$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ITC506 Topics In Information Technology Ethics

tag 0 Download7 Pages 1,554 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: ITC506
  • University: Charles Sturt University
  • Country: Australia


Identify a recent (within the last six months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.

a. If using a workplace example, to maintain confidentiality, do not use real names.
b. If you use a media article you must include the link to the media article in the references list of your assignment.

Identify the key ethical issues contained in your chosen case and use the three distinct perspectives of applied ethics including professional, philosophical, sociological/descriptive ethics to analyse the ethical issues involved in the case.




In this paper the focus will be given on the present ethical dilemma which is concerned with the latest information and communication technology. In the present situation, it has been evaluated that the use of Facebook is enhancing day by day.  Facebook is a platform through which communication between people take place and also, they can view the stories of the other people easily through their posts.  There are many people who are addicted and post each activity on the social platform. It is one of the most popular social media platforms through which information can be transferred to large mass of audience. Through Facebook people can easily share their views and opinions, pictures and also different images related to the information (Benson, Saridakis & Tennakoon,2015). Therefore, through Facebook communication can take place easily and also information can transfer in less time.  

In this paper the topic which is taken into consideration is concerned with “FACEBOOK DATA BREACH”.  This case took place in April, 2018 and there 87 million customers who faced the issues (Shah, 2018).  In this paper, the case will be evaluated by considering the three distinct perspective of applied ethics. In this the three distinct perspective are professional, philosophical and also sociological ethics which will be discussed in context to the case Facebook data breach.

Professional Ethics Perspectives

It has been analyzed that professional ethics are known by the ICT companies that can give assistance to employers so that they can complete the activities or the operations by focusing on the values and principles.  Professional Ethics perspectives is considered as perceptive focuses on considering standards of the individual behavior in context to personal and business (Shapiro & Stefkovich, 2016). 

Professional ethics also enhance awareness about requirements and situation of the customers. If focus is given on the team of ICT it has been analyzed that they have to face many issues in context to managing entire information.  The privacy information can give negative impact if it is leaked and it can also be a huge loss to the companies if the information of the customers is leaked. There are many unethical posts that are posted on the social media sites which can also give negative impact and can lead to loss to the organizations (Ablon, Heaton, Lavery & Romanosky, 2016).   It has been analyzed that professional ethics plays an important role to protect the information of the customers.  If there is no professional code of conduct then it can be difficult to attain goodwill in the market. Professional ethics focuses on the personal and business behavior which is important for ICT companies so that security can be maintained and also goodwill can be maintained in the market.

If focus is given on Facebook breach data case it can be evaluated that there are many individuals who uploaded personal quiz application. In this application the details are asked from the people which shared with the Cambridge Analytica. Therefore, it can be stated that the company does not focus on professional ethics.  When this incident took place, the management of Facebook decided to declare that they give information about the misuse of personal information which is unethical (Murphy, 2017).

This has given negative impact on the goodwill of the company and also affected the professional morals which are set by Facebook. After this incident the management of the company make the judgement that they will focus on effective guidelines linked with the ethics. It will also help to analyze the behavior of the customers in a proper manner (Jordaan & Van Heerden, 2017).  So, it is essential for the company to focus on professional ethics so that customers can be satisfied and to maintain goodwill in competitive market.


Philosophical Ethics Perspectives

In this perceptive there are various ethics that should be considered like virtue ethics, consequentialism and pragmatic ethics. In this it has been seen that virtue ethics focuses on the correct things related to the ethics that should be performed. Consequentialism is related with the motive that should be good and if it is good then results will also be good. Pragmatic ethics is related with social growth that should be there so that goodwill can be maintained.  Philosophical ethics perceptive is related with the systemizing, defending and also focus on the concepts which are correct or incorrect. It has been analyzed to achieve success in the market it is important for the company to focus on specified rules (Darwall, 2018).  In the present scenario, this perceptive has an essential role in the companies related to information and communication technology.

By focusing on the case, it has been seen that privacy and security should be maintained by company so that customers can be satisfied. Customers wants that their private information should be kept secured so that it can be not misused by anyone. So, if this case is considered it can be analyzed that Facebook focused on some settings that should be there so that security can be maintained. The setting that were introduced by the company after the incident is related with introducing the setting like users can see that to which application permission is given to view the information.  If the information is leaked of the customers then it can affect the entire operations of the company and can also affect the growth in the market.  Therefore, it is important that every company should focus on proper safety to the users so that proper dealing can be made with ethical dilemma in context to technologies. Proper ICT policies should be taken into consideration by the companies so that privacy of the individuals can be maintained and satisfaction level of the people can also be maximized. If the information is not safeguard by the company then it can also give adverse impact on the activities of employees and goodwill (Spiekermann, Acquisti,  Böhme & Hui, 2015).

Sociological/Descriptive Ethics Perspectives

This section is related with the safety of an individual. It is important for the company to maintain proper confidentiality so that customers can be satisfied. Sociological problems are enhancing with the use of ICT and also increasing the level of anxiety. In this perceptive it has been analyzed that main focus is given on the society and also it creates the responsibility among individuals. It can be stated that people have the capability to evaluate the morals by emphasizing on right and wrong situation (Hämäläinen, 2016).  The responsibility of ICT is to provide proper storage of information so that privacy cannot be suffered. Same applies with Facebook, it is important to maintain confidentiality of the data so that people can take proper decisions which is beneficial for the company.

The information which is leaked by the company should be maintained so that people can maintain their trust again on the company. It is important to consider social perspective so that profession integrity, code of conduct can be maintained and it can also to reduce the social problems like misuse of the information and also cyber terrorism. The guideline on which Facebook should focus should be secure for the people so that ethical codes can be developed in the right manner. The company should also focus on giving guidelines to the employees so that they can operate and manage the operations of the company in the right manner. Code of ethics should be maintained by the company so that confidence level of the customers can be boosted and they can again maintain trust in context the operations of the company ((Jabee & Alam, 2016). It is essential for the company to maximize the satisfaction level of users so that it can be easy for them to accomplish their objectives and goals.  Trust is also one of the factor on which the company should focus on by maintaining security of the information of the customers or the users.



Ablon, L., Heaton, P., Lavery, D. C., & Romanosky, S. (2016). Consumer attitudes toward data breach notifications and loss of personal information. Rand Corporation.

Benson, V., Saridakis, G., & Tennakoon, H. (2015). Information disclosure of social media users: does control over personal information, user awareness and security notices matter?. Information Technology & People, 28(3), 426-441.

Darwall, S. (2018). Philosophical Ethics: An Historical and Contemporary Introduction. Routledge.

Hämäläinen, N. (2016). Descriptive Ethics: What Does Moral Philosophy Know about Morality?. Springer.

Jabee, R., & Alam, M. A. (2016). Issues and Challenges of Cyber Security for Social Networking Sites (Facebook). International Journal of Computer Applications, 144(3).

Jordaan, Y., & Van Heerden, G. (2017). Online privacy-related predictors of Facebook usage intensity. Computers in Human Behavior, 70, 90-96.

Murphy, R. S. (2017). Property rights in personal information: An economic defense of privacy. In Privacy (pp. 43-79). Routledge.

Shah, S. (2018). Facebook suffers another massive data breach that exposed the details of 120 million users.

Shapiro, J. P., & Stefkovich, J. A. (2016). Ethical leadership and decision making in education: Applying theoretical perspectives to complex dilemmas. Routledge.

Spiekermann, S., Acquisti, A., Böhme, R., & Hui, K. L. (2015). The challenges of personal data markets and privacy. Electronic Markets, 25(2), 161-167.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Topics In Information Technology Ethics. Retrieved from

"Topics In Information Technology Ethics." My Assignment Help, 2019,

My Assignment Help (2019) Topics In Information Technology Ethics [Online]. Available from:
[Accessed 21 January 2020].

My Assignment Help. 'Topics In Information Technology Ethics' (My Assignment Help, 2019) <> accessed 21 January 2020.

My Assignment Help. Topics In Information Technology Ethics [Internet]. My Assignment Help. 2019 [cited 21 January 2020]. Available from:

Whether you are a freshman in college or ccounting your final days towards post graduation, we act as your guide, letting you sail smooth over all the academic woes. We have a team of 4000+ Phd experts to navigate you through the nook and cons of every academic paper be it dissertation, thesis, complex research papers, essays and lot more. With a portfolio of experts on more than 100+ subjects , we are better than the best in the field.

Latest It Write Up Samples

BN206-Review Administration Systems

Download : 0 | Pages : 4

Answer: Introduction  The nano server in the windows is a new and improved server by windows. It provides user the option through which it is possible to install the windows server with the windows footprint that is possibly the lowest. The footprint is even smaller if compared to the server core. This is made possible through a smart technique that is controlled very efficiently [1]. In order to achieve this, the operating system is ref...

Read More arrow

ITECH5404-Business Process Architecture

Download : 0 | Pages : 8

Answer: Introduction In recent times it can be stated that most of the organisation directly rely on the functionality which is related to the process which is related to the process architecture is directly related to the business operation. The main concept which can be applied to the concept is that most of the complex and large projects are manipulated by the concept of the process architecture. The main functionality in this context can ...

Read More arrow

HI5019-Strategic Information System- Westpac Bank

Download : 0 | Pages : 14

Answer: Introduction In this report, the discussion is going to be done on the strategic information system of Westpac bank. Westpac bank is among the four major banks of Australia, with the headquarters located in the Sydney.  The westpac bank has divided in two segments, bank associated with the institution and the bank associated with consumer. Not only in Australia, Westpac bank holds a good rank in New Zealand. The bank had formed a...

Read More arrow

CIS2005 Principles Of Information Security 3

Download : 0 | Pages : 11

Answers: 1: CIA of information security is commonly described as the triad of information security. Confidentiality, Integrity and Availability are denoted by the term CIA. It is a model of information security that helps in evaluating organisation’s information security. Confidentiality is defined as ensuring authorized person is accessing data. Unauthorised access should be blocked to ensure information security. Disclosure of importa...

Read More arrow

MN502-Impact Of Ransom Eare In The Society

Download : 0 | Pages : 8

Answer: Introduction Ransom ware is a subset of the malicious software also known as malware invented from the cryptovirology which is designed to threaten the general public on account of stealing of data saved on either, computer or tablets. This software blocks the data of the person and the same is handed over to the person back once the money is received in the form of ransom [1]. The consequences of not giving the ransom can be so bad t...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

230 Order Completed

97% Response Time

Liya Han

Master Of Science in Geotechnical Engineering (MSc Geotec)

Singapore, Singapore

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

One of the best service provider fully satisfied with you guys. On time delivery of task.


User Id: 253575 - 21 Jan 2020


student rating student rating student rating student rating student rating

That was a very impressive work. That was a very impressive work. That was a very impressive work. That was a very impressive work. That was a very impressive work.


User Id: 336418 - 21 Jan 2020


student rating student rating student rating student rating student rating

Nice work Nice work Nice work Nice work Nice work Nice work Nice work Nice work Nice work Nice work Nice work Nice work


User Id: 256084 - 21 Jan 2020


student rating student rating student rating student rating student rating

Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service Great service


User Id: 256084 - 21 Jan 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?