Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

For the final assignment of the course project, due in Unit 5, you will write, a

ID: 3882635 • Letter: F

Question

For the final assignment of the course project, due in Unit 5, you will write, as a team, a brief report on the importance of writing and adapting a code of ethics for your organization and develop a PowerPoint presentation that will include the components of the proposed code of ethics for your company. This will be your final assignment of the course, Team Project: IT Code of Ethics. The report will be written as if to be presented to the CEO and CIO of the organization. The PowerPoint presentation will be presented to top management and supervisors as well as the CEO and CIO.

Ownership of Information

Computerized Invasion of Privacy

Anonymity and Identity

Business Practices

Explanation / Answer

It is not possible to upload powerpoint presentation files in this website. So, I'm going to give you pointers on the points mentioned by you in the question.

1. Ownership of Information: This refers to having complete right and control over the data elements. It involves ownership information and the distribution policy for the data.

2. Computerized Invasion of Privacy: This refers to the dangers to the privacy of individual due to intentional examination of that user's information by a malicious third party. This is often carried out by exploiting misconfigured access controls.

3. Anonymity and Identity: Often the anonymity of the individual is of utmost importance. However due to the nature of the internet, some identifiable information is always left behind. Hence, it is the duty of the administration of the platform to ensure that personal identifiable inforamtion is not exposed to third parties without permission.

4. Business practices: This refers to the rules and regulations established in the organization for information technology. It specifies the ownership of the data, privacy of the employees and users as well as aims to protect the anonymity of the individuals.