0% found this document useful (0 votes)
2 views5 pages

IT485 Assignment2

The document outlines the instructions for an assignment in Professional Ethics in IT, requiring students to submit both Word and PDF files without any manipulation to bypass plagiarism checks. It includes specific questions related to security challenges of BYOD policies, real-world phishing attacks, ethical concerns of data mining, and the balance between government security measures and privacy. Students must adhere to formatting guidelines and ensure their work is original to avoid receiving a zero mark.

Uploaded by

abaalgamdi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views5 pages

IT485 Assignment2

The document outlines the instructions for an assignment in Professional Ethics in IT, requiring students to submit both Word and PDF files without any manipulation to bypass plagiarism checks. It includes specific questions related to security challenges of BYOD policies, real-world phishing attacks, ethical concerns of data mining, and the balance between government security measures and privacy. Students must adhere to formatting guidelines and ensure their work is original to avoid receiving a zero mark.

Uploaded by

abaalgamdi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

College of Computing and Informatics

Professional Ethics in IT
IT485

Assignmen
t2
Instructions:
Student Details:

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Name: Blackboard
### ID: ###
via the allocated folder. These files must not be in compressed format.
 It is your responsibility to check and make sure that you have uploaded both the correct files.
CRN:
 ###
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
 Email submission will not be accepted.
 You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
 You must use this template, failing which will result in zero mark.
 You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
 Late submission will result in ZERO mark.
 The work should be your own, copying from students or other resources will result in ZERO mark.
 Use Times New Roman font for all your answers.

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 1 Question FourQuestion Four

Learning 2 Marks
Outcome(s): Question One
CLO5: Apply
Ethics in What are the most common security challenges organizations face when
Computing implementing a Bring Your Own Device (BYOD) policy, and what strategies can
Profession. be used to effectively address these challenges?

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 2 Question FourQuestion Four

2 Marks
Learning
Outcome(s): Question Two
CLO6: Illustrate Provide two real-world examples of phishing attacks and describe the impact
social and ethical or damage each attack caused.
issues in
computing as a
computer
professional.

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 3 Question FourQuestion Four

2 Marks
Learning
Outcome(s): Question Three
CLO3: Recognize
Retailers use data mining to predict customer behavior and target specific
the importance of
Ethics and groups—for example, identifying pregnant customers based on shopping
Computing patterns, sometimes before the customer announces it.
Discuss the ethical, professional, and privacy concerns of using data mining to
target sensitive situations like pregnancy.

Should companies be allowed to do this? If not, how should it be regulated?


Support your answer with logical reasoning or examples.

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 4 Question FourQuestion Four

2 Marks
Learning
Outcome(s): Question Four
CLO2: Recognize Governments must balance two important goals: keeping people safe and
the respecting their privacy.
responsibilities
and duties of a Give one example of how a government tries to balance security and privacy
computer
professional (e.g., CCTV, drones, license plate scanners).
Do you think this example protects people without violating their privacy? Does
this help stop crime or improve safety? Explain your view briefly.

Res
tric
ted
-
‫مقي‬
‫د‬

You might also like