IT485 Assignment2
IT485 Assignment2
Professional Ethics in IT
IT485
Assignmen
t2
Instructions:
Student Details:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Name: Blackboard
### ID: ###
via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
CRN:
###
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Res
tric
ted
-
مقي
د
Pg. 1 Question FourQuestion Four
Learning 2 Marks
Outcome(s): Question One
CLO5: Apply
Ethics in What are the most common security challenges organizations face when
Computing implementing a Bring Your Own Device (BYOD) policy, and what strategies can
Profession. be used to effectively address these challenges?
Res
tric
ted
-
مقي
د
Pg. 2 Question FourQuestion Four
2 Marks
Learning
Outcome(s): Question Two
CLO6: Illustrate Provide two real-world examples of phishing attacks and describe the impact
social and ethical or damage each attack caused.
issues in
computing as a
computer
professional.
Res
tric
ted
-
مقي
د
Pg. 3 Question FourQuestion Four
2 Marks
Learning
Outcome(s): Question Three
CLO3: Recognize
Retailers use data mining to predict customer behavior and target specific
the importance of
Ethics and groups—for example, identifying pregnant customers based on shopping
Computing patterns, sometimes before the customer announces it.
Discuss the ethical, professional, and privacy concerns of using data mining to
target sensitive situations like pregnancy.
Res
tric
ted
-
مقي
د
Pg. 4 Question FourQuestion Four
2 Marks
Learning
Outcome(s): Question Four
CLO2: Recognize Governments must balance two important goals: keeping people safe and
the respecting their privacy.
responsibilities
and duties of a Give one example of how a government tries to balance security and privacy
computer
professional (e.g., CCTV, drones, license plate scanners).
Do you think this example protects people without violating their privacy? Does
this help stop crime or improve safety? Explain your view briefly.
Res
tric
ted
-
مقي
د