Professional and Ethical Practice in IT: A Summary Report

Verified

Added on  2022/09/26

|5
|973
|28
Report
AI Summary
This report provides a comprehensive overview of professional and ethical practices within the field of Information Technology. It begins by defining ethics and explores the trends that have increased the likelihood of unethical behavior, alongside the importance of corporate social responsibility and good business ethics. The report then delves into the relationships IT workers must manage, including employers, clients, and society, highlighting the ethical considerations in each. It further examines the challenges of cyberattacks, including the threat landscape, perpetrators, and security measures. The report also discusses privacy issues, consumer profiling strategies, and workplace monitoring techniques. Finally, it covers key aspects of implementing strong security programs, risk assessments, and disaster recovery plans. The report includes references to relevant literature and provides insights into ethical decision-making within the IT industry.
Document Page
Running head: PROFESSIONAL AND ETHICAL PRACTICE
PROFESSIONAL AND ETHICAL PRACTICE
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PROFESSIONAL AND ETHICAL PRACTICE
Professional and Ethical Practice
In week 1, the learning objective was ethics. The overview of ethics is presented in this
week. From this module, I learned about the trends which increased unethical behavior’s
likelihood. I also came to know what is social responsibility as well as why good business ethics
is important. In the module, I also learned about the measures which could be taken by the
organizations for improving the business ethics and how the ethical considerations could be
included in the decision making. In this module, the trends are identified as well as discussed
which have increased risk that the information technology would be used in unethical manner. I
learned about what ethics is, what its morals, virtue and vice are (Winch 2020). The relationship
among morals, law and ethics is discussed in the module. I also gained knowledge about how
ethics is implemented in business world. Corporate Social Responsibility (CSR) is also discussed
in the module. I also came to know about reducing unethical behavior’s risk as well as
characteristics of successful program of ethics. I gained knowledge of ethics criteria of employee
appraisals as well as steps for ethical process for decision making.
In week 2, I learned about IT worker relationships which need to be managed as well as
the relationship among employers and IT workers. I learned how to ethically use IT along with
relationship among clients and IT workers. Frequent reasons of problems within IT projects are
also discussed here. I came to know about common classes of failures of project and relationship
among suppliers and IT workers. Foreign Corrupt Practices Act (FCPA) is also discussed here as
well as difference between gifts and bribes. Relationship among IT workers with other
professionals is also shown in the module along with relationship between society and IT
workers (Gaudencio, Coelho and Ribeiro 2017). I learned about how to encourage IT workers’
professionalism as well as how reputation of IT workers could be improved for professionalism.
Document Page
2PROFESSIONAL AND ETHICAL PRACTICE
The module also discusses about professional code for ethics as well as IT professionals’
licensing, along with legal issues which are related to licensing the IT workers. I came to know
about ethical issues of IT users and how to support ethical practices for IT users through this
module. Basic network structure and Acceptable Use Policy (AUP) is also discussed here.
In 3rd week, the learning objectives were effects of computer incidents and identifying
steps for implementing strong program of security for preventing cyberattacks as well as the
actions which should be taken in case of successful security intrusion. Threat landscape and why
the computer incidents are so prevalent are discussed. Perpetrators of the computer crime are
classified also. I learned about kinds of exploits which are faced by the computer systems. I came
to know about the federal laws to prosecute the computer attacks through this module. CIA
Security Triad are identified as well as discussed in this module, along with process to
implement CIA security in the organization. I gained knowledge about the process of general
risk assessment. I also learned about disaster recovery in case of any kind of beaches. The
security policies as well as the security audits are discussed in the module and security
dashboards are analyzed also. I studied about how CIA could be implemented at network level.
The module also contains description of routers as well as firewalls which could be implemented
within the computer systems for protecting them from the security breaches (Maglaras et al.
2019). Encryption, virtual private networks and proxy servers are discussed in the module, along
with Intrusion detection system for preventing against security breaches. I learned to know
usefulness of MSSP which could be used to monitor, manage as well as maintain network
security of the organizations.
In 4th week, the learning objectives were right of privacy and procedure to protect
personal privacy under law. Few of the laws are identified which provide protection to personal
Document Page
3PROFESSIONAL AND ETHICAL PRACTICE
data’s privacy and identify the ethical issues of it. Several strategies of consumer profiling are
identified as well as ethical issues which are associated with it are identified. In the module,
concept of e-discovery is identified as well as how this is used is demonstrated. It is also
discussed how the employees are using increasingly monitoring of workplace. Capabilities of
technologies of advanced surveillance are identified along with the ethical issues which are
associated with it are also identified. Privacy Protection and Law are discussed in the module.
The key anonymity and privacy issues of consumer profiling are discussed in this module.
Techniques for monitoring workplaces for mitigating the issues are discussed also.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4PROFESSIONAL AND ETHICAL PRACTICE
References
Gaudencio, P., Coelho, A. and Ribeiro, N., 2017. The role of trust in corporate social
responsibility and worker relationships. Journal of Management Development.
Maglaras, L., Ferrag, M.A., Derhab, A., Mukherjee, M., Janicke, H. and Rallis, S., 2019. Threats,
Protection and Attribution of Cyber Attacks on Critical Infrastructures. arXiv preprint
arXiv:1901.03899.
Winch, P., 2020. Ethics and action. Routledge.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]