NIT6130 Assignment 3: Ethics in IT Business Operations Research
VerifiedAdded on 2025/08/27
|12
|2296
|273
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

NIT6130 ASSIGNMENT 3
Ethics Issues
Project Title: "Significance of IT over the business operations".
Researchers: Name of Student (To be filled by Student)
Contacts: Contact details of Student (To be filled by Student)
Ethics Issues
Project Title: "Significance of IT over the business operations".
Researchers: Name of Student (To be filled by Student)
Contacts: Contact details of Student (To be filled by Student)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Project Title:....................................................................................................................................1
Researchers:.....................................................................................................................................1
Contacts:..........................................................................................................................................1
Project Summary.............................................................................................................................3
Ethics Principles..............................................................................................................................4
1. Minimise the risk of harm.....................................................................................................4
2. Obtain informed consent.......................................................................................................4
3. Protect the anonymity and confidentiality............................................................................7
4. Include the deception of participants?..................................................................................7
5. Provide the right to withdraw...............................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Appendix C....................................................................................................................................11
Project Title:....................................................................................................................................1
Researchers:.....................................................................................................................................1
Contacts:..........................................................................................................................................1
Project Summary.............................................................................................................................3
Ethics Principles..............................................................................................................................4
1. Minimise the risk of harm.....................................................................................................4
2. Obtain informed consent.......................................................................................................4
3. Protect the anonymity and confidentiality............................................................................7
4. Include the deception of participants?..................................................................................7
5. Provide the right to withdraw...............................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Appendix C....................................................................................................................................11

Project Summary
To develop the effective analysis and evaluation based on the research done over the utilization
of IT in multiple industries as well as business towards the growth and high-benefit for the
industries. Here, research and analysis over different reviews and works by professional has been
done based on the quantitative & qualitative methodology of research including questionaries to
collect significant data from experts and users related with multiple industries from different
countries. All these techniques implemented within the research resulted in development of
significant information, contents, factors and keys which has involvement within the IT and its
implementation by industries. It has been done to collect significant data from the mouth of users
(i.e. Questionaries), experts, journals and other documents both from the library as well as online
to find the latest technologies involved with IT, role of IT in industries, impact of IT overgrowth
of business and many others. Once the important data and content related with the selected topic
and research questions have been collected, it has been processed by the researcher in order to
filter out all the significant data from the gathered content from various sources for the
development best results.
To develop the effective analysis and evaluation based on the research done over the utilization
of IT in multiple industries as well as business towards the growth and high-benefit for the
industries. Here, research and analysis over different reviews and works by professional has been
done based on the quantitative & qualitative methodology of research including questionaries to
collect significant data from experts and users related with multiple industries from different
countries. All these techniques implemented within the research resulted in development of
significant information, contents, factors and keys which has involvement within the IT and its
implementation by industries. It has been done to collect significant data from the mouth of users
(i.e. Questionaries), experts, journals and other documents both from the library as well as online
to find the latest technologies involved with IT, role of IT in industries, impact of IT overgrowth
of business and many others. Once the important data and content related with the selected topic
and research questions have been collected, it has been processed by the researcher in order to
filter out all the significant data from the gathered content from various sources for the
development best results.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Ethics Principles
In order to gather information on convictions, attitudes, views, ideas and behaviours, the
researchers use question-based instruments such as surveys or interviews. In many areas such as
medicine, politics, marketing and social science, questionnaire-based research can be discovered.
One benefit of questionnaire-based studies is that information from a big population are often a
cheap instrument to collect. The fulfilment of morality norms guarantees the excellent
confidence of scientists and the honesty of the subsequent information (Travis, 2017).
1. Minimise the risk of harm
Possible harms
The possible questionnaire issue or harm is that participants may be lying because of social
desirability. Most individuals want to show a favourable picture of themselves and therefore may
pretend or twist the reality to appear nice. Also, there might be chances that an individual hides
original information from the interviewer and provide un-relevant answers for the questions used
during the questionaries session.
Mitigation of the risk of harms
Effective design of research starts with questionnaire ethics. Clear and goal-related research
issues should be highlighted within the questions. Prominent questions should be ignored that
trigger a reply by means of term choices or a lack of answers. While, for instance, it is appealing
to ask answers in an effort to create goodwill from those who responded, breach good faith and
lead to compromise information. Surveys and questionaries should not include hypothetical or
embarrassing answers.
2. Obtain informed consent
Development of consent about information done so that an individual cannot be tricked or forced
to participate in survey-based research. The essence and intent of the investigation and any
expected inconveniences to involvement should be told to the respondents. Moreover,
instructions in the appropriate language of the public must be provided. In other words, behind
technical explanations or jargon, the meaning of research cannot be concealed. Participants must
In order to gather information on convictions, attitudes, views, ideas and behaviours, the
researchers use question-based instruments such as surveys or interviews. In many areas such as
medicine, politics, marketing and social science, questionnaire-based research can be discovered.
One benefit of questionnaire-based studies is that information from a big population are often a
cheap instrument to collect. The fulfilment of morality norms guarantees the excellent
confidence of scientists and the honesty of the subsequent information (Travis, 2017).
1. Minimise the risk of harm
Possible harms
The possible questionnaire issue or harm is that participants may be lying because of social
desirability. Most individuals want to show a favourable picture of themselves and therefore may
pretend or twist the reality to appear nice. Also, there might be chances that an individual hides
original information from the interviewer and provide un-relevant answers for the questions used
during the questionaries session.
Mitigation of the risk of harms
Effective design of research starts with questionnaire ethics. Clear and goal-related research
issues should be highlighted within the questions. Prominent questions should be ignored that
trigger a reply by means of term choices or a lack of answers. While, for instance, it is appealing
to ask answers in an effort to create goodwill from those who responded, breach good faith and
lead to compromise information. Surveys and questionaries should not include hypothetical or
embarrassing answers.
2. Obtain informed consent
Development of consent about information done so that an individual cannot be tricked or forced
to participate in survey-based research. The essence and intent of the investigation and any
expected inconveniences to involvement should be told to the respondents. Moreover,
instructions in the appropriate language of the public must be provided. In other words, behind
technical explanations or jargon, the meaning of research cannot be concealed. Participants must
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

be permitted to answer inquiries and to leave the survey if they decide (Thomas, 2017). All these
points have been described below in detail.
It has been developed to invite different members to provide their significant views and share
their knowledge on the project with the topic “Significance of IT over the business operations".
Project explanation
In an attempt to improve the effectiveness and productivity of various firms, companies,
organizations and others, IT makes revolutionary adjustments to the growth of business models,
their performance and their activities. This report has been developed for the deep analysis of the
significance and impact of IT over the business’s operations. It is performed to improve
information technology understanding and its importance for the company as well as for an
individual.
What will be the participant asked to do?
You must reply anonymously a number of various selection issues, questions and a few open
issues or points if you decide to involve in the questionnaire. Anyone who will agree to involve
in the questionnaire, he/she must share their experience, knowledge and views over the research
topic based on the selected question of the points mentioned in the survey.
What will the participant gain from participating?
You will help us to detect and analyse different factors facilitating the use of IT within
organizations by involving yourself in this research. It will help both researchers as well as an
individual involved in the research to enhance their knowledge and views. Also, it will provide
new opportunity to get new ideas and information about the latest IT technologies and trends
followed by multiple organization in the world.
How will the information participant give be used?
I am willing to think about how the collected data is to be utilized.
I know that this study can publish independent and aggregate reviews as scholarly papers.
I agree with the terms and conditions to avoid misuse of any of the information provided.
All the data gathered will get deleted after 1 year from the date of collection.
points have been described below in detail.
It has been developed to invite different members to provide their significant views and share
their knowledge on the project with the topic “Significance of IT over the business operations".
Project explanation
In an attempt to improve the effectiveness and productivity of various firms, companies,
organizations and others, IT makes revolutionary adjustments to the growth of business models,
their performance and their activities. This report has been developed for the deep analysis of the
significance and impact of IT over the business’s operations. It is performed to improve
information technology understanding and its importance for the company as well as for an
individual.
What will be the participant asked to do?
You must reply anonymously a number of various selection issues, questions and a few open
issues or points if you decide to involve in the questionnaire. Anyone who will agree to involve
in the questionnaire, he/she must share their experience, knowledge and views over the research
topic based on the selected question of the points mentioned in the survey.
What will the participant gain from participating?
You will help us to detect and analyse different factors facilitating the use of IT within
organizations by involving yourself in this research. It will help both researchers as well as an
individual involved in the research to enhance their knowledge and views. Also, it will provide
new opportunity to get new ideas and information about the latest IT technologies and trends
followed by multiple organization in the world.
How will the information participant give be used?
I am willing to think about how the collected data is to be utilized.
I know that this study can publish independent and aggregate reviews as scholarly papers.
I agree with the terms and conditions to avoid misuse of any of the information provided.
All the data gathered will get deleted after 1 year from the date of collection.

I know that the gathered data is going to be private and I am not needed to receive any
information I could associate with.
What are the potential risks of participating in this project?
I know that involving in the questionnaire session does not pose any risks. Also, all the
information will be kept private and secure with the researcher without the identity of individuals
from which information will be gathered.
How will this project be conducted?
The objective of this initiative is to use multiple questions as a technique of studies and operate a
multi-choice questionnaire as well as open views of an individual over the IT and their
involvement within an organization or the business. Also, the development of an internet
questionnaire will be done and will be sent as a connection to the learners. All answers will be
collected and anonymously analysed using the software for statistical analysis as well as through
reading by the researcher (Quinlan et al. 2019).
Who is conducting the study?
All the details of researcher need to provided (I.e. Filled by the student).
This research has been developed to invite different members to share their significant views and
knowledge on the project with topic “Significance of IT over the business operations" for the
effective analysis and evaluation of different facts and trends involved with IT and their
implementation within industries as well as organizations.
I agree with the terms and certify that I am 18 years young or older. Also, I willingly
agree to take part in the research over the topic “Significance of IT over the business
operations” by the student of VU.
I agree to the fact that I am fully explained by “INFORMATION TO PARTICIPANTS
INVOLVED IN RESÉARCH”, and that I agree voluntarily with the involvement with the
questionnaire session, together with any hazards and safeguards involved with these
processes to be taken out in the studies. Each and every detail involved with the research
and utilization of information is cleared to me.
information I could associate with.
What are the potential risks of participating in this project?
I know that involving in the questionnaire session does not pose any risks. Also, all the
information will be kept private and secure with the researcher without the identity of individuals
from which information will be gathered.
How will this project be conducted?
The objective of this initiative is to use multiple questions as a technique of studies and operate a
multi-choice questionnaire as well as open views of an individual over the IT and their
involvement within an organization or the business. Also, the development of an internet
questionnaire will be done and will be sent as a connection to the learners. All answers will be
collected and anonymously analysed using the software for statistical analysis as well as through
reading by the researcher (Quinlan et al. 2019).
Who is conducting the study?
All the details of researcher need to provided (I.e. Filled by the student).
This research has been developed to invite different members to share their significant views and
knowledge on the project with topic “Significance of IT over the business operations" for the
effective analysis and evaluation of different facts and trends involved with IT and their
implementation within industries as well as organizations.
I agree with the terms and certify that I am 18 years young or older. Also, I willingly
agree to take part in the research over the topic “Significance of IT over the business
operations” by the student of VU.
I agree to the fact that I am fully explained by “INFORMATION TO PARTICIPANTS
INVOLVED IN RESÉARCH”, and that I agree voluntarily with the involvement with the
questionnaire session, together with any hazards and safeguards involved with these
processes to be taken out in the studies. Each and every detail involved with the research
and utilization of information is cleared to me.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

I agree with the conditions and can withdraw myself at any point in time if I don’t feel
safe or appropriate to be involved in the research and questionaries session. Also, the
withdrawal has nothing to deal with any external activity or legal proceedings.
It has been notified that I would maintain the confidentiality of all the data that has been
provided.
Please feel free to contact us on below-mentioned details anytime, regarding any confusion,
question or the suggestion related to the research:
Name of Researcher: To be filled by the student
Contact details of researcher: To be filled by the student
3. Protect the anonymity and confidentiality
Although most respondents did not worry about private identity in IT research with de-
identified data, they voiced fear about the protection of their rights and information by
the scientists. But all gathered information has been reviewed properly by the researcher
as well as by the software application in order to avoid leaking of any single information
towards the disclosure of any personal identity (Goodman et al. 2017).
Data, as well as the information gathered from the respondents during questioners or
through the survey, has been kept with the researcher personal folder with high security
and safety to avoid any unwanted access or the usage of gathered information.
Data kept with the personal folder of research have high security for the access and only
research can access that information to use gathered data for the research over the
selected topic. It is developed with password protection management in order to avoid
any unwanted access for the gathered information and the folder where important
information is saved.
All the important information gathered and filtered out from the data collected based on
the questions and their answers from multiple members involved with the research will
be published in the research paper or the journal published by the researcher over the
college publication and other international publications.
safe or appropriate to be involved in the research and questionaries session. Also, the
withdrawal has nothing to deal with any external activity or legal proceedings.
It has been notified that I would maintain the confidentiality of all the data that has been
provided.
Please feel free to contact us on below-mentioned details anytime, regarding any confusion,
question or the suggestion related to the research:
Name of Researcher: To be filled by the student
Contact details of researcher: To be filled by the student
3. Protect the anonymity and confidentiality
Although most respondents did not worry about private identity in IT research with de-
identified data, they voiced fear about the protection of their rights and information by
the scientists. But all gathered information has been reviewed properly by the researcher
as well as by the software application in order to avoid leaking of any single information
towards the disclosure of any personal identity (Goodman et al. 2017).
Data, as well as the information gathered from the respondents during questioners or
through the survey, has been kept with the researcher personal folder with high security
and safety to avoid any unwanted access or the usage of gathered information.
Data kept with the personal folder of research have high security for the access and only
research can access that information to use gathered data for the research over the
selected topic. It is developed with password protection management in order to avoid
any unwanted access for the gathered information and the folder where important
information is saved.
All the important information gathered and filtered out from the data collected based on
the questions and their answers from multiple members involved with the research will
be published in the research paper or the journal published by the researcher over the
college publication and other international publications.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4. Include the deception of participants?
When researcher or any individual provide the topics with incorrect data or deliberately which
misleads them on some important study element. Feedback could include the creation of fake
convictions, relationships or the distortion of the self-concept. Incomplete disclosure is a form of
disappointment involving the retention of certain data on the true intent of the study or the
essence of investigative processes. If the deception found within the research or the information
shared by researcher, member involved in the research can withdraw himself at the same time
and will not be questioned further for the reason of withdrawing. Also, different steps have been
involved with the research in order to avoid such mistakes:
Elaboration of why this protocol needed.
A clear statement of whether the deception increases the danger for the respondents or
not.
Agreement for the research that all the required conditions have been fulfilled.
An overview of the prior use of fraud in comparable investigations and the summary of
some real harm or responses over the fraud by respondents.
5. Provide the right to withdraw
Member must agree with the conditions and can withdraw himself at any point of time if he/she
don’t feel safe or appropriate to be involved in the research and questionaries session. Also, the
withdrawal has nothing to deal with any external activity or legal proceedings for any of the
member.
When researcher or any individual provide the topics with incorrect data or deliberately which
misleads them on some important study element. Feedback could include the creation of fake
convictions, relationships or the distortion of the self-concept. Incomplete disclosure is a form of
disappointment involving the retention of certain data on the true intent of the study or the
essence of investigative processes. If the deception found within the research or the information
shared by researcher, member involved in the research can withdraw himself at the same time
and will not be questioned further for the reason of withdrawing. Also, different steps have been
involved with the research in order to avoid such mistakes:
Elaboration of why this protocol needed.
A clear statement of whether the deception increases the danger for the respondents or
not.
Agreement for the research that all the required conditions have been fulfilled.
An overview of the prior use of fraud in comparable investigations and the summary of
some real harm or responses over the fraud by respondents.
5. Provide the right to withdraw
Member must agree with the conditions and can withdraw himself at any point of time if he/she
don’t feel safe or appropriate to be involved in the research and questionaries session. Also, the
withdrawal has nothing to deal with any external activity or legal proceedings for any of the
member.

Conclusion
All the important facts and details related with the research work such as ethics which need to be
followed within the research, different consents related with the risks of research, data gathering,
questionaries session, privacy of members and others has been explained in this report so that
user will get all the basic details of issues and principles of ethics-related with any research
project involved in industries and organizations. All these points resulted in the completion of
this report.
All the important facts and details related with the research work such as ethics which need to be
followed within the research, different consents related with the risks of research, data gathering,
questionaries session, privacy of members and others has been explained in this report so that
user will get all the basic details of issues and principles of ethics-related with any research
project involved in industries and organizations. All these points resulted in the completion of
this report.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Goodman, D., Johnson, C. O., Bowen, D., Smith, M., Wenzel, L., & Edwards, K. (2017). De-
identified genomic data sharing: the research participant perspective. Journal of community
genetics, 8(3), 173-181.
Patten, M. L., & Newhart, M. (2017). Understanding research methods: An overview of the
essentials. Routledge.
Quinlan, C., Babin, B., Carr, J., & Griffin, M. (2019). Business research methods. South Western
Cengage.
Thomas, G. (2017). How to do your research project: A guide for students. Sage.
Travis, E. (2017, September 26). Ethics in Questionnaires. Retrieved September 7, 2019, from
Bizfluent website: https://bizfluent.com/info-8064289-ethics-questionnaires.html
Goodman, D., Johnson, C. O., Bowen, D., Smith, M., Wenzel, L., & Edwards, K. (2017). De-
identified genomic data sharing: the research participant perspective. Journal of community
genetics, 8(3), 173-181.
Patten, M. L., & Newhart, M. (2017). Understanding research methods: An overview of the
essentials. Routledge.
Quinlan, C., Babin, B., Carr, J., & Griffin, M. (2019). Business research methods. South Western
Cengage.
Thomas, G. (2017). How to do your research project: A guide for students. Sage.
Travis, E. (2017, September 26). Ethics in Questionnaires. Retrieved September 7, 2019, from
Bizfluent website: https://bizfluent.com/info-8064289-ethics-questionnaires.html
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Appendix C
CONSENT FORM FOR PARTICIPANTS INVOLVED IN RESEARCH
INFORMATION TO PARTICIPANTS
You are invited to take part in a survey about Students’ Acceptance of VU Collaborate.
Learning Management Systems, VU Collaborate in our University, are essential for the success
of any universities in today’s environment. This study is an attempt to explore factors that impact
student’s use of VU Collaborate.
CERTIFICATION BY PARTICIPANT
I hereby certify that I am at least 18 years old* and that I am voluntarily giving my consent to
participate in the study: "Significance of IT over the business operations" being conducted at
Victoria University by “Student Name”.
I certify that the objectives of the study, together with any risks and safeguards associated with
the procedures listed hereunder to be carried out in the research, have been fully explained to me
through the INFORMATION TO PARTICIPANTS INVOLVED IN RESEARCH form, and that
I freely consent to participation involving the following questionnaire.
I certify that I have had the opportunity to have any questions answered and that I understand
that I can withdraw from this study at any time and that this withdrawal will not jeopardise me in
any way.
I have been informed that the information I provide will be kept confidential.
Any queries about your participation in this project may be directed to the researcher
“Student Name”
CONSENT FORM FOR PARTICIPANTS INVOLVED IN RESEARCH
INFORMATION TO PARTICIPANTS
You are invited to take part in a survey about Students’ Acceptance of VU Collaborate.
Learning Management Systems, VU Collaborate in our University, are essential for the success
of any universities in today’s environment. This study is an attempt to explore factors that impact
student’s use of VU Collaborate.
CERTIFICATION BY PARTICIPANT
I hereby certify that I am at least 18 years old* and that I am voluntarily giving my consent to
participate in the study: "Significance of IT over the business operations" being conducted at
Victoria University by “Student Name”.
I certify that the objectives of the study, together with any risks and safeguards associated with
the procedures listed hereunder to be carried out in the research, have been fully explained to me
through the INFORMATION TO PARTICIPANTS INVOLVED IN RESEARCH form, and that
I freely consent to participation involving the following questionnaire.
I certify that I have had the opportunity to have any questions answered and that I understand
that I can withdraw from this study at any time and that this withdrawal will not jeopardise me in
any way.
I have been informed that the information I provide will be kept confidential.
Any queries about your participation in this project may be directed to the researcher
“Student Name”

“Student Contact details”
If you have any queries or complaints about the way you have been treated, you may contact the
Ethics Secretary, Victoria University Human Research Ethics Committee, Office for Research,
Victoria University, PO Box 14428, Melbourne, VIC, 8001, email Researchethics@vu.edu.au or
phone (03) 9919 4781 or 4461.
[*please note: Where the participant/s are aged under 18, separate parental consent is
required; where the participant/s are unable to answer for themselves due to mental illness
or disability, parental or guardian consent may be required.]
If you have any queries or complaints about the way you have been treated, you may contact the
Ethics Secretary, Victoria University Human Research Ethics Committee, Office for Research,
Victoria University, PO Box 14428, Melbourne, VIC, 8001, email Researchethics@vu.edu.au or
phone (03) 9919 4781 or 4461.
[*please note: Where the participant/s are aged under 18, separate parental consent is
required; where the participant/s are unable to answer for themselves due to mental illness
or disability, parental or guardian consent may be required.]
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





