​Paper B2: an Organizational or Personal Policy to address the IT-related ethical issue of Paper B1.

User Generated

earpx

Writing

Description


Write an organizational policy (or personal policy, if not in the job force) to correct the IT-related ethical issue that you described in Paper B1, where you mapped key organizational or personal issues and identified how these digital ethical issues were affected by relevant laws, regulations, and policies. Please incorporate the instructor’s feedback from the instructor’s evaluation of Paper B1, as appropriate and then use the Paper B1 matrix you produced as a supporting document.

The following elements must be addressed:

Look at other policies to see how they are written. While the following site: http://www.sans.org/security-resources/policies/computer.php, provides credible examples of templates for policies, an Internet search may provide other templates, however there is no need to copy a template for this assignment, as the template should only be utilized to provide guidance regarding the following headings.

Your policy should include appropriate information for the following major headings:

  • Overview of the policy
  • Purpose of the policy
  • Scope (roles and responsibilities of stakeholders)
  • Policy Points to follow - (Note: you should be aware that a policy only describes "what,"the staff of an organization will do, while a procedure describes "how," the staff of an organization will accomplish a required action. As a result, this section should only discuss the specific measures, needs, or changes to behavior within the organization in terms of policy points, i.e., what they must do to conform to the policy. Any procedures that are needed to assist in doing the “what,” are usually included by reference later in the policy – procedures should not be included in the policy points).
  • Sanctions/enforcement of policy

Prepare a 2-3 page, double-spaced paper with your Organizational or Personal Policy (if not in the job force).

This assignment requires a minimum of three external references. Indicate appropriate APA source citations for all sources you use.

In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

Unformatted Attachment Preview

Running Head: CYBERSTALKING 1 Stalking of Individuals Using Social Networking Sites Name: Institution: 2 CYBERSTALKING Stakeholders Confidentiality They have a duty to respect the privacy of information 1. the stalker and actions of other social network users. Duty to ensure users are made aware that they are content creators (Goldman, 2. the social 2007) and The site should networking site also conform to laws that ensure confidentiality of the information and actions of users is preserved. Law enforcement agents have the duty to ensure their 3.law enforcement actions don’t infringe the privacy of users of the networking site. Respect for persons Beneficence They have the duty to respect the human rights of other users. Has the duty to ensure their actions are meant for good. Duty to ensure the rights of users are preserved and maintained in its actions (Gan and Jenkins, 2015). Duty to ensure its actions brings good to all people to all people. Duty to ensure their Law enforcement actions don’t go against agents’ actions should human rights of users of bring good to all social networking sites people. (Paullet, 2009). Users of social networking sites find it influencing to post their personal information on these sites. Consequently, this information might find its hands to strangers. This personal information might then be used by these strangers to cause a felony against the victim. For instance, the stalker might be aiming to sexually harass the victim he or she is stalking. Not only stalking from other users but the social networking sites and law enforcement have been also blamed for accessing information on users of these sites. In particular, Facebook has been blamed for stealing user’s information (EPIC). This infringes on the network’s duty to maintain respect of privacy of users’ information. There have also been cases of government agencies gaining access to the confidential information of users. Confidentiality, respect for persons and beneficence as applied in this case are extremely important in reviewing the obligations between the different stakeholders in this case. The principles also form the framework for legal action against of the stakeholders in case the individual chooses to press charges. 3 CYBERSTALKING References Gan, D., & Jenkins, L. (2015). Social Networking Privacy—Who’s Stalking You? Future Internet, 7(4), 67-93. doi:10.3390/fi7010067 Goldman, E. (2007, May). Social Networking Sites and the Law. Retrieved from http://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf Paullet, K. L. (2009). An exploratory study of cyberstalking: Students and law enforcement in Allegheny County, Pennsylvania. Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment (Individual) (12%) Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies. Please incorporate the instructor’s feedback from the review and grade and then use the Matrix B1 you produced as a supporting document. The following elements must be addressed: 1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates: https://www.sans.org/security-resources/policies 2. Your policy should include the following major headings: a) Overview of policy b) Purpose c) Scope (roles and responsibilities of stakeholders) d) Policy/Procedures to follow e) Sanctions/Enforcement 3. Prepare a 3-4 page, double-spaced paper with your Organizational Policy. 4. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations for all sources you use. 5. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style. 6. Submit the assignment to the Assignment Folder as a MS Word File
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey again! Please find attached, in case you need edits, feel free to let me know.

Running Head: CYBERSTALKING

1

Stalking of Individuals Using Social Networking Sites
Name:
Institution:

2

CYBERSTALKING

Stakeholders

Confidentiality

Respect for persons

Beneficence

They have a duty to respect
They have the duty to Has the duty to ensure
the privacy of information
1. the stalker
respect the human their actions are meant
and actions of other social
rights of other users.
for good.
network users.
Duty to ensure users are
made aware that they are Duty to ensure the
content creators (Goldman, rights of users are
Duty to ensure its
2.
the
social 2007) and The site should preserved
and
actions brings good to
networking site
also conform to laws that maintained
in
its
all people to all people.
ensure the confidentiality of actions
(Gan
and
the information and actions Jenkins, 2015).
of users is preserved.
Duty to ensure their
Law enforcement agents
Law
enforcement
actions don’t go against
3.law enforcement must ensure their actions human rights of users of agents’ actions should
don’t infringe the privacy of
bring good to all
social networking sites
users of the networking site.
people.
(Paullet, 2009).
Users of social networking sites come in with different intentions. However, these
different opinions make tend to make nonmalicious users find it hard to post their personal
information on these sites. This is because this information might find its hands to strangers, in
this case, the stalkers. These strangers might then use this personal information to causing a
felony against the victim. For instance, the stalker might be aiming to harass the victim sexually
he, or she is stalking without the knowledge of the other user. On the side of the social
networking sites, the admins have a role to ensu...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags