Network Management






Assessment Details and Submission Guidelines
Unit Code

MN501
Unit Title

Network Management in Organisations
Term, Year

Term2, 2018
Assessment

Assignment2 (Group Report)
Type










Assessment

Ethical issues arising from use of ICT technologies
Title










Purpose of

This assignment assesses the following Unit Learning Outcomes; students should
the

be able to demonstrate their achievements in them.
assessment










(with ULO

Analyse ethical, professional standards and codes of practice in relation to ICT
Mapping)

systems;


Understand the importance of team work, collaboration and lifelong learning in


the workplace.
Weight
20%







Total Marks
100







Word range

800 1200
Due Date

Week11 Friday 23:55 PM.











Submission

All work must be submitted on Moodle by the due date along with a completed
Guidelines

Assignment Cover Page.


The assignment must be in MS Word format, 1.5 spacing, 11pt Calibri (Body)



font and 2 cm margins on all four sides of your page with appropriate section



headings.


Reference  sources  must  be  cited  in  the  text  of  the  report,  and  listed


appropriately at the end in a reference list using IEEE referencing style.
Extension

If an extension of time to submit work is required, a Special Consideration



Application must be submitted directly on AMS.   You must submit this



application three working days prior to the due date of the assignment. Further



information is available at:



http://www.mit.edu.au/aboutmit/institutepublications/policiesprocedures




andguidelines/specialconsiderationdeferment





Academic

Academic Misconduct is a serious offence. Depending on the seriousness of the
Misconduct


case, penalties can vary from a written warning or zero marks to exclusion from



the course or rescinding the degree. Students should make themselves familiar



with the full policy and procedure available at:http://www.mit.edu.au/about











mit/institutepublications/policiesproceduresandguidelines/Plagiarism




AcademicMisconductPolicyProcedure. For further information, please refer








to the Academic Integrity Section in your Unit Description.


Assignment Description

Students should form a group of five (5) students from the same laboratory class. You must not change the group membership unless approved by your tutor. Tutor will then allocate one of the topics listed in Table 1 to each group.

All students must collaborate in this group assignment and contribute equally. Group leader should report their progress on a weekly basis to relevant tutor. Every student must participate in peer assessment on the Spark Plus system.


 Table 1: List of topics for Assignment2. 


Topic 1: Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Jean has found herself stuck on several parts of the program. Her manager, not recognising the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a coworker had given her source listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her coworker and the commercial software, but does not tell anyone or mention it in the documentation. She completes the project and turns it in a day ahead of time.

Investigate and report on the ethical issues raised in this case.



Topic 2: Three years ago Diane started her own consulting business. She has been so successful that she now has several people working for her and many clients. Their consulting work included advising on how to set up corporate intranets, designing database management systems, and advising about security.

Presently she is designing a database management system for the personnel office of a medium sized company. Diane has involved the client in the design process, informing the CEO, the director of computing, and the director of personnel about the progress of the system. It is now time to make decisions about the kind and degree of security to build into the system. Diane has described several options to the client. Because the system is going to cost more than they planned, the client has decided to opt for a less secure system. She believes the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims, salaries, and so forth.

With weak security, employees working on client machines may be able to figure out ways to get access to this data, not to mention the possibility of online access from hackers. Diane feels strongly that the system should be much more secure. She has tried to explain the risks, but the CEO, director of computing and director of personnel all agree that less security will do.

What should she do? Should she refuse to build the system as they request?


Topic 3: Max works in a large state department of alcoholism and drug abuse. The agency administers programs for individuals with alcohol and drug problems, and maintains a huge database of information on the clients who use their services. Some of the data files contain the names and current addresses of clients.

Max has been asked to take a look at the track records of the treatment programs. He is to put together a report that contains the number of clients seen in each program each month for the past five years, length of each client’s treatment, number of clients who return after completion of a program, criminal histories of clients, and so on. In order to put together this report, Max has been given access to all files in the agency’s mainframe computer. After assembling the data into a file that includes the clients’ names, he downloads it to the computer in his office.

Under pressure to get the report finished by the deadline, Max decides he will have to work at home over the weekend in order to finish on time. He burns the information onto a CD and takes it home. After finishing the report he leaves the CD at home and forgets about it.

Investigate and report on the ethical issues raised in this case.


Topic 4: A computer company is writing the first stage of a more efficient accounting system that will be used by the government. This system will save tax payers a considerable amount of money every year. A computer professional, who is asked to design the accounting system, assigns different parts of the system to her staff. One person is responsible for developing the reports; another is responsible for the internal processing; and a third for the user interface. The manager is shown the system and agrees that it can do everything in the requirements. The system is installed, but the staff finds the interface so difficult to use that their complaints are heard by upper level management. Because of these complaints, upperlevel management will not invest any more money in the development of the new accounting system and they go back to their original, more expensive system.

Investigate and report on the ethical issues raised in this case.


Topic 5: A software development company has just produced a new software package that incorporates the new tax laws and figures taxes for both individuals and small businesses. The president of the company knows that the program has a number of bugs. He also believes the first firm to put this kind of software on the market is likely to capture the largest market share. The company widely advertises the program. When the company actually ships a CD, it includes a disclaimer of responsibility for errors resulting from the use of the program. The company expects it will receive a number of complaints, queries, and suggestions for modification. The company plans to use these to make changes and eventually issue updated, improved, and debugged versions. The president argues that this is general industry policy and that anyone who buys version 1.0 of a program knows this and will take proper precautions. Because of bugs, a number of users filed incorrect tax returns and were penalised by the Australian Tax Office (ATO).

Investigate and report on the ethical issues raised in this case.


Marking criteria:

You must use the following aspects as headings for your report.


Aspects
Description of the section
Marks
1.
Introduction to the case /
Introduce the ethical issue/s that arise in the
10

scenario
case/scenario, and describe these clearly.





2.
Identification of ethical
Identify at least 2 important ethical values related to
20

values
the scenario and explain their relevance to the case.



Use peer reviewed academic sources.





3.
Analysis of ethical issues
Conduct an ethical analysis using ethical theories
30

using ethical theories
framework (consequence, duty, contract and character


framework
based theories). Use ethical principles from these



theories, apply it to the scenario, and conduct your



analysis. Arguments need to be stated clearly and



backed up using peerreviewed sources.





4.
Discussion on your findings
Discuss your findings here in detail. What would be
20


your final decision? Explain why this is the best



decision. Justify from ethical and practical angles.





5.
Conclusion
Write a conclusion to summarise the research work you
10


did, and state your final decision. No new information



should be included in the conclusion.





6.
Referencing
Follow IEEE reference style
10






Total
100






 To get solution visit our website www.sourceessay.com

Comments

Popular posts from this blog

Nurture Cluster

Organisational Best Practice

Why Students Are Stressed Today