Thursday, December 5, 2019
Journal Catholic Education In Australasia ââ¬Myassignmenthelp.Com
Question: Discuss About The Journal Catholic Education In Australasia? Answer: Introduction The essay outlines the different ethical techniques that are affecting and generating the challenges of Dianes Company. The main purpose of this report is to provide the best database management system for maintenance of personal office in a medium sized company. The main aim of this report is to analyze the ethical techniques for using the Dianes situation. It is also evaluated an ICA professional using the ACS code of ethics. This case study also identifying the Ethical issued that connected by the ICT. Introduction to the Case Diane has started own consulting business for three year ago. Many employees have worked in Dianes office as well as she has numerous clients to doing work with her. Diane is a successful working woman. In her consulting business, many things are involved that defines how to designed database management system, advising about security and corporate intranets. She has designed the system of database management of a medium-sized business. She has included the customers for the purpose of informing the CEO of company, director of computing, design process as well as individual director on the system process. She has given the numerous types of options to the customers for doing the business with her. Diane believed that she provides best opportunity and best security services to CEO of the company. She has to shore that she provides data it would be exceptionally receptive. It would also involved medical records for filing insurance claim, salaries, performance evaluation etc. Doing Ethics Technique Doing Ethics Technique refers to the process which can be used for the purpose of analysing any issues related to ethical dilemmas relating to any situation. Thus technique does not provide any type of readymade solutions to the problems. But it helps in developing the techniques in the best possible ethical manner (Sekaran and Bougie, 2016). It can be also said that this technique is not clear and lacks in providing the required parameters and guidelines to the problems. There are several principles that can comply with the techniques of doing ethics: Contribution to welfare of society: The main focus of this principle lies on the assuring the quality of life of the peoples by obligating them to protect the fundamental rights of human beings and to respect the diversification of all the cultures. In context of computing and networking, its main objective is to minimise the negative outcomes like dangers to system and health of cyber world (Lawrence and Weber, 2014). At the time of designing systems, ensuring that the product can be used in social and responsible way must be the main aim of the computer professionals. Protecting others from getting harmed: This principle restricts the usage of information technology in such a manner which can cause harm the society and human beings. Several actions like modifying or destroying files and data intentionally which can cause severe damages to human resource are banned by this principle. Considering all the possible results that can affects designing and implementation of the software is the best possible way which can reduce this risk. With the help of minimising malfunctions by adopting standards that are designed for this purpose, occurrence of happening of damages can be reduced to a certain extent. Along with it, evaluating social disadvantages of a system is also required to determine the possibility of happening of any damage (Clarke, 2016). Testing and analysing the signs of a system that can possess harm to society or human beings is another obligation of a computer professional. Maintaining honesty and reliability: Honesty is the core element which can help an organisation to work in an effective and efficient manner. It is the duty of a computer professional to remain honest towards the qualifications that he or she possesses and towards the situation that may results in occurrence of disputes on interests of different members. A computer professional is required not to misunderstand the policies and regulations of Association for Computing Machinery or its any subsidiary or branch (Liu, et al., 2016). Be fair and should not differentiates: This principle governs by the principle of equal and fair justice and valuing the concept of equality, forbearance and respecting others. The policies of Association for Computing Machinery does not favours the discrimination which are based on the basis of various factors like age, sex, religion, community or disability. Misusing the information and technology can possess the results in favour of arising inequalities between different members of group (Berleur and Whitehouse, 2013). A rational society provides opportunities to all the peoples to access the benefits of information technology. Should obey property rights: In most of the situations, the law of a country does not permits several types of activities like violating patents, trade secrets, copyrights and terms and conditions of license agreements. Such type of behaviours always remains in contradiction to the ethical and professional behaviour even if the software cannot be considered as secured one. Software can be copied only after taking the proper permission from authorised owner (Technica, 2016). Attention should be paid to the unauthorised copying of materials or software. Intellectual property should be given due credit: It is the obligation of a computer professional to protect the truthfulness of logical property. No one should entertains the credit for the work or ideas that belongs to some another person even in those situation in which work or software does not possess protection in terms of copyright or patents (Fraser, 2014). Privacy of others should be given due respect: Collecting and exchanging personal information using the medium of information and technology can be resulted in violating the privacy of persons and society. Maintaining the privacy and integrity of personalised data is the key obligation of computer professionals. Various steps like taking preliminary steps in order to maintain the accuracy of data, preventing unauthorised persons to access the data, formulating new procedures for the purpose of permitting new individuals to check and amend their data are included in the method of maintaining privacy (Patsakis, et al., 2015). This principle focuses on the collection of personal information of a user after taking prior permission of that particular person. This should be done in a very sophisticated and limited manner with the consent of that person. Medium and users of electronic communication are some of the scope of this principle. Respecting the confidentiality of the data: This principle expands with problems of privacy related to information whenever the extensive promise of maintaining the confidentiality has been made by someone and private information does not have direct connection with the performance of duty of a person (Broucek and Turner, s2014). In the given scenario, Diane is concerned for the compilation with the principle of respecting confidentiality of data. According to the case, she has designed software which provides outmost level of confidentiality to the data of the user. But the problem arises when the cost incurred in framing the project exceeds the budgeted cost. ACS code of ethics To action by the duty of professional as well as honesty person, will dealings among the students, customers, and community generally, employers and employees. As per the case, Diane has dealing with their clients and employees very honestly and she known her responsibility for its workers and work (McDermid, 2015). To work attentively and proficiently for customers or workers, Diane has to work with very proficiently and attentively for their workers and customers. Diane has to be honest for the demonstration of its work for knowledge, products, services and skills. She has knowing about its consulting business services. She knows how to represent its work with good services. An attempt to improve the superiority of life of those affect in work. As per this case, Diane has attempted towards developing the excellence of life that affected the work. To improve the professional development for colleagues, student and employees, Diane has been improved its professional skills like knowledge about database, advising about security and corporate intranets for its employees and colleagues. To improve the reliability of the work of computing as well as admiration of its associate for everyone, According to this context, Diane has to develop the consistency of work of computing and appreciation of associate with everyone. Standard of Conduct A standard of conduct means to the set of manner that ethics of code can be applied to professional work of member. There are many standards of conducts, which can be applicable to ASC code of ethics such as priorities, computing profession, competence, honesty, professional development and social implications (Spulber, 2013). Priorities: Diane has attempted to conserve stability of computing services as well as data information of business has been run during her mind. She also esteems the proprietary environment of data information (Scott, et al., 2015). She has given advice to its business clients and worker of any probable disagreement of interest among its legal or assignment and another supplies to the people. She has been respected the database information for nature of proprietary. Computing profession: Diane would respect or inquire about the computing profession and it is required for the professional opinions of clients and employer in the proficiency part. She has not intentionally connected within the professions and to be connecting by deceitful and fake performs (Vella, et al., 2017). Competence: Diane has provided computing services or products that have to be connected with the financial or operational required for its customers and workers. She would be conscious for standards that have been relevant for its consulting business or will actions consequently (Ho, 2014). She has responsible for its work. Honesty: She has dedicated and honest in representing the knowledge about products, service and skills for its work (KM and JS, 2017). She would provide rational predictions for computing project. Professional development: Diane has improved her professional skills for employees, students and colleagues. She has also promoted her employees, students and colleagues to increase development of professions. She will also improve skills and knowledge for present time (Fakayode, et al., 2014). Social implications: In any business, it has promoted or protects the healthy and safety environment that influence the employees work (Jizi, et al., 2014). ICT Professional The standard Board of ACS professional considers professionalism like somebody qualified for level of professional of membership. They are given the various process of person and there are followed skills, capabilities and knowledge likes: In context of board, it has provided different types of theoretical and factual data of ICT professionals. For ICT field, there are solved many issues that related to the demonstrating mastery, innovation and advanced skills and changeable, complicated and random issues are also solved (Prestridge, 2014). There is required to capability such skills, knowledge about the project for complete the business projects. Company has taken duty and responsibility to reduced the technical multifaceted and project or actions for professional. Information about the data, facts or skills that acquired by the education and experience A specific job, a standard required to capability to perform well to complete projects. Including the critical understanding of principles and theories for advanced and coherent body of information during a field and discipline In context of work acts, exercise management and supervision there has been randomly changed. Definition of ICT professional ACS offers a service of accreditation towards making certain degree of ICT that has appropriate for initial practice of professional. Professional Certifications of ACS offers the overpass connecting the current practice and historical entry point in the field of ICT. Accreditation of ASC analyzes that how Graduate Attributes of ICT has been deal with every plan presented for endorsement (Vanderlinde, et al., 2014). It has also analyzed that how every plan presents the CBOK area of core knowledge as well as common part of ICT data. CBOK has utilized within two manners, which support the certification processes and accreditation. According to the opinion of Australian Computer System, a professional of ICT can be held eligible for taking membership of professional level. But taking the membership of ICT is not an easy task. It is treated as a level for a person who has achieved the professional level of membership. The main aim of professionalism membership is to create differences be tween practitioners of ICT and other peoples. The membership of ACS professionals can be used in providing proofs to potential clients and members having similar professional abilities. Raising the level of knowledge, skills and potential is the main objective of ICS professional (Kerckaert, et al., 2015). Conclusion On the basis of analysing above report and case, it can be said that parties are favouring their own point of view. This case is related with the company which is engaged in the business of outsourcing the various types of activities to its clients. One side of the case is related with the Diane who is the owner of the business. She has developed software based on the demand of its clients which is medium size company. Then, the client has chosen a less costly project after comprising with the security aspect. But the belief of the lady lies in the favour of secured software which can prevent the data from hacking and unauthorised access. In this report, along with the discussion of the case, doing ethics techniques and Code of Ethics of ACS has been discussed. These two types of ethics provide much help in understanding the case thoroughly. On the basis of above analysis, it can be recommended to Diane that she should tries to frame that software again keeping in mind the cost and extent of confidentiality. It is also recommended to Diane that she should tries to convince her management and senior staff by telling advantages and merits of the designed software. As in the given scenario, the stated Code explains the obligation of verifying the designing and implementing the system which protects the personal privacy and faults. Protecting the privacy of their employees is the legal obligations of the company. Educating the officials of the company is the attempt made by the Diane. If she fails in convincing her senior management, Diane is required to think about the obligations that are stated in the contract. At the last, Diane is required to make a choice between responsibilities of respecting the principles of privacy and confidentiality and contract. References Berleur, J.J. and Whitehouse, D. eds. (2013)An ethical global information society: Culture and democracy revisited. Germany: Springer. Broucek, V. and Turner, P. (2014) Considerations for e-forensics: insights into implications of uncoordinated technical, organisational and legal responses to illegal or inappropriate on-line behaviours,International Journal of Computing,4(2), pp.17-25. Clarke, R. (2016) Big data, big risks,Information Systems Journal,26(1), pp.77-90. Fakayode, S.O., Pollard, D.A., Snipes, V.T. and Atkinson, A. (2014) Offering a geoscience professional development program to promote science education and provide hands-on experiences for K12 science educators,Journal of Chemical Education,91(11), pp.1882-1886. Fraser, R. (2014) Collaboration, collusion and plagiarism in computer science coursework,Informatics in Education,13(2), pp.179. Ho, P.K. (2014) HCQIA Does Not Provide Adequate Due Process Protection, Improve Healthcare Quality and Is Outdated under Obama Care,Ind. Health L. Rev.,11, pp.303. Jizi, M.I., Salama, A., Dixon, R. and Stratling, R. (2014) Corporate governance and corporate social responsibility disclosure: Evidence from the US banking sector,Journal of Business Ethics,125(4), pp.601-615. Kerckaert, S., Vanderlinde, R. and van Braak, J. (2015) The role of ICT in early childhood education: Scale development and research on ICT use and influencing factors,European Early Childhood Education Research Journal,23(2), pp.183-199. KM, G.G. and JS, K. (2017) measuring professionalism in residency program,Biomedica,31(3), pp.239-245. Lawrence, A.T. and Weber, J. (2014)Business and society: Stakeholders, ethics, public policy. USA: Tata McGraw-Hill Education. Liu, J.K., Susilo, W., Yuen, T.H., Au, M.H., Fang, J., Jiang, Z.L. and Zhou, J. (2016) Efficient privacy-preserving charging station reservation system for electric vehicles,The Computer Journal,59(7), pp.1040-1053. McDermid, D. (2015)Ethics in ICT: an Australian perspective. London: Pearson Higher Education AU. Patsakis, C., Laird, P., Clear, M., Bouroche, M. and Solanas, A. (2015) Interoperable privacy-aware e-participation within smart cities,Computer,48(1), pp.52-58. Prestridge, S.J. (2014) Reflective blogging as part of ICT professional development to support pedagogical change,Australian Journal of Teacher Education,39(2), pp.6. Scott, K.B., Turko, I.V. and Phinney, K.W. (2015) Quantitative performance of internal standard platforms for absolute protein quantification using multiple reaction monitoring-mass spectrometry,Analytical chemistry,87(8), pp.4429-4435. Sekaran, U. and Bougie, R. (2016)Research methods for business: A skill building approach. USA: John Wiley and Sons. Spulber, D.F. (2013) Innovation economics: The interplay among technology standards, competitive conduct, and economic performance,Journal of Competition Law and Economics,9(4), pp.777-825. Technica, A. (2016) Making a positive impact: updating the ACM code of ethics,Communications of the ACM,59(12). Vanderlinde, R., Aesaert, K. and Van Braak, J. (2014) Institutionalised ICT use in primary education: A multilevel analysis,Computers and Education,72, pp.1-10. Vella, S.F., Burmeister, O.K., Ceric, A. and Barnden, A., (2017) A systematic narrative review of literature on Catholic schools in Australia to better understand the role of School Leadership deploying and integrating Information and Communication Technology (ICT) in this environment,eJournal of Catholic Education in Australasia,3(1), pp.4.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.