Discuss About The Journal Catholic Education In Australasia?
The essay outlines the different ethical techniques that are affecting and generating the challenges of Diane’s Company. The main purpose of this report is to provide the best database management system for maintenance of personal office in a medium sized company. The main aim of this report is to analyze the ethical techniques for using the Diane’s situation. It is also evaluated an ICA professional using the ACS code of ethics. This case study also identifying the Ethical issued that connected by the ICT.
Diane has started own consulting business for three year ago. Many employees have worked in Diane’s office as well as she has numerous clients to doing work with her. Diane is a successful working woman. In her consulting business, many things are involved that defines how to designed database management system, advising about security and corporate intranets. She has designed the system of database management of a medium-sized business. She has included the customers for the purpose of informing the CEO of company, director of computing, design process as well as individual director on the system process. She has given the numerous types of options to the customers for doing the business with her. Diane believed that she provides best opportunity and best security services to CEO of the company. She has to shore that she provides data it would be exceptionally receptive. It would also involved medical records for filing insurance claim, salaries, performance evaluation etc.
Doing Ethics Technique refers to the process which can be used for the purpose of analysing any issues related to ethical dilemmas relating to any situation. Thus technique does not provide any type of readymade solutions to the problems. But it helps in developing the techniques in the best possible ethical manner (Sekaran and Bougie, 2016). It can be also said that this technique is not clear and lacks in providing the required parameters and guidelines to the problems. There are several principles that can comply with the techniques of doing ethics:
Contribution to welfare of society: The main focus of this principle lies on the assuring the quality of life of the peoples by obligating them to protect the fundamental rights of human beings and to respect the diversification of all the cultures. In context of computing and networking, its main objective is to minimise the negative outcomes like dangers to system and health of cyber world (Lawrence and Weber, 2014). At the time of designing systems, ensuring that the product can be used in social and responsible way must be the main aim of the computer professionals.
Protecting others from getting harmed: This principle restricts the usage of information technology in such a manner which can cause harm the society and human beings. Several actions like modifying or destroying files and data intentionally which can cause severe damages to human resource are banned by this principle. Considering all the possible results that can affects designing and implementation of the software is the best possible way which can reduce this risk. With the help of minimising malfunctions by adopting standards that are designed for this purpose, occurrence of happening of damages can be reduced to a certain extent. Along with it, evaluating social disadvantages of a system is also required to determine the possibility of happening of any damage (Clarke, 2016). Testing and analysing the signs of a system that can possess harm to society or human beings is another obligation of a computer professional.
Maintaining honesty and reliability: Honesty is the core element which can help an organisation to work in an effective and efficient manner. It is the duty of a computer professional to remain honest towards the qualifications that he or she possesses and towards the situation that may results in occurrence of disputes on interests of different members. A computer professional is required not to misunderstand the policies and regulations of Association for Computing Machinery or its any subsidiary or branch (Liu, et al., 2016).
Be fair and should not differentiates: This principle governs by the principle of equal and fair justice and valuing the concept of equality, forbearance and respecting others. The policies of Association for Computing Machinery does not favours the discrimination which are based on the basis of various factors like age, sex, religion, community or disability. Misusing the information and technology can possess the results in favour of arising inequalities between different members of group (Berleur and Whitehouse, 2013). A rational society provides opportunities to all the peoples to access the benefits of information technology.
Should obey property rights: In most of the situations, the law of a country does not permits several types of activities like violating patents, trade secrets, copyrights and terms and conditions of license agreements. Such type of behaviours always remains in contradiction to the ethical and professional behaviour even if the software cannot be considered as secured one. Software can be copied only after taking the proper permission from authorised owner (Technica, 2016). Attention should be paid to the unauthorised copying of materials or software.
Intellectual property should be given due credit: It is the obligation of a computer professional to protect the truthfulness of logical property. No one should entertains the credit for the work or ideas that belongs to some another person even in those situation in which work or software does not possess protection in terms of copyright or patents (Fraser, 2014).
Privacy of others should be given due respect: Collecting and exchanging personal information using the medium of information and technology can be resulted in violating the privacy of persons and society. Maintaining the privacy and integrity of personalised data is the key obligation of computer professionals. Various steps like taking preliminary steps in order to maintain the accuracy of data, preventing unauthorised persons to access the data, formulating new procedures for the purpose of permitting new individuals to check and amend their data are included in the method of maintaining privacy (Patsakis, et al., 2015). This principle focuses on the collection of personal information of a user after taking prior permission of that particular person. This should be done in a very sophisticated and limited manner with the consent of that person. Medium and users of electronic communication are some of the scope of this principle.
Respecting the confidentiality of the data: This principle expands with problems of privacy related to information whenever the extensive promise of maintaining the confidentiality has been made by someone and private information does not have direct connection with the performance of duty of a person (Broucek and Turner, s2014).
In the given scenario, Diane is concerned for the compilation with the principle of respecting confidentiality of data. According to the case, she has designed software which provides outmost level of confidentiality to the data of the user. But the problem arises when the cost incurred in framing the project exceeds the budgeted cost.
To action by the duty of professional as well as honesty person, will dealings among the students, customers, and community generally, employers and employees. As per the case, Diane has dealing with their clients and employees very honestly and she known her responsibility for its workers and work (McDermid, 2015).
To work attentively and proficiently for customers or workers, Diane has to work with very proficiently and attentively for their workers and customers.
Diane has to be honest for the demonstration of its work for knowledge, products, services and skills. She has knowing about its consulting business services. She knows how to represent its work with good services.
An attempt to improve the superiority of life of those affect in work. As per this case, Diane has attempted towards developing the excellence of life that affected the work.
To improve the professional development for colleagues, student and employees, Diane has been improved its professional skills like knowledge about database, advising about security and corporate intranets for its employees and colleagues.
To improve the reliability of the work of computing as well as admiration of its associate for everyone, According to this context, Diane has to develop the consistency of work of computing and appreciation of associate with everyone.
A standard of conduct means to the set of manner that ethics of code can be applied to professional work of member. There are many standards of conducts, which can be applicable to ASC code of ethics such as priorities, computing profession, competence, honesty, professional development and social implications (Spulber, 2013).
Priorities: Diane has attempted to conserve stability of computing services as well as data information of business has been run during her mind. She also esteems the proprietary environment of data information (Scott, et al., 2015). She has given advice to its business clients and worker of any probable disagreement of interest among its legal or assignment and another supplies to the people. She has been respected the database information for nature of proprietary.
Computing profession: Diane would respect or inquire about the computing profession and it is required for the professional opinions of clients and employer in the proficiency part. She has not intentionally connected within the professions and to be connecting by deceitful and fake performs (Vella, et al., 2017).
Competence: Diane has provided computing services or products that have to be connected with the financial or operational required for its customers and workers. She would be conscious for standards that have been relevant for its consulting business or will actions consequently (Ho, 2014). She has responsible for its work.
Honesty: She has dedicated and honest in representing the knowledge about products, service and skills for its work (KM and JS, 2017). She would provide rational predictions for computing project.
Professional development: Diane has improved her professional skills for employees, students and colleagues. She has also promoted her employees, students and colleagues to increase development of professions. She will also improve skills and knowledge for present time (Fakayode, et al., 2014).
Social implications: In any business, it has promoted or protects the healthy and safety environment that influence the employees work (Jizi, et al., 2014).
The standard Board of ACS professional considers professionalism like somebody qualified for level of professional of membership. They are given the various process of person and there are followed skills, capabilities and knowledge likes:
In context of board, it has provided different types of theoretical and factual data of ICT professionals.
For ICT field, there are solved many issues that related to the demonstrating mastery, innovation and advanced skills and changeable, complicated and random issues are also solved (Prestridge, 2014).
There is required to capability such skills, knowledge about the project for complete the business projects.
Company has taken duty and responsibility to reduced the technical multifaceted and project or actions for professional.
Information about the data, facts or skills that acquired by the education and experience
A specific job, a standard required to capability to perform well to complete projects.
Including the critical understanding of principles and theories for advanced and coherent body of information during a field and discipline
In context of work acts, exercise management and supervision there has been randomly changed.
ACS offers a service of accreditation towards making certain degree of ICT that has appropriate for initial practice of professional. Professional Certifications of ACS offers the overpass connecting the current practice and historical entry point in the field of ICT. Accreditation of ASC analyzes that how Graduate Attributes of ICT has been deal with every plan presented for endorsement (Vanderlinde, et al., 2014). It has also analyzed that how every plan presents the CBOK area of core knowledge as well as common part of ICT data. CBOK has utilized within two manners, which support the certification processes and accreditation. According to the opinion of Australian Computer System, a professional of ICT can be held eligible for taking membership of professional level. But taking the membership of ICT is not an easy task. It is treated as a level for a person who has achieved the professional level of membership. The main aim of professionalism membership is to create differences between practitioners of ICT and other peoples. The membership of ACS professionals can be used in providing proofs to potential clients and members having similar professional abilities. Raising the level of knowledge, skills and potential is the main objective of ICS professional (Kerckaert, et al., 2015).
On the basis of analysing above report and case, it can be said that parties are favouring their own point of view. This case is related with the company which is engaged in the business of outsourcing the various types of activities to its clients. One side of the case is related with the Diane who is the owner of the business. She has developed software based on the demand of its clients which is medium size company. Then, the client has chosen a less costly project after comprising with the security aspect. But the belief of the lady lies in the favour of secured software which can prevent the data from hacking and unauthorised access. In this report, along with the discussion of the case, doing ethics techniques and Code of Ethics of ACS has been discussed. These two types of ethics provide much help in understanding the case thoroughly.
On the basis of above analysis, it can be recommended to Diane that she should tries to frame that software again keeping in mind the cost and extent of confidentiality. It is also recommended to Diane that she should tries to convince her management and senior staff by telling advantages and merits of the designed software. As in the given scenario, the stated Code explains the obligation of verifying the designing and implementing the system which protects the personal privacy and faults. Protecting the privacy of their employees is the legal obligations of the company. Educating the officials of the company is the attempt made by the Diane. If she fails in convincing her senior management, Diane is required to think about the obligations that are stated in the contract. At the last, Diane is required to make a choice between responsibilities of respecting the principles of privacy and confidentiality and contract.
Berleur, J.J. and Whitehouse, D. eds. (2013) An ethical global information society: Culture and democracy revisited. Germany: Springer.
Broucek, V. and Turner, P. (2014) Considerations for e-forensics: insights into implications of uncoordinated technical, organisational and legal responses to illegal or inappropriate on-line behaviours, International Journal of Computing, 4(2), pp.17-25.
Clarke, R. (2016) Big data, big risks, Information Systems Journal, 26(1), pp.77-90.
Fakayode, S.O., Pollard, D.A., Snipes, V.T. and Atkinson, A. (2014) Offering a geoscience professional development program to promote science education and provide hands-on experiences for K–12 science educators, Journal of Chemical Education, 91(11), pp.1882-1886.
Fraser, R. (2014) Collaboration, collusion and plagiarism in computer science coursework, Informatics in Education, 13(2), pp.179.
Ho, P.K. (2014) HCQIA Does Not Provide Adequate Due Process Protection, Improve Healthcare Quality and Is Outdated under Obama Care, Ind. Health L. Rev., 11, pp.303.
Jizi, M.I., Salama, A., Dixon, R. and Stratling, R. (2014) Corporate governance and corporate social responsibility disclosure: Evidence from the US banking sector, Journal of Business Ethics, 125(4), pp.601-615.
Kerckaert, S., Vanderlinde, R. and van Braak, J. (2015) The role of ICT in early childhood education: Scale development and research on ICT use and influencing factors, European Early Childhood Education Research Journal, 23(2), pp.183-199.
KM, G.G. and JS, K. (2017) measuring professionalism in residency program, Biomedica, 31(3), pp.239-245.
Lawrence, A.T. and Weber, J. (2014) Business and society: Stakeholders, ethics, public policy. USA: Tata McGraw-Hill Education.
Liu, J.K., Susilo, W., Yuen, T.H., Au, M.H., Fang, J., Jiang, Z.L. and Zhou, J. (2016) Efficient privacy-preserving charging station reservation system for electric vehicles, The Computer Journal, 59(7), pp.1040-1053.
McDermid, D. (2015) Ethics in ICT: an Australian perspective. London: Pearson Higher Education AU.
Patsakis, C., Laird, P., Clear, M., Bouroche, M. and Solanas, A. (2015) Interoperable privacy-aware e-participation within smart cities, Computer, 48(1), pp.52-58.
Prestridge, S.J. (2014) Reflective blogging as part of ICT professional development to support pedagogical change, Australian Journal of Teacher Education, 39(2), pp.6.
Scott, K.B., Turko, I.V. and Phinney, K.W. (2015) Quantitative performance of internal standard platforms for absolute protein quantification using multiple reaction monitoring-mass spectrometry, Analytical chemistry, 87(8), pp.4429-4435.
Sekaran, U. and Bougie, R. (2016) Research methods for business: A skill building approach. USA: John Wiley and Sons.
Spulber, D.F. (2013) Innovation economics: The interplay among technology standards, competitive conduct, and economic performance, Journal of Competition Law and Economics, 9(4), pp.777-825.
Technica, A. (2016) Making a positive impact: updating the ACM code of ethics, Communications of the ACM, 59(12).
Vanderlinde, R., Aesaert, K. and Van Braak, J. (2014) Institutionalised ICT use in primary education: A multilevel analysis, Computers and Education, 72, pp.1-10.
Vella, S.F., Burmeister, O.K., Ceric, A. and Barnden, A., (2017) A systematic narrative review of literature on Catholic schools in Australia to better understand the role of School Leadership deploying and integrating Information and Communication Technology (ICT) in this environment, eJournal of Catholic Education in Australasia, 3(1), pp.4.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Journal Catholic Education In Australasia. Retrieved from https://myassignmenthelp.com/free-samples/journal-catholic-education-in-australasia.
"Journal Catholic Education In Australasia." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/journal-catholic-education-in-australasia.
My Assignment Help (2018) Journal Catholic Education In Australasia [Online]. Available from: https://myassignmenthelp.com/free-samples/journal-catholic-education-in-australasia
[Accessed 31 May 2020].
My Assignment Help. 'Journal Catholic Education In Australasia' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/journal-catholic-education-in-australasia> accessed 31 May 2020.
My Assignment Help. Journal Catholic Education In Australasia [Internet]. My Assignment Help. 2018 [cited 31 May 2020]. Available from: https://myassignmenthelp.com/free-samples/journal-catholic-education-in-australasia.
MyAssignmenthelp.com is an Australia-based assignment help services that aims to fulfill students' requests 'can someone do my assignment online'. We have hired best-qualified and experienced assignment helper to assist students in crafting premier quality academic papers. Students are guaranteed to receive high-quality assignment writing assistance at an affordable price. This is why, we are considered as the best assignment solver.
Answer: Project Activities Activity List: WBS Task Name Duration Start Finish 0 Essendon & Buckley Street level crossing removal 985 days Wed 4/25/18 Tue 2/1/22 1 Initiation phase of the project 73 days Wed 4/25/18 Fri 8/3/18 1.1 Identifying objectives of the project 15 days Wed 4/25/18 Tue 5/15/18 1.2 Undertak...Read More
Answer: Portraying company’s information, while depicting core markets, activities, and factors: The company is relatively focused in mining and exploring gold, copper, and uranium in Australia. Marmota Limited is mainly situated in south of Australia, where relevant fields are controlled by the company for its mining needs. The company operations in Australia and is linked with the Australian consumer demand, which could help in genera...Read More
Answer: Introduction: The Australian Health Survey 2011-2012 found that nearly two in every three people aged two years and over had a usual intake of sodium that exceeded the Upper Limit (UL). Intakes of sodium were also consistently higher for males than females. At a population level, how do you think sodium intakes could decrease so that more people are meeting, (or at least not exceeding) the recommendations? Sodium intake has ...Read More
Answer: Introduction The area of organization theory is considered as a fragmented body of knowledge by including various competing theories to understand and explain the organization design and its actions. There are many researchers, which claim that, the arguments among different organizational theories are the level of competition of their ideas and thoughts (D’Adderio, and Pollock, 2014). Some management experts assume that these t...Read More
Answer: 1. The usages of BIM in facilities management The information which is stored in within the BIM includes the blueprints, schedules and the asset data such as location, cost, carbon impact, and maintenance, integrating the BIM with the facility management software system is a great tool to standardized data and also the better services. Reliable data is provided by BIM which can be used to report to the board. This because the data can b...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I would recommend it to my friends, easy to contact. always on time and offering good prices
The work was phenomenally done, and it was even praised. I highly recommend this site, the service and help, altogether, I would not have passed any classes if it weren\'t for you guys and gals
The assignment was very well written, and the teacher was very pleased and praised the work.
For once, what I asked for was delivered without any hassle and going back and forth. Whichever writer did the assignment, thank you so much for revamping my assignment based on the feedback that was provided.