University IT Ethics Module: Reflective Journal Assignment

Verified

Added on  2023/01/19

|4
|806
|72
Journal and Reflective Writing
AI Summary
This assignment comprises a student's reflective journals on the foundational principles of ethics within the context of information technology. The journals cover a range of topics, including an overview of ethics and unethical behaviors in organizations, the importance of ethics for IT workers and users, cybersecurity factors and cyberattacks, and privacy concerns. Each journal entry reflects on the learning from specific modules, defining key concepts, discussing their relevance, and outlining how the acquired knowledge can be applied in a professional IT setting. The student references relevant academic articles to support their reflections and demonstrates an understanding of ethical considerations, practical applications, and the importance of maintaining ethical standards in the IT industry. The journals also discuss the importance of managing relationships, encouraging ethical behavior, and protecting against cybersecurity threats. The assignment concludes with a bibliography of cited sources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: FOUNDATION OF ETHICS
Foundation of Ethics
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1FOUNDATION OF ETHICS
First Reflective Journal:
In first class of the topic ‘Ethics in Information Technology’ I have learned about the
overview of ethics. From the first class of ethics I successfully understood the concept of
ethics within the organizational context. With that from the overview of the ethics trends
regarding unethical behaviour has been learned by me. Also, I have learned important
concept of good business ethics. As per the learning ethics is considered as some specific
code of behaviour to which an individual person belongs. Morale is related with the ethics as
morale is the principle based on which a random person takes his or her decision. I can use
the knowledge from this unit learning will help me to create some IT ethical concerns within
my organization as an IT professional.
Second Reflective Journal:
The second learning was regarding ‘Ethics for IT Workers and IT Users.’ From this
unit learning I have learned about importance of ethics in Information Technology. From this
chapter the most important learning was managing the relationship which is very much
important for an IT worker. Also, some important things which can be done for encouraging
the professionalism of IT workers has been learned by me. With that ethics related issues that
is faced by IT user has been learned by me. In this context I have also learned some processes
which can be done for the encouragement of the ethical behaviour of the IT professionals.
From this I successfully assessed that professional code of ethics are the statement of some
core values and principles which are very much important for working in a particular
occupational group. I can use the knowledge from this learning to solve ethical concerns
between the IT workers and the clients which will help me to manage a good relationship
with my clients and that will help me in my IT carrier growth.
Document Page
2FOUNDATION OF ETHICS
Third Reflective Journal:
From the next learning resources I have successfully learned about the factors of
cybersecurity and cyberattacks. From this chapter of learning I learned why the incidents
regarding computer are very much prevalent what can be the main effects of it. Regarding
this I have also learned about some strong security programs which can be used for
preventing cyber-attacks. Also, what are actions which must be undertaken at the time of
successful security intrusion has been learned by me. I have assessed there can be various
types exploits in the current market which includes worm, virus, Trojan horse and many
more. Apart from that another type of exploit is the blended threat and the spams. Spams
mainly comes to a user through e-mails. I can use this knowledge for protecting myself and
my organization from various types of cybersecurity attacks as an IT professional.
Fourth Reflective Journal:
The last learning of mine was regarding privacy. In this context of privacy, what is a
right of privacy has been assessed and learned by me. I also, learned about some laws which
are applicable for protecting privacy of personal data. Extending the learnings I have also
gained knowledge about the factors of e-discovery and surveillance technologies. I
understood that as per the Privacy Act 1988 the personal information some kind of opinion or
information about a person who is identifiable. Information privacy is the combination of the
data privacy and communication privacy. In Australia the Freedom of Information Act grants
the citizens to access some specific type of records and information of state, federal and local
government upon valid requests. I can use the knowledge from this learning to make correct
privacy regulations in my organization by following the Australian law of privacy.
Document Page
3FOUNDATION OF ETHICS
Bibliography:
Banks, S., 2016. Everyday ethics in professional life: Social work as ethics work. Ethics and
Social Welfare, 10(1), pp.35-52.
Johnson, T.A. ed., 2015. Cybersecurity: Protecting critical infrastructures from cyber attack
and cyber warfare. CRC Press.
Martin, K.D. and Murphy, P.E., 2017. The role of data privacy in marketing. Journal of the
Academy of Marketing Science, 45(2), pp.135-155.
Rothlin, S. and McCann, D., 2016. The Social Environment: Ethics and Information
Technology. In International Business Ethics (pp. 341-363). Springer, Berlin, Heidelberg.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]