessed 12 March 2019].

Ethical Dilemma 5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.