Questions: Provide your responses in the boxes below each question. | |||
Q1. | You are required to contribute to the code of ethics. Please refer to the Supporting documents section of this document. You are required to contribute by filling in the missing statement points under each heading. Please write you answer in red. This policy must include the following topics with at least three (3) points per category: Privacy and confidentiality (with clients and also students)Copyright procedures for all assessmentsEthical behaviour as a designer in classWHS procedure and issuesCommunication strategy and class behaviour | ||
Please answer this question as per the supporting document – Classroom Code of Ethics 2021. | |||
Q2. | How would you distribute and educate your peers about this policy or any future policy changes? List two (2) methods. | ||
Answer: | |||
Q3. | How would you collect feedback and review your new policy? List three (3) methods. | ||
Answer: | |||
Q4. | What are the three (3) ways you can protect your IP in web/game design? (Intellectual Property). | ||
Answer: | |||
Q5. | Outline the system security in your current work area. List at least three (3) observations. | ||
Answer: | |||
Q6. | Based on Q5, is your work area system security secure? | ||
Answer: | |||
Q7. | Explain what a “system security procedure” is referring to in one paragraph or less. | ||
Answer: | |||
Q8. | List two (2) ways a business communicates in the ICT industry? | ||
Answer: | |||
Q9. | List three (3) customer service requirements in the ICT industry? | ||
Answer: | |||
Q10. | Write a letter to ACS (Australian Computer Society) asking for permission to use their logo. https://www.acs.org.au. This should be no longer than one paragraphs. | ||
Answer: | |||
Q11. | Research the Australian Privacy Principles from oaic.gov.au? List all ten (10) with a brief description as bullet points. | ||
Answer: | |||
Q12. | Source the ACS Privacy Policy. Provide url. | ||
Answer: | |||
Q13. | Does the ACS Privacy Policy support the principles of privacy legislation? This should be no longer than one paragraph. | ||
Answer: | |||
Q14. | Source the ACS Code of Ethics. Provide url. | ||
Answer: | |||
Q15. | Does the ACS Code of Ethics support the main fundamentals of workplace ethics? | ||
Answer: | |||
Scenarios …The scenarios below will apply your knowledge of workplace ethics in the workplace. | |||
Q16. | Scenario 1: Jean’s problem solving. Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and then publish their algorithms in professional journals. This is detailed in the company code of conduct. After months of tedious programming, Jean has found herself stuck on several parts of the program. Her manager, not recognising the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a co-worker had given her source code listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her co-worker and the commercial software but does not tell anyone or mention it in the documentation. She completed the project and turns it in a day ahead of time. Jean says that she is unaware of the company code of conduct. How do you see this situation? Choose the correct answer(s) below. Jean should take the day off and reward herself with a massage.Jean should have waited until the deadline and not a day earlier, before turning her work in early. Now her manager may give her extra work.Jean could have approached her manager about the complexity of the issue and discussed her concerns.Jean needs to ask permission before using the code from her co-workers. Jean needs to mention her co-workers, and the use of their code, giving them credit for their work in her documentation. Acknowledgement: Burmeiser, OK (2000), ‘Applying the ACS code of ethics’, Journal of Research and Practice in Information Technology. Vol. 32, no.2, pp. 107-120. | ||
Answer: | |||
Q17. | How would you ensure that current and future employees understand their obligations and the rights of others in Q16? | ||
Answer: | |||
Q18. | Scenario 2: The Employment Agency request An employment agency is determining requirements for an information system to be used. The agency’s organizational policy discusses equal opportunity employment in alignment with state and federal government laws. The agency has consulted with you as a programmer to develop the IT software to develop the software design. At a production meeting the client explains that when displaying applications whose qualifications appear to match those required for a particular job, the names of white applicants are to be displayed ahead of those of non-white applicants. An additional requirement is for the names of male applicants are to be displayed ahead of female applicants. What would you do? Choose the correct answer(s) below: Say nothing, go home and go to your pump class – that cute instructor is running the class tonight ;)Change it to female applicants to be displayed ahead of male applicants.You take steps in rectifying the matter by contacting your manager about the issue and discussing your concerns with the client. Demand a pay rise. Acknowledgement: Burmeiser, OK (2000), ‘Applying the ACS code of ethics’, Journal of Research and Practise in Information Technology. Vol. 32, no.2, pp. 107-120. | ||
Answer: | |||
Q19. | What is the main issue in Q18? | ||
Answer: | |||
Q20. | Where would find standards or legislation to support your choices for Q19? | ||
Answer: | |||
Q21. | Scenario 3: Joseph’s logo design. Joseph is a Melbourne based designer and has been asked to design an original logo for a local small business. He commences research and creates a few original concept designs. After he shows his client his initial designs the client is unhappy with those concepts. Joseph goes away and works on a new design but the client emails through an image of a logo design that they like. The logo is of a competitor and the client wants their logo to look the same, but with only a small change to the lettering only. What should Joseph do? Choose the correct answer(s) below. Joseph should just follow the instructions of the client and complete the job he can buy those new pair of shoes on sale with the money he makes.Joseph should discuss his ethical concerns with his client. Joseph should just design a logo he likes regardless of what the client requests or needs and disregard the email entirely. Who cares?Joseph should design an original design and use the emailed logo as a reference.Run away and curl up in a ball somewhere | ||
Answer: | |||
Q22. | What would you say to your client to support your answer(s) at Q21? Write no more than two paragraphs. | ||
Answer: | |||
Q23. | Where would find standards or legislation to support your answer for Q22? | ||
Answer: | |||
Q24. | Scenario 4: Deedee and her data. Deedee has been asked to collect data from a competition to determine the demographics of the online magazine readers. The competition terms and conditions state that information will only be used for demographic research purposes only once the competition has ended. Deedee receives the final spread sheet with the competition entrants detailing each persons’ name, age, email, and location. The information is secure on Deedee’s computer and only she has access to that data. Jules has asked for access to the spreadsheet so she can email each person weekly email newsletter selling online products. There is no provision in the terms and conditions Deedee used to collect the data for other purposes other than research. It is extremely specific. You find that the company privacy policy is very vague and general. It is not in accordance with National Privacy Principles. Jules asks for Deedee’s log in. What should Deedee do? Choose the correct answer below. Deedee should go ahead and give Jules the access to the spread sheet. The more products Jules and Deedee can sell online means the possibility of a monthly bonus. Deedee is saving to go on vacation to Ibiza. She needs a holiday!Deedee should inform Jules this is not a good decision and advises against using the data to email each customer directly.Everyone in the office should have access to Deedee’s data. | ||
Answer: | |||
Q25. | In less than one paragraph, discuss your reasons for your answer for Q24. You may use bullet points instead. | ||
Answer: | |||
Q26. | Where would you find standards or legislation to support your choices for Q24? What is the main issue here? | ||
Answer: | |||
Q27. | Does the privacy policy in Q24 need to be reviewed? Why? | ||
Answer: | |||
Q28. | Scenario 5: Deedee and her policy After the debacle above in scenario 4, Management are impressed with Deedee’s work ethic. She has now been asked to update the company privacy policy to be alignment with the National Privacy Principles. This new policy change should then be applied to upholding competition term and conditions in future or changing them to be in accordance with the APP when appropriate. Deedee has written a draft and the policy is now more specific, detailing the rights of all stakeholders and mentions the principles in detail. The company code of conduct has also been reviewed and now includes the duties of staff to maintain the privacy rights of all customers along with general ethical conduct in the workplace such as professional development and good moral conduct. Deedee interviews the staff members in her work area about the new policy update. She asks them to source the company privacy policy and code of conduct, discuss its relevance to their job and records their feedback. After the interview she discovers the following: Two staff members do not actually know where to find the code of conduct or privacy policy. Five do not understand the guidelines behind the National Privacy Principles Only 2 understand the potential consequences of breaching the APP and do not see the big deal.Three mention the wording is too complicated and too wordy.5 say the type is too small and they struggle to read the documents.Five staff still do not understand what this has to do with their competition terms and conditions that they email out to customers or put on raffle tickets on a regular basis.Management have asked for all staff to undergo training in some manner and for Deedee to organize this.You realize that customer data files have are not backed up. What should Deedee do? Choose the correct answer(s) below. Deedee should consider this a job well done.Deedee should panic, take an aspirin go to bed. Let someone else deal with this rubbish.Deedee should update the policy again incorporating her recorded feedback, distribute it again and revise the policy again in future?Deedee should make the wording even more difficult to read because she doesn’t really understand it either.Deedee need not worry about educating the staff about the APP. Most staff leave the company within a few months, so why waste so much time and money? | ||
Answer: | |||
Q29. | If the policy were to be updated again what feedback should be considered based on the interviews in Q28? | ||
Answer: | |||
Q30. | List two (2) ways you could advise staff about the location of the policy and the fact it has been updated again? | ||
Answer: | |||
Q31. | How would staff be trained / educated about the APP and its relevance to their competitions? | ||
Answer: | |||
Q32. | How would you review the final policy once you updated it? | ||
Answer: | |||
Q33. | List one (1) way you check that staff are understanding and applying the new codes? | ||
Answer: | |||
Q34. | List one (1) way Deedee could improve the security of customer data based on the information given at Q28?? | ||
Answer: |
RES800 Assessment 1 – Research Question and Literature Review
Subject Title Business Research Subject Code RES800 Assessment Title Assessment 1 – Research Question and Literature Review Learning Outcome/s Utilise critical thinking to analyse managerial problems and formulate relevant research questions and a research design Apply research theories and methodologies to assist in developing a business research