ITM515 Strategic Communication Ethics In Security

Anonymous
timer Asked: Feb 3rd, 2019
account_balance_wallet $70

Question Description

Chapter-4

  • Prepare and submit a 3 – 4 page paper discussing Scenario 1: Ethics in Security.
  • Key Concepts As a trained professional, you’re going to have access to a lot of power and
  • authority. Something like this is bound to come up in the course of your career, and it’s

    within your capabilities to do it. However, there are several reasons that you should never do something like this and should instead refuse to comply.

  • Skills for the A+ Exam, page 85 - Discuss the reason for the correct response. How do these responses relate and impact IT? ITM 515 Strategic Communication
  • Course Syllabus Page 10 of 11

  • Prepare and submit a 3 – 4 page paper discussing Scenario Scenario 2: What Can I Throw Away?
  • Key Concepts
  • Confidentiality in the technology business has two distinct meanings: confidentiality in terms of data

    (technological confidentiality) and confidentiality in terms of entrusted information (business confidentiality).

  • Skills for the A+ Exam, page 89 - Discuss the reason for the correct response. How do these responses relate and impact IT?
  • Tutor Answer

    Chancellor_Ivy
    School: Rice University

    Attached.

    Running Head: ETHICS, SECURITY AND CONFIDENTIAL MATERIAL

    Ethics, Security and Confidential Material
    Institutional Affiliation
    Date

    1

    ETHICS, SECURITY AND CONFIDENTIAL MATERIAL

    2

    Section One
    The scenario presented revolves around a technician who works for one of the
    Internet service providers in the region. The technician has been called to assist in fixing
    specific issues which were plaguing the customer. The atmosphere which exists is quite
    cordial since the customer is not only welcoming but is also friendly. In the scenario, the
    customer offers a cold beverage to the technician and proceeds to ask whether he would like
    to have anything to eat. He further continues to show the technician the problem which is
    plaguing him which is not only diagnosed but is fixed quickly by the technician.
    The main issue which is portrayed in the scenario involving the two parties will be a
    conflict of interest. A conflict of interest will develop after a professional has chosen to
    receive gifts which will be given to them by the customers. The offerings may be in the form
    of a cold beverage like the one which was served to the technician or food. Further gifts
    which would be given may be material gifts or money. The acceptance of gifts of various
    forms from customers, while within the work premises, will be considered inappropriate. The
    same will also apply when an individual accepts gifts from a customer while he or she is on
    duty or is performing a particular service on behalf of the company he works for (Johnson,
    2007).
    A conflict of interest will develop after the employee has accepted the gift. Most of
    the employee handbooks which will also apply to Information Technology will provide
    provisions on employee conduct, that is, what behavior will be regarded as appropriate and
    conduct which should be avoided. One of the conducts which will be included will revolve
    around the acceptance of gifts from customers. Gifts may be regarded as something good, but
    it will also influence the decision of the employee. The customer, as provided in the scenario,
    offered such gifts to the technician since he knew that the technician would be inclined to
    grant his request since he has not only been a good customer by not interrupting while the
    technician was working but has also managed to provide refreshments (Johnson, 2007).
    There are various situations which will be provided that will show instances where
    receiving a gift from an employee will be considered as unethical. One of the cases will be
    when the accepting of the gift influences the decision of the professional. As seen in the case
    scenario, the customer flatters the technician so that he can obtain favor from him which will
    include free internet service. The cold beverage, as well as, the meal which was being
    provided to the technician will serve as flattery which will influence the judgment or the
    decision which will be made by the technician. An unethical technician will make
    observations of what has occurred while he was performing various services in the household
    and may choose to grant the customer the favor which was requested.
    One other situation which shows when receiving gifts will be regarded as unethical
    will be when the offerings are offered to manipulate the customer that the services can only
    be provided if the customer has given the gift. Such a situation is absent in the scenario since
    it is quite clear that the individual who was manipulating the other individual was the
    customer who used a cold beverage and his polite manner to alter the judgment of the
    employee as seen in the scenario (Johnson, 2007).

    ETHICS, SECURITY AND CONFIDENTIAL MATERIAL

    3

    Policies have been established by many IT companies which revolve around conflict
    of interest. Such policies will focus on the two instances which have been provided above and
    can be seen in the case scenario. There are other instances which will also be included in the
    policies. Receiving gifts from the customers will also be regarded as unprofessional. The act
    of receiving an offering from a customer will breach the professional boundaries which have
    been placed in the industry. The technical limits will profoundly apply to the case study since
    the technician has gone to represent his company professionally. This will mean that the
    technician will have to be professional when providing the necessary services to the
    customers to preserve the reputation of the internet provider. Professionalism will be
    achieved when the employee chooses to say no when it comes to accepting or receiving gifts
    from their customers. Receiving gifts from the customers will highly be unprofessional and
    will portray the company in bad light. Hence, the professional boundaries which have been
    established between the technician and the employee will have to be maintained even though
    the gift given to the employee will be well-intentioned (Johnson, 2007).
    The policies which revolve around receiving gifts will also prevent unequal treatment
    when it comes to the relations which exist between the technicians and the customers. For
    instance, the technician in the scenario may decide to treat this particular customer differently
    from the other customers since the customer has offered gifts to him in the form of food and a
    cold beverage. The unequal treatment may also lead to a breach of company policies which
    will be evident in the scenario since customers ought to pay for the internet services they are
    receiving from the internet service provider. Some of the ethical issues which will be faced
    by the technicians while providing services to the customers may result to legal problems. In
    the scenario, the customer asked the technician for a favor which revolves around free
    internet services.
    The ethical guidance which will apply to IT professionals will focus on the code of
    ethics which have been established by the IEEE. The principles will govern the conduct of
    the technicians and will make sure that the technicians or the IT professionals will not only be
    competent in their duties but will also be honest while attending their work responsibilities.
    Ther...

    flag Report DMCA
    Review

    Anonymous
    Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

    Similar Questions
    Hot Questions
    Related Tags
    Study Guides

    Brown University





    1271 Tutors

    California Institute of Technology




    2131 Tutors

    Carnegie Mellon University




    982 Tutors

    Columbia University





    1256 Tutors

    Dartmouth University





    2113 Tutors

    Emory University





    2279 Tutors

    Harvard University





    599 Tutors

    Massachusetts Institute of Technology



    2319 Tutors

    New York University





    1645 Tutors

    Notre Dam University





    1911 Tutors

    Oklahoma University





    2122 Tutors

    Pennsylvania State University





    932 Tutors

    Princeton University





    1211 Tutors

    Stanford University





    983 Tutors

    University of California





    1282 Tutors

    Oxford University





    123 Tutors

    Yale University





    2325 Tutors