Reference no: EM132244349
Part A:
A Matter of Ethics or Law?
Prior to beginning work on this discussion, read Chapter 15 in the textbook, the Security and Ethical Issues in IT: An Organization's Perspective article, review any relevant information in this week's lecture, and research at least two additional credible sources on the topic IT ethics. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.)
As stated in the text, "people and organizations are responsible for the results, good or bad, of the use of IT" (p. 576). For this discussion you will analyze the role of ethics in IT and business. In your initial post, using an example of your choice, explain the differences between law and ethics.
Analyze the impact of ethical issues on IT, and provide an example of an ethical issue that has impacted an organization as well as an ethical issue that might impact you personally. Explain the potential legal and ethical challenges associated with advancing technology, using at least one example from your research. Explain whether or not you believe the laws have caught up with technology. Support your position with examples from credible sources.
Please make it a minimum of 300 words.
Part B:
Prior to beginning work on this discussion, read Chapter 15 in the textbook, the Security and Ethical Issues in IT: An Organization's Perspective article, review any relevant information in this week's lecture, and research at least two additional credible sources on the topic IT ethics. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.)
For your initial post, consider the following scenario.
After internal security issues nearly ruined the business, an organization is looking to hire a new chief information officer (CIO) to institute a new governance design. In addition, the new CIO will need to decide whether to use an acceleration or containment strategy to address user computing.
For this interactive assignment, you will take on the role of a perspective candidate for the CIO position and propose to the executives of the organization a governance design that you would implement. In a separate document, create a diagram that depicts your governance design and attach it to the initial post.
Within the initial post, explain the role of information systems governance in business and why the CIO role has become so important.
Explain the strategy you would use as the CIO to support user computing (i.e., acceleration or containment) and provide a rationale for why you selected one over the other. In addition, explain the governance design you created and would implement as the CIO of the organization. Provide at least three implementation examples to support your design selection and user computing rationale
Please make it a minimum of 300 words.
What vulnerability could be exploited
: Identify two threat sources, one adversarial and one non-adversarial, that could exploit a vulnerability to your workplace or your school that would result.
|
What vulnerability could be exploited
: Identify two threat sources, one adversarial and one non-adversarial, that could exploit a vulnerability to your workplace or your school that would result.
|
Describe the approach used to address the barriers
: Identify at least one organization that faced these barriers, describe the approach used to address these barriers, and explain whether it was successful.
|
How the system changes will be communicated to the users
: Building a new software application is just the start, as organizations invest in software to help solve business problems.
|
Explain the role of information systems governance
: Explain the role of information systems governance in business and why the CIO role has become so important.
|
Discuss transactional vs transformational leadership
: What are some of the ways that cross-cultural teams are distinguished from other types of teams?
|
Discuss the importance of a change agent and a guiding team
: Discuss the importance of a change agent and a guiding team. What is the purpose of each, and what traits make them successful?
|
Why is the problem interesting
: Why is the problem interesting? What is the best approach and plan to take? What kind of data is required to use?
|
The role of functional dependencies in normalization
: The role of functional dependencies in normalization, and how the goal of eliminating insertion,deletion, & update anomalies is achieved in relational design.
|