Discussing the key benefits of smart technologies

Assignment Help Computer Networking
Reference no: EM132202107

Assessment - Ethical issues arising from use of ICT technologies

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard.

In this assignment students will:
• Identify potential ethical and social issues related to IT administration ethics.
• Discuss ethical and social issues pertaining to IT systems-administration.
• Interpret professional codes of ethics developed by various industry bodies.
• Discuss ethical behaviour in accordance with professional codes.
• Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Assignment Description

Smart technologies are on the rise. There is a body of literature discussing the key benefits of Smart Technologies; however smart technologies also introduce many ethical issues.

0) Social media is becoming addictive for many people. Some people are constantly haunted by the Fear of Missing out (FoMo)? Explore the extent to which the FoMo syndrome is now prevalent in the society and its ethical impacts.

1) Cyberbullying has been a significant issue globally over the past few years. Cyber-technology has exacerbated this problem due to proliferation of mobile applications in the marketplace. You receive notification from a third party through one of the Apps that you use inviting you to participate in an event. You are not sure how they received your details. Discuss what security issues arise due to sharing of too much personal information on social media Apps.

2) Smart phones are being used by nurses for clinical communications and workflow in hospitals. Using smart phones to record patient data introduces ethical issues involving patient privacy. Identify what privacy risks arise in such a context and explain the risks in detail.

3) Technologies such as google glass and smart watches are coming into workplace. Given the intrusive natures of these technologies it is easy for employees to take video or photographs of other people at work and share it with others. What ethical issues arise from use of wearable technologies in workplace?

4) There are many apps available for download for consumers (for example, health monitoring, booking taxi, banking apps). While these Apps are user friendly and improve user experience, there is also a security concern that hackers can use some loopholes in such apps to modify or delete customer information. Discuss an App that you have used recently and if there have been privacy breaches? Is it ethical for companies to introduce Apps with only basic level of security?

Investigate and reflect upon one of the above scenarios using Ethical Guidelines published by organisations such as: EA and ACS.

Attachment:- Assignment.rar

Verified Expert

Security issues of personal information sharing is the core topic of discussion.What makes it vulnerable and how the information sharing results in problems to the users are some of the issues discussed in the current article.Cyber bullying laws protecting victims etc are discussed in the current article.

Reference no: EM132202107

Questions Cloud

Subjective techniques for finding probabilities : What are the differences among theoretical, relative frequency, and subjective techniques for finding probabilities? Give an example of each.
What does it mean when we write p : What does it mean when we write P(event)? What is the possible range of values for P(event), and why? Please explain.
Find the pooled estimate p : Use the given sample sizes and numbers of successes to find the pooled estimate p.
P-value of the sample test statistic : Find (or estimate) the P-value of the sample test statistic.
Discussing the key benefits of smart technologies : MN501 Network Management in Organisations - develop skills in research, critical analysis and academic writing of high standard
What is the risk of the efficient portfolio in this case : Suppose we desire to achieve an expected return of 10%, by in- vesting in the risk free and the risky assets, what is the risk of the efficient portfolio
Marxian analysis of capitalism supports criticism : Explain how the basic Marxian analysis of capitalism supports this criticism.
What is the price elasticity of demand : Suppose equilibrium price in the market is $30, and the marginal revenue is $20. What is the price elasticity of demand?
Discuss the process of debt accumulation in poor countries : Discuss the process of debt accumulation in poor countries, ie, how loans are granted, fall behind in payment, and eventually often lead to a crisis

Reviews

len2202107

12/24/2018 4:12:11 AM

attached the assignment please have a look.its very easy i do not have time right now to prepare so i want perfect solution in order to achieve above 90%.you need to answer first question according to my student id ending number that is (Cyber bullying has been a significant issue globally over the past few years. Cyber-technology has exacerbated this problem due to proliferation of mobile applications in the marketplace. You receive notification from a third party through one of the Apps that you use inviting you to participate in an event. You are not sure how they received your details. Discuss what security issues arise due to sharing of too much personal information on social media Apps) thank you.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd