.

Wednesday, May 6, 2020

Information Technology Ethics Australian Computer Society

Question: Describe about the Information Technology Ethics of Australian Computer Society? Answer: Introduction: The ACS or the Australian Computer Society is an organization for ICT technology. Its objective is to make advancement of professional excellence in IT. Hence it will promote the development of Australian ITC resources. Australian Computer society was situated on 1st January 1966 from five state based societies. ACS is integrated part of Australian Capital Territory on since 3rd October, 1967. ACS does its operation on various aspects, such as, professional development, special interest group and annual conferences. Members of this organization are required to follow a code of professional conduct and code of ethics. Stakeholders: ACS gives a various range of policies in order to improve skills on ITC, training and education quality and ability in Australia. Major ideals: Major Ideal of ACS is Brenda Aynsley OAM, who is current president and Kim Finch, who is the chief executive officer. ACS code of ethics: As a required individuality of a profession is the need of its members follow up to the code of conducts. In case of ACS, code of ethics is established to be a part of rules and regulation of the society. This rules and regulations are applied on the members of the ACS, who are working in the field of ICT technology. The Code of Professional Practice is formed to serve a bunch of guidelines for suitable principles of practice within an ICT organization. Supported by an advisory materials for specific areas like, software engineering, project management, network management and environmental consequences due to the use of ITC, it have some significance to professional standard legislation. If a person or an organizational issues is unable to observe the code of conduct, can lead to disciplinary action taken by ACS. There are six main ethical values associated expectation to maintain professional conduct (Reynolds, 2003). The increased quality of life: The primacy of the public interest Honesty Professional development Competence Professionalism People who get benefit: Members of ACS have equal access of benefits to have professional development and structured learning. In the field of global economy, ACS keeps realizing its members about their professional ambition (Soraj Hongladarom Ess, 2007). Stakeholders: ACS gives a various range of policies in order to improve skills on ITC, training and education quality and ability in Australia. Hence it can promote the professional and responsible use of ICT due to its efficiency which affects every aspect of daily life. 3 ethical theories of ACS: There are 6 ethical theories regulates within the ACS. All these are abided by the members of the ACS. Three among of them are- Honesty: A member should be honest while he/she is representing his/her skill, services, knowledge and products Professional development: An employer within ACS should enhance his/her profession capability and also encourage his/her employees to enhance their capability in order to have a good working environment (Tavani, 2003). Competence: An employer or the top most members should work with proficiency and with a delightful mind for the stakeholders. Summary: ACS have the mindset to focus on the usage of excellent skills for better results in the font of discussion and also welcomes the initiative to make betterment of the Job readiness quality of a student and facilitate the transition from the education background to work place with the help of work incorporated learning programs and cadetships (Tyrrell, 2002). ACS gives its strong support to the recognition in the discussion font to describe the role of technology to drive the productivity and innovation. This rules and regulations are applied on the members of the ACS, who are working in the field of ICT technology. The Code of Professional Practice is formed to serve a bunch of guidelines for suitable principles of practice within an ICT organization. Opinion: When the performance and workability of a system come out with its effective results, it become the boon for everyone in the organization but when it is not in the state to deliver quality product, it delivers a worst scenario due its life and death consequences of system failure, for example, a medical record system. This kind of system are not safe when they accidentally there is issues in the underlying system design and implementation. Keeping these scenarios in mind ACS provides the proper maintenance of responsibilities of a person within the organization with grater professionalism in the ICT sector. To minimize the system risk and sudden failure ACS provides a watchful environment to certify the designing, operating and maintaining phase with minimized risk. ACS gives its strong support to the recognition in the discussion font to describe the role of technology to drive the productivity and innovation (Wahlgren, 2010). Recent Ethical Dilemma (At my work place): Recently I have experienced an attack of social engineering. With this kind of attack I have to face the browser crash, machine slowing and so on. Due to this social engineering attack I have came across the spam messages in my account. The time when I open the spam mail, it was asking for my bank account details to transfer a lump of money, as I have won it in a lottery. The moment I clicked the link, it was ok. I visit the page but did not give my personal information to them. After some time my system started lagging. Browsers were crashed also. In later period of time, I had to give extra protection by allowing my firewall to prompt me, whenever I visit an illegal site. I also had to do proper scanning and deleted all the cookies and browsing history. In this scenario, the mail was containing malicious software which took my personal data from my browsing history. The malware also have slow down my computer with the associated function (block of codes) within malware. Doing Ethics Technique: DET is mainly focused on secure usage of internet and technological advancement: An Internet user should not click on the link, when the source of the link is unknown. An Internet user should not accept files, when sender is unknown. When a device with lot of personal information found lost the user must change his/her personal information. A user should be responsible of his/her personal devices and belongings so that the chance of data loss can be reduced. Proper data hiding technique (password enabling, encryption) should be chosen while communicating using a wireless communication technology in order to make outer world unknown about someones personal data. Internet user should enable virus detection software (antivirus) and firewall in his/her personal device. Conclusion: ACS have the mindset to focus on the usage of excellent skills for better results in the font of discussion and also welcomes the initiative to make betterment of the Job readiness quality of a student and facilitate the transition from the education background to work place with the help of work incorporated learning programs and cadetships. ACS gives its strong support to the recognition in the discussion font to describe the role of technology to drive the productivity and innovation. References INFORMATION TECHNOLOGY. (2010). Communication Booknotes Quarterly, 41(1), pp.46-48. Reynolds, G. (2003). Ethics in information technology. Boston, Mass.: Course Technology. Soraj Hongladarom, and Ess, C. (2007). Information technology ethics. Hershey: Idea Group Reference. Tavani, H. (2003). Recent books on or related to ICT ethics. Ethics and Information Technology, 5(3), pp.177-180. Tyrrell, S. (2002). Using information and communication technology in healthcare. Abingdon, Oxon, UK: Radcliffe Medical. Wahlgren, P. (2010). Information communication technology. Stockholm: Stockholm Institute for Scandinavian Law.

No comments:

Post a Comment