Question: QUESTION 2 - This question contains two sub questions a, b. a. Information ethics govern the ethical and moral issues arising from the development and

QUESTION 2 - This question contains two sub questions a, b. a. Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies). Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes between competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or "correct decision. For this reason, acting ethically and legally are not always the same. Describe briefly 5 e-policies organizations should implement to protect themselves. (ex. Use a mix of academic sources such as books, journal articles and non-academic sources such as the website of the company, other sites, news, media sources etc.) (Discuss e-policies that organizations can use to protect themselves; apply to any examples) (5 marks) b. Discuss the authentication and authorization technologies to prevent hackers from gaining access to organizational systems. (ex. Use a mix of academic sources such as books, journal articles and non-academic sources such as the website of the company, other sites, news, media sources etc. (Discussion on authentication and authorization technologies preventing hackers; apply to any examples)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
