Assessment Details and Submission Guidelines
Unit Code: MN501
Unit Title: Network Management in Organisations
Term, Year: Trimester 3, 2018
Assessment Type: Assignment‐1
Assessment Title: Ethical issues arising from use of ICT technologies
Purpose of the assessment (with ULOMapping): The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:
Identify potential ethical and social issues related to IT administration ethics.
Discuss ethical and social issues pertaining to IT systems‐administration.
Interpret professional codes of ethics developed by various industry bodies.
Discuss ethical behaviour in accordance with professional codes.
Explain ethical solutions to ensure that the society benefits.
Students must be able to generate ideas at abstract levels and support their
arguments with strong reasoning. Students must strengthen critical thinking skills
by answering the assignment.
Total Marks: 100
Word limit: 800 ‐ 1000
Due Date: eWeek‐7, Friday 11.55 PM.
All work must be submitted on Moodle by the due date along with a completed
Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11‐pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using APA or IEEE referencing style.
Extension: If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment. Further
information is available at:
Academic Misconduct is a serious offence. Depending on the seriousness of the
case, penalties can vary from a written warning or zero marks to exclusion from
the course or rescinding the degree. Students should make themselves familiar
with the full policy and procedure available at:http://www.mit.edu.au/aboutmit/
Academic‐Misconduct‐Policy‐Procedure.For further information, please refer
to the Academic Integrity Section in your Unit Description.
Smart technologies are on the rise. There is a body of literature discussing the key benefits of Smart
Technologies; however smart technologies also introduce many ethical issues.
0) Social media is becoming addictive for many people. Some people are constantly haunted by the Fear
of Missing out (FoMo)? Explore the extent to which the FoMo syndrome is now prevalent in the society
and its ethical impacts.
1) Cyberbullying has been a significant issue globally over the past few years. Cyber‐technology has
exacerbated this problem due to proliferation of mobile applications in the marketplace. You receive
notification from a third party through one of the Apps that you use inviting you to participate in an
event. You are not sure how they received your details. Discuss what security issues arise due to sharing
of too much personal information on social media Apps.
2) Smart phones are being used by nurses for clinical communications and workflow in hospitals. Using
smart phones to record patient data introduces ethical issues involving patient privacy. Identify what
privacy risks arise in such a context and explain the risks in detail.
3) Technologies such as google glass and smart watches are coming into workplace. Given the intrusive
natures of these technologies it is easy for employees to take video or photographs of other people at
work and share it with others. What ethical issues arise from use of wearable technologies in
4) There are many apps available for download for consumers (for example, health monitoring, booking
taxi, banking apps). While these Apps are user friendly and improve user experience, there is also a
security concern that hackers can use some loopholes in such apps to modify or delete customer
information. Discuss an App that you have used recently and if there have been privacy breaches? Is it
ethical for companies to introduce Apps with only basic level of security?