Saturday, December 28, 2019

Santas Revenge - Free Essay Example

Sample details Pages: 3 Words: 978 Downloads: 4 Date added: 2019/04/02 Category Society Essay Level High school Tags: Revenge Essay Did you like this example? I graduated from a really small, rural high school in Idaho. 14 people in my graduating class. It was the sort of school where they didnt offer foreign language, math beyond Algebra 2, or science classes with labs. But, they did have sports. The history teacher was primarily there to coach junior high football and high school basketball. Every single day for history class, he would tell us bring something to do. We never cracked the textbook at all. We should have been learning US History Revolutionary War, Lincoln, World War II, Civil Rights Movement, Cold War we didnt cover a single thing all year. Best of all, when it came time for an end-of-semester exam that would be reviewed by the superintendent, he would pass out a test and then write the answers on the board. If youre an A student, go ahead and get everything right. If youre a B, miss a couple. If youre a C student, get about 5 wrong. (This is the part that makes professional teachers rise up out of their chairs and offer to contact the state board of education to have his credentials revoked.) All that time, all that pay, when he was supposed to be doing his job, he took a break hour at the cost of our educations. Professionally, this is like a major fail on t he job like a doctor treating patients with sugar pills, a contractor pouring concrete but refusing to use rebar, or a cop spending the day watching Netflix in the patrol car. For 180 days he showed up and refused to do his job, then created fake evidence to make it look like he was acting like a licensed professional. He taught history classes to all students in grades 7-12, and he was pulling similar stunts in every single class. All other teachers in the school would get periodic audits teachers from other school districts in the state would come review lessons plans and observe classroom behavior. For some reason, the coach was excused from these reviews. Complaints to the administration fell on deaf ears. Don’t waste time! Our writers will create an original "Santas Revenge" essay for you Create order About 2.5 months later, I was hired as a mall Santa about 20 miles away. It is a harder job than you might imagine frisky teenage girls, idiot boys, crying children, and pure greed. Most kids would come sit on my lap and tell me about the 15-39 items they wanted for Christmas. Id pull out my deepest voice and stroke my beard, then look them in the eye and say Well, I dont know. Ive been keeping my eye on you, and I have some concerns. Your room needs some attention, you could keep the complaining down when its time to eat your vegetables, and (if siblings were present) you have been fighting with your brothers and/or sisters entirely too much. Kids look shocked , like theyve been caught doing something naughty. Ill tell you what you work on those things, and help Mom when she needs it, and well see what we can do. Parents would stand there nodding, saying You tellem, Santa! Give the kid a mini candy cane and send them on their way. No promises made, maintain the magic, and try to g et some good behavior out of the kids. Well, one Saturday afternoon, this old history teacher comes and gets in line with his 6-year old boy. They eventually get to the front of the line and the kid takes a seat on my lap. I want Teenage Mutant Ninja Turtles, and a Nintendo, and a fire truck, and a bike, and, and, and, .. I looked at him and stroked the fake beard, then asked You really have been a good boy this year, havent you? Mmm-hmm. Tell me something do you have a pony? No! Well, I think Santa needs to bring you a pony. You can ride him to school and feed him apples and carrots. All your friends will want pony rides at recess. Tell me, what are you going to name him? Do you have a BB gun? Santa thinks you need a BB gun. How about a trampoline? The teacher/coach got wide-eyed and butted in Now, hold on a minute, Santa. You stay out of this, Tom. This is between me and your little boy here. Tom didnt recognize me with the beard, fake eyebrows, and padded jacket. I went back to the discussion with the little boy on my lap. Remote controlled car? Computer for your bedroom? Bow and arrows? Maybe a cart for your pony to pull? I promised the kid everything I could think of. Finished it up with You will see all of that under your Christmas tree on Christmas, okay? Just make sure your dad doesnt get up early and hide it all from you because he might get jealous of all your cool stuff. And figure out where you are going to build the stable, and where youre going to park your dirt bike. The little boy had the biggest grin on his face. I handed him five candy canes, told him to keep up the best behavior of all the kids in the world, and sent him on his way. The dad/coach/teacher kept looking at me, trying to figure out where he knew me from or what he could have ever done to incur my wrath. I waved with a friendly See you later, Tom! and took the next kids in line. I sometimes thought about stopping in at his summer job stocking shelves at K-Mart to explain why Id done what I did that it was payback for him screwing over the education of every student in the district, grades 7-12. But Id prefer to think of him just stumped for the rest of his life, wondering what hed done to earn Santas Revenge.

Friday, December 20, 2019

Presentation Requirements For A Computer System - 2148 Words

TASK 1.04 Write a System Vision statement VISION To provide premium quality aged care services, through effective management by a dedicated professional team. MISSION The main mission of this project is to research and document requirements for a computer system for Ningbo Virtual Elder Care Service to help establish the new service which will aid in delivering the daily work schedule on-line to the mobile work-force along with relevant data about the clients and automatically generate the time-sheets in Ningbo. Ningbo Virtual Elder Care Service’s mission is to promote and enhance the quality of life of residents entrusted into their care by making their residents the focus of everything they do. This will be achieved in an†¦show more content†¦TASK 1.05 Write the Objectives for the project The main objectives of this project is to research and document requirements for a computer system for Ningbo Virtual Elder Care Service to help establish the new service which will aid in delivering the daily work schedule on-line to the mobile work-force along with relevant data about the clients and automatically generate the time-sheets in Ningbo Main objectives of this project for computer system are as follows: †¢ Confidentiality: - It requires that data or information about clients’ family contact details, medical history or clinical history or any manual record of them should be kept confidential to adhere the privacy act. †¢ Integrity:-it instructs that data or private information of clients and services in computer system as well as the data transmitted between computer system , be free from unauthorized modification or deletion †¢ Availability: Keeping the information which home-visiting care staff need when visiting a client in terms of clinical history, family member contact details, or means of referring the client to other services including doctors when needed. †¢ Meeting the System Capabilities: - Deliver the daily work schedule on-line to the mobile work-force along with relevant data about

Wednesday, December 11, 2019

Music An Escape free essay sample

â€Å"Shoot for the moon, even if you miss, you’ll land among the stars -Les Brown I make my way to the band room. Slower than usual, I guess; because I got caught in the bell. The traffic that we see in the halls at my high school is ordinary, combining the classes from freshman to seniors easily makes the total number of kids over eight hundred. Enough to frazzle anyone. But for me, other circumstances weigh in. But Ill get to that later. For now, I see myself walking into the band room, out of breath, sitting carefully on the bottom step of one out of three riser sets, opening my case, and slowly putting my clarinet together. One piece at a time. I see myself warming up, and then slowly starting to play the pieces I will perform at church in the summer months. That was me. A week or so ago. We will write a custom essay sample on Music: An Escape or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Not much has changed. Im still rehearsing. But Im also battling things that seem like the nightmares weve all had at some point in our lives, the ones we always wake up from. Only this time, it isnt a dream, and Im not waking up. I am awake. I have my moments of calmness and moments without pain and tightness. But I tend to have more moments with pain and all those other things more than I have ones without. Cerebral Palsy does that to you. Maybe its just being a teenage girl, but I often view myself as different because of this. I think maybe thats why I chose the path of a musician. For me, it’s an escape. When I’m playing that horn, I escape the pain and all the things that go with it. This is, more or less, the calmer part of my musical career. Being one of two altos’ in the church choir is the more stressful part. I’ve been in the choir for three years, and loved almost every minute of it. Practicing both my instruments can be pretty stressful at times when things aren’t going well. As if my life wasnt stressed enough, throughout my high school years, Ive been on a group that we call the Superintendent’s Advisory Council. Weve done too many things to describe, but the one project that stuck out the most for me is when we brought back the Smoking Cessation class, in an effort to decrease smoking in the school district. This project hit home for me because my dad was a smoker for several years before I was born. In fact, I think that’s why my dad quit. I met Nike Beaudry almost a year ago. Since I joined her crew of ‘clarinetists’ in training’ my life has changed. I’m one of her older students through Pakachoag Music School; I’m there on Thursday nights, building on the natural ability that I know I’ve had somewhere inside me for the three year span of off-and-on temporary quits do to various events. For the past six years, the teen portion of the youth group at church has participated in several pageants and plays at Christmas and Easter. I have done everything from narration to main characters to non-speaking but important parts. Other projects we have accomplished include baking cookies for the shut-ins on Valentines Day, making blankets for pets in the local shelter, making sympathy cards for those in need, I have also played a few gigs for church on my horn, beneficial to those who listen and those involved. As I type now, saying what has needed to be said and expressed, I remember the words of my US History teacher, Mr. Stowe, who said while the class was studying the new nation after the Constitution was drafted and was being run for a ‘test drive.’ â€Å"George Washington†¦ makes the Constitution reality.† He also said, â€Å"Little Turtle keeps fighting†¦Ã¢â‚¬  Combine those statements and you have what most of my life is focused on. If Washington made the Constitution reality, I can make my dream to be a professional musician a reality with a lot of hard work. And if Little Turtle kept fighting the settler’s in Ohio, I can keep fighting a muscular disability that is a disruption to my life. This thought brings me back to the quote I used at the beginning of this paper. My dream of becoming a professional musician may be a very hard reality to achieve, but I’m shooting for the moon, and even if I miss, I may very well land among the stars.

Wednesday, December 4, 2019

Case Study Software Operations are Harming Common Peoples

Question: Case Study: Software operations are harming common peoples. Answer: 1. What is going on? In this case study, the fixed rules or software operations are harming common people. Moreover, due to incompetency of the company employees as well as out-of-date softwares, the records of the clients are getting mismatched or misplaced. In other cases, the system generates false information regarding the clients annual income or property values. Another main thing in this context is that the company does not take suitable steps to mitigate the issues arising and update their system according to requirements. The result is that the common users and clients get cheated or even robbed of their deserved resources. 2. What are the facts? In this case, the facts are as follows: Incompetent Company The records of the clients are getting mismatched or misplaced. In other cases, the system generates false information regarding the clients annual income or property values. The company is getting away with all mismatched records and other issues, justifying them as fixed system issues for which, records cannot be changed. Insufficient Use of Technology Due to out-of-date softwares, the records of the clients are getting mismatched or misplaced. In other cases, the system generates false information regarding the clients annual income or property values. Incompetent Employees of the Company - The employees of the company are not being able to deal with the advanced recording system. As a result, there are a lot of manual errors occurring that is resulting in the errors in client records. Cheated Clients The clients are getting cheated and are unable to do anything about the situation. Moreover, they cannot even sue the company, as the records show otherwise and there no proofs of companys faults. 3. What are the issues? There are several issues in this story. The issues are as follows: The companys systems are outdated and are unable to keep up with the amount of records stored within the hardwares. The employees of the company are not being able to deal with the advanced recording system. As a result, there are a lot of manual errors occurring that is resulting in the errors in client records. The company has not taken any initiative to upgrade its systems or train its employees. The company has not taken any steps to rectify the records and return values to the users. 4. Who is affected? In this case, only the clients are affected. The company is getting away with all mismatched records and other issues, justifying them as fixed system issues for which, records cannot be changed. Due to inefficiency of the systems and incompetency of the employees, errors are inserted and recorded in the system for which, the properties or monetary values of a client are getting misplaced. For this reason, the clients are getting cheated and are unable to do anything about the situation. Moreover, they cannot even sue the company as the records show otherwise and there no proofs of companys faults. 5. What are the ethical issues and implications? There are several ethical issues related to this case. These are follows: The company is not following moral values regarding the handling of their clients. For the errors generated from the systems, the company just blames the system and gets away with it. There are no direct proofs of company mismanagement and hence, the clients cannot do anything regarding the matter. The employees of the company are incompetent. However, there are no direct reasons to blame them as the company has given all the blame on the computer systems. 6. What can be done about it? Several steps can be taken regarding this case. Firstly, although there are no direct proofs of companys mishandling, they can still be sued for mismanagement of the clients resources. The company is advised to upgrade the computer systems so that these type of cases do not happen in the future. Moreover, the employees should be trained more to make them competent with the latest technology so that handle clients information more efficiently and manage to identify errors anytime. 7. What options are there? There are two options in this case. The first option is that, the affected clients can use legal help to retrieve their resources and rectify their records in the companys system. This will also discourage the company to get away with these errors in the future. The second option is that the company should immediately change its computer systems and rectify all existing errors regarding the clients information. This will ensure the errors will not happen in the future. 8. Which option is best and why? The best option is the complete overhaul of the companys computer systems. This will be long term solution that will not only ensure these cases will not happen in future but will also help the company to increase its reliability within the customers. 1. What is going on? In this case, there are two different scenarios. In the first scenario, the manager of the company does not know anything about the programming operations and hence, he orders his employee to complete the task within a limited time. In the second scenario, the employee, unable to complete the task in time, steals the work of some other employee, incorporates it into her own work, and submitted it in time. Now, the issue in this case is that, the employee, whose work is stolen, does not even know about it and as Jean submitted her work already, the employee who actually did the work will get caught due to theft of work when he submits his program. 2. What are the facts? The facts in this case are as follows: The manager of the company does not know anything about the programming operations. He does not understand the complexity of the programs and moreover, he does not care how the work will be done. The employee, unable to complete the task in time, steals the work of some other employee, incorporates it into her own work, and submitted it in time. Here, in order to complete her job, she steals someone elses work without acknowledgement or even documentation. The main fact here is that, the company will benefit from the works but if the theft is caught, the responsible person will be the employee that will result in severe punishment. On the other hand, if the employee could not submit the work in time, then also he / she would get punished. 3. What are the issues? There are several issues in this case. The first and the most major issue is lack of professionalism within the employer as well as employee. The employer has no knowledge regarding the complexity of works or the programs and orders one employee to complete it in time. On the other hand, in order to complete the task in time, the employee steals someone elses work and incorporates within her work without acknowledgement. Another issue is that, the employee will be affected and face punishment in any case if the task is not completed or the theft is caught. 4. Who is affected? The only one to be affected in this case will be one of the two employees. The first employee, Jean, would have been punished if she could not submit the work in time. Again, if the act of stealing is caught, she would be punished severely. On the other hand, if Jean is not identified to be the stealer, the other employee, whose work was stolen will be caught and punished. However, the company is not affected by any of these and will only reap benefits from the work, whether it is stolen or original. 5. What are the ethical issues and implications? The main ethical issue that arises from this case is that only the employees are negatively affected one way or another. The employee is not given sufficient time to complete a particular task and if he steals someones work to complete the task in time, again he is prosecuted for stealing. However, the problem stills persists. As long as changes are brought in the companys operations, these ethical issues will continue to happen and more and more employees will be made scapegoats. 6. What can be done about it? The only thing that can be done in this case is complete overhaul of the companys operational structure. This should include better handling of the operations and management of duties. For this, the task should be allocated among employees by better allocation of time. This will help the employees to work on their own without stealing others works. Moreover, if such cases happen again, the manager should also face penalty. This way, the manager would not exert so much pressure on the employee in the near future. 7. What options are there? There is only one option for the mitigation of the issues a complete overhaul in the companys management system with better handling of managers and employees. There should be proper guidelines on the employee management as well as work ethics of the employees. Without these steps, the same issues will continue to go on. Again, a number of experts are to be employed who will be able to estimate some timeline needed for a particular programming task so that the employees are provided with sufficient time for doing a task. 8. Which option is best and why? The option is selected for two main reasons to introduce better management of tasks and employees and maintain work ethics of the employees. This is also ensure fair handling of operations and employees and none of the employees will be punished without right reasons and proofs. 1. What is going on? In this story, the dilemma of the new expert related to the changes in the technical system is highlighted. Here, the new expert has found that there too many bugs and technical glitches that cannot be solved completely and ultimately, the whole system will crash causing loss of huge amount of data. However, the company has rejected the demands of overhauling the complete system to bring in new technology and ordered the expert to work on the existing system. 2. What are the facts? The facts are as follows: The previous expert could do not complete the work and due to inexperience, he has created a lot of permanent bugs and technical glitches. After that expert left, the new expert analyzed the system and found that the bugs cannot be deleted permanently and ultimately, these will cause the whole system to shut down completely with loss of all the data within the system. After analyzing the report, the company has decided to reject the experts advice to change the technology and the system completely. The company wants to stick to the current system and orders the expert to continue working on the system and remove the errors anyhow. 3. What are the issues? The issues are as follows: The new expert has detected the bugs and glitches in the system and understood how harmful these are to the system. He has also found that these bugs cannot be deleted and in near future, these bugs will completely destroy the whole system. The immense experience of the expert drives him to the conclusion that the framework is unstable to the point that it will in the end degenerate beyond recovery and that every one of its information will get to be unrecoverable. He along these lines advises the chief with respect to his discoveries and suggests that the framework be redeveloped utilizing fitting advancements and quality control measures. He demonstrates that the whole redevelopment exertion will take around 6 weeks. The administrator rejects the experts suggestion, expressing that their IT Department will not consent to an adjustment in innovation, and guides him to finish the undertaking utilizing the current technologies. 4. Who is affected? In this case, the expert will be affected for short term and the company itself in the long term. 5. What are the ethical issues and implications? 6. What can be done about it? The only thing that can be done here is changing the companys policy in the handling of the technological aspects. The company officials must understand the long term effects of the issues mentioned by the expert. In addition, they should understand that although changing existing frameworks will involve large expenses; this will settle the issues that will damage the company in the long run. Moreover, the company should change its policy of sticking to its fixed guidelines and should consider experts feedbacks more carefully. 7. What options are there? There are two options available here. The expert should continue to work on the existing system with his own techniques. However, he should note down every aspects, bugs and other errors in the system everyday and should also notify the company that he will not be responsible for the system corruption and loss of documents in the future, as the system bugs have been created by the previous expert. The company must change its policy in the handling of the technological aspects. The company officials must understand the long term effects of the issues mentioned by the expert. In addition, they ought to comprehend that albeit changing existing systems will include huge costs; this will settle the issues that will harm the organization over the long haul. In addition, the organization ought to change its approach of adhering to its settled rules and ought to consider specialists' reports more carefully. 8. Which option is best and why? The second option is best for this case. For the first option, the expert may avoid penalty, but the company will lose huge amounts of data as well as the system and ultimately, the system will need an overhaul and that will involve more expenses. For the second option, the company has to bear the expenses of the new technologies and systems, but this will ultimately benefit the company in the long run. The issues of bugs and technical glitches will not occur and the expert will be able to work on the system effectively and efficiently. The management system of the company needs overhaul as need for analytic power to understand the long term harmful effects of buggy systems. Analysis of the Case Studies with the help of Classical Ethics Theories The classical ethical theories are as follows (Australian Computer Society, 2012). Consequentialist Theory - This theory analyses the consequences of an issue and classify them as good or bad. Some of the effects are intrinsically good or intrinsically bad. This theory is used to analyze these intrinsically bad effects of the story consequences to understand the amount of ethical issue associated with the story. (Saha, 2015) Deontological Theory - This theory deals with the consequences of some ethical issues that cannot be explained by general use of words. This theory is used to analyze the consequences on a larger scale. To be precise, this theory is used to understand the extent of violation of basic rights and privacy of an individual. (Slade Prinsloo, 2013) Virtue Theory - This theory deals with the moral values associated with the particular story. The theory describes about the preservation or destruction of honesty in a selected story. (Sosa, 2015) The first case is described properly by the deontological theory (Goodman Meslin, 2014). This theory deals with the ethical issues that violate basic rights of an individual. In the first case, the clients basic rights are violated by the company. Although the company is not involved in direct violation, the errors in the existing systems and incompetency of the employees are the driving forces behind the issue. The second case is dealt by virtue theory (Nathan, 2015). This theory is based on ethical issues that are associated with destruction of honesty of an individual. In this case, the employee, unable to complete the task in time, steals other employees work and uses it in her own task. Hence, the basic virtue (or moral value) of the employee is not maintained, regardless of consequences. The third case is described by consequentialist theory (Stahl, Flick Hall, 2013). This theory deals with the intrinsically bad effects of the story consequences to understand the amount of ethical issue associated with the story. In this story, the bad effects of the issues are inevitable unless the systems are not replaced by the company. However, the company does not understand the intrinsically bad effects and does not take necessary steps. 1. Whistle Blowing Policy Introduction Whistle blowing is the act, for an employee (or former employee), of disclosing what he believes to be unethical or illegal behavior to higher management (internal whistle-blowing) or to an external authority or the public (external whistle-blowing) (Ahmad, Maynard Park, 2014). The actual nature is debated; as noted by several authors, some see [whistle blowers] as individuals who violate organizational loyalty norms; others see them as truthful follower of values. They consider company loyalty to be more important than colleague relation or friendship (e.g., the public health, truth-in-advertising, environmental respect). Some authors said that whistle blowers are those who raise ethical issues are treated as disturbed or morally suspect (Albugarni Ahmed, 2015). Some authors asked whether whistle blowers really crackpots. In this essay, the immoral effects of whistle blowing have been discussed. Effects of Whistle Blowing Whistle blowers are the individuals who sound the caution on misuse of devices, crimes, misbehavior or acting against company policy. There are unmistakably illegal activities, for instance, pay off , burglary, and extortion. They also include offenses like isolation in work, negligence in manner and work, resource wastage, trickery, and security violation (Anderson, 2015). In a couple of implications of whistle blowing the whistle is simply held to have been blown if the carelessness is made known in an open assembling or put on open record. That understanding of whistle blowing is in no short of what one sense conflicting with its inspiration, which is to put right a found off course (Baskerville, Spagnoletti and Kim, 2014). In case a wrong can be remedied inside a relationship by strategy for inside disturbing work power to its occasion, then there may be no prerequisite for the whistle blower to air a protesting in an open social affair. The writing on whistle blowing is partitio ned on this point (Cezar, Cavusoglu Raghunathan, 2013). A late article in the Journal of Business Ethics looked to build up a prohibitive meaning of whistle blowing that would limit its intending to the individuals who go to an outside element or to an open discussion with data of negligence. Then again, the term is often utilized as a part of the writing to incorporate any divulgence of negligence whether interior or outer (Chen Zhao, 2012). While outer whistle blowing is generally done to the outer world from the inner part of the organization, it constantly comes about because of a mix of the disappointment of the informant with a disappointment of interior divulgence to address the issue, or a recognition that inward exposure will be pointless, combined with the as a matter of fact subjective judgment of a person with regards to the outcomes of not blowing the whistle (Crossler et al., 2013). In all cases concentrated on, and in the most part of cases considered, informants blew inside information through internal channels before going outside their association. In every situation where they did as such, they trusted that their association would bolster their endeavor to wipe out or counteract negligence (Albugarni Ahmed, 2015). American research recommends that workers go to outer powers 'just once they come to trust that interior channels are shut to them, that the association is not moral, and that senior administration is dormant or complicit in the wrongdoing' (Stack, Watson Abbott-Chapman, 2013). It is the disappointment of the association, or of a senior individual or persons inside it, to make a move that prompts the choice to reveal outside the association, whether to an administrative power, to the media, or somewhere else. Few whistle blowers appear to have profoundly considered or were even mindful of the presumable individual results of outer divulgence. In side divulgence was at first accepted by most by far of whistle blowers to be the time when the reported negligence would be redressed (Tamjidyamcholo, Baba, Tamjid Gholipour, 2013). Overall, inner revelation has as much claim to be viewed as whistle blowing as does the choice of going outside the association. Authors therefore define whistle blowing as follows: Whistle blowing is the deliberate, voluntary disclosure of individual or organizational malpractice by a person who has or had privileged access to data, events or information about an actual, suspected or anticipated wrongdoing within or by an organization that is within its ability to control (Taylor, Fritsch Liederbach, 2014). The disclosure may be internal or external and may or may not enter the public record. The primary intention of whistleblower protection legislation is to discourage workplace reprisals against whistleblowers. According to the ICAC study, 71 percent of those surveyed expected that people who reported corruption would suffer for reporting it. Those who had been in the public service for more than a year were much more likely to hold this view that those who had been employed for less than a year (73 percent vs. 55 percent) (Vacca, 2012). One third of those surveyed were not confident that their organizatio n would handle reports of corruption appropriately, with markedly less confidence in rural areas. While 84 percent believed that something could be done about corruption, only 26 percent believed that something would be done about it. Work environment retaliations happened against some 66% of the individuals who formally reported negligence. Both official and informal retaliations were analyzed (Vaughn, 2015). These generally happen in the private area. Official responses rebuff the informant for standing up. They are hidden behind approach and methodology, generally to maintain a strategic distance from cases of exploitation, and incorporate formal censure, corrective exchange, referral to a specialist or instructor, and poor execution audits (Von Solms Van Niekerk, 2013). An extensive variety of lesser strategies incorporate block of the examination, withdrawal of key assets, being kept oblivious, being antagonistically reported over different matters, and the connection of unfriendly staff record notes. Conclusion From the essay, it is clear there are deep lying effects of whistle blowing in offices that may affect the careers of both the informant as well as the wrong doer. Hence, whistle blowing should be banned in order to maintain integrity and an ethical environment within the office premises. Another issue is that, some whistle blowers complain about someone ever they he has not done anything wrong. To catch and punish the wrong doers, the higher officials should use computerized monitoring techniques and permanently ban whistle blowing system. 2. Responsibilities of ACS Professional Members Introduction ACS has some fixed guidelines regarding the professionalism policies and responsibilities. Following these guidelines, there are some specific responsibilities of the professionals (ACS Code of Professional Conduct Professional Standards Board Australian Computer Society, 2016). In this essay, the implications of special responsibilities of professional members of ACS from the practitioner point of view have been discussed. Responsibilities of ACS Professional Members ACS's objective of the proposed system is to encourage the configuration of degree projects that deliver graduates with the aptitudes required for characterized ICT parts. The level of self-governance and obligation at which the ability is honed ought to likewise be set up. On a very basic level, these aptitudes require the utilization of hidden learning that is both wide and profound, and must incorporate both specialized and expert information regions. The guidelines for the professionalism in ACS are as follows: Recognize potential ICT parts that could be embraced by alumni of a given system of study. These parts may be bland, such that all alumni from a specific degree system would be qualified to attempt a scope of graduate parts inside a given ICT discipline (Yang, Shieh Tzeng, 2013). Notwithstanding, a project may to place more accentuation on specific parts inside that teach. This may be on account of an organization has perceived skill in a given territory or in light of the fact that there are local business open doors for graduates with a specific core interest. Distinguish the aptitudes required by experts in a given ICT profession part. Recognize the kind of assignments that an expert working in given ICT profession role(s) would typically be equipped for performing (Yusri Goodwin, 2013). These might be the kind of errands that are regularly required to work in industry, or they might be the sort of assignments all the more every now and again connected with an exploration centered vocation way. Recognize the level of self-sufficiency and obligation created. It ought to be conceivable to show that alumni of a system work at sensible levels of self-rule and obligation as characterized by SFIA (Broadbent Papadopoulos, 2013). Distinguish the ICT Roleà ¢Ã¢â€š ¬Ã‚ Specific Knowledge required to rehearse the aptitudes. Where conceivable, globally perceived educational module and collections of learning ought to be utilized to help with distinguishing Roleà ¢Ã¢â€š ¬Ã‚ Specific Knowledge (Burmeister et al., 2014). For ICT zones that do not have a formal educational program or group of learning, supporting information ought to be recognized utilizing other fitting sources as a part of counsel with the system's Industry Advisory Board (Van den Hoven, Van de Poel Vermaas, 2014). It ought to be conceivable to show that understudies gain learning to an appropriate profundity and broadness. Recognize Complementary Knowledge that backings the aptitude set or that expands understudy employability. As softwareà ¢Ã¢â€š ¬Ã‚ based items or administrations are normally offered in conjunction with a business, numerous ICT profession parts will require information of business capacities and procedures (Ahmad, Maynard Park, 2014). Moreover, vocation prospects may be upgraded from locally critical correlative controls. For instance, learning of flying may be valuable in locales where aviation associations are pervasive. Plan a course structure that joins ICT Role Specific Knowledge with the Core Body of Knowledge and other Complementary Knowledge as a feature of an all encompassing project of study (Broadbent Papadopoulos, 2013). For instance, a course structure ought to framework propelled learning on top of programming basics and task administration themes from the ICT Knowledge Area of the CBOK. Gather relics to show that abilities have been produced by understudies to a fitting level. This for the most part requires that a delegate test of understudy work be gathered to show that abilities have been produced to a fitting level (Yang, Shieh Tzeng, 2013). Tests will be made accessible to accreditation boards for review. Ancient rarities delivered by understudies in conjunction with a capstone task are a decent wellspring of material for showing the aptitudes accomplished by understudies. The issue of "professionalism" is vital and wideà ¢Ã¢â€š ¬Ã‚ ranging. Different bodies have given inà ¢Ã¢â€š ¬Ã‚  profundity treatment of the issue and this report ought to be perused against that foundation. For instance, CC2001 has a section on "Expert Practice" (Ch 10, pp. 55à ¢Ã¢â€š ¬Ã‚ 61), which is valuable (Yusri Goodwin, 2013). The IP3 Taskforce is as of now concentrating on the issue with regards to proficient accreditation. The past ACS CBOK determined the necessities for Ethics/Social Implications/Professional Practice and Interpersonal Communications (Yang, Shieh Tzeng, 2013). The SFIA in its Levels of Autonomy and Responsibility Axis notice degrees of self-sufficiency, impact and multifaceted nature, and "Business Skills" including information of measures, critical thinking, correspondence, arranging and booking, quality, wellbeing and security, obtaining new learning, and energy about industry exercises and authoritative connections (Slade Prinsloo, 2013). It i s comprehended that Professional Knowledge themes should be tended to at numerous levels in various phases of expert advancement. The very way of expert work implies that some learning and abilities are best created through experience and that comprehension of complex issues, for example, morals develops with development. In this manner, the objectives for creating proficient information/aptitudes will be diverse at entryà ¢Ã¢â€š ¬Ã‚ level (graduate) than at full proficient level (a confirmation program) (Skues Cunningham, 2013). The themes for the Professional Knowledge Areas were created by mapping shared characteristics over the diverse disciplinary educational programs determinations. Experts ought to have some information of where and when their order started and how it has advanced, notwithstanding comprehension of continuous issues in the control. A comprehension is required of how to create or get programming (data) frameworks that fulfill the prerequisites of clients and clients (Siponen, Mahmood Pahnila, 2014). All periods of the lifecycle of a data framework ought to be comprehended including: prerequisite examination (frameworks investigation) and determination, outline, development, testing and operation and support. There ought to likewise be learning of procedures and procedures for creating frameworks. Wording for this region fluctuates from 'frameworks advancement' in Information Systems to 'programming designing' in Software Engineering and Computer Science, to 'frameworks obtaining and reconciliation' in Information Technology (Siponen Vance, 2014). The component that recognizes this range from "writing computer programs" is that frameworks advancement/programming building learning is connected to bigger programming frameworks, where nobody individual has complete information of the entire framework. Obviously, a significant number of the standards required in creating bigger programming frameworks likewise apply to littler bits of prog ramming (projects). Conclusion From the essay, the responsibilities of ACS professionals are clear. ACS has designed a number of criteria to appoint their professionals. The level of self-governance and obligation at which the ability is honed ought to likewise be set up. On a very basic level, these aptitudes require the utilization of hidden learning that is both wide and profound, and must incorporate both specialized and expert information regions (Prestridge, 2012). The themes for the Professional Knowledge Areas were created by mapping shared characteristics over the diverse disciplinary educational programs determinations. Experts ought to have some information of where and when their order started and how it has advanced, notwithstanding comprehension of continuous issues in the control. A comprehension is required of how to create or get programming (data) frameworks that fulfill the prerequisites of clients and clients. 3. Privacy in Information and Communication Technology Introduction Information and Communication Technology is widely used in business and commercial organizations for enhancing the services as well as organizational structure (Disterer, 2013). Information and Communication Technology (ICT in short) involves increased use of computer systems and other related technologies in the business procedures like accounting, finances, maintenance of financial and operational reports and others. Moreover, ICT technology is also used for the storage of companys files and business strategies in a virtual storage interface. However, there are threats to ICT systems (Hansson, 2013). The main threats are breach of privacy of the confidential documents and unethical cyber attacks. Hence, maintenance of privacy is needed in any organization that has implemented ICT. Privacy in Information and Communication Technology Reasons of facing privacy issues Since ICT involves enhanced use of the computer systems as well as internet networks, threats regarding maintenance of privacy arise frequently. The main issues regarding privacy of the companies that have implemented ICT are as follows: Internal System Malwares In spite of the fact that this is not a part of the major threats expected by the organizations, despite everything it represents a threat to the organizations document storage framework operations (Hu et al., 2012). Internal system malwares are produced from corrupt files or programming projects and they may totally close down the tainted framework . In the event that the frameworks of the organization close down because of malwares, the organization would lose huge amount of data and basic documents. External Malwares - However, the malware talked about above is just a simple kind of malware. There are much more unsafe malwares like virus attacks, Trojan horses, spywares and others. These malwares mostly go into the system from outside sources (Ifinedo, 2012). Case in point, some messages go to the system inbox with data about some crazy offers and a link for a website. The minute the client taps on the connection, the malignant infection associated with the connection goes into the framework taints it. Capable virus attacks like Trojan horse can totally obliterate a framework alongside every other framework associated with the same network. Now and again, there are virus attacks that are made by some unknown identities (Kolkowska Dhillon, 2013). They utilize the virus attacks for hacking into different frameworks for the sole reason for pulverization. Again, there are spywares that are utilized to screen the exercises done inside a framework. Packet Sniffers These are programming tools that are for the most part utilized by associations to screen the internal operations in their own particular systems and monitor malware operations (Laszka, Felegyhazi Buttyan, 2015). Be that as it may, there are some outsider associations that misuse these tools for checking framework exercises of other organizations. This is a sort of breach of security that debilitates to release secret data of the business associations. Unauthorized Access This is done by unethical hackers or third party members keeping in mind the end goal to get to data of an organization without the knowledge of the organization authority (Lee, Geng Raghunathan, 2013). This should likewise be possible by the internal representatives of the organization. This episode happens when an ordinary worker gets to data of the organization that is limited and not took into consideration representative access. The programmers and outsider staff however utilize spywares to screen the utilization of the id and pass code designs in the framework and afterward they utilize them for unauthorized access (Lowry, Posey, Bennett Roberts, 2015). There have been numerous situations where these unauthorized personnel gets to went unnoticed that eventually brought about loss of numerous documents and records of the organization. Nevertheless, because of use of framework alarms, numerous instances of unapproved access have been gotten before any loss of reports or data. Loss of Device To explain this case, an example is to be taken. Let an employee of a company takes his working computer for working at home. Now, on his way back home, he leaves the system in the cab or the system is stolen (Pegrum, Oakley Faulkner, 2013). After this, the system reaches the hands of a hacker and he uses every information stored in it to access the companys systems and extracts important documents. This will cause big losses for the company if suitable steps are not taken immediately. No Knowledge of Network Security among the Company Employees Sometimes, the employees of the company do not have sufficient knowledge regarding network security applications or what to do in case of a breach of security attack (Peltier, 2013). Due to this, the suitable actions are not taken in time, helping the attackers access critical information easily. Objections related to the positions There are several objections related to this situation. Authors have argued that these situations would not have been raised if the organizations increased or sufficiently implemented network securities in their systems. Most of the privacy threats in ICT systems occur due to insufficient or poor security measures (Posey, Roberts, Lowry Hightower, 2014). Moreover, some are even caused by internal employees of the company who access confidential files of the company without authorization. Hence, the companies must reinforce privacy security as well as monitoring systems in order to catch wrong doers easily. Conclusion From the essay, it is clear that maintenance of privacy is important for maintaining business of an ICT implemented organization. . Information and Communication Technology (ICT in short) involves increased use of computer systems and other related technologies in the business procedures like accounting, finances, maintenance of financial and operational reports and others. Since ICT involves enhanced use of the computer systems as well as internet networks, threats regarding maintenance of privacy arise frequently. References ACS Code of Professional Conduct Professional Standards Board Australian Computer Society. Ahmad, A., Maynard, S. B., Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370. Albugarni, S. and Ahmed, V., 2015. Success factors for ICT implementation in Saudi secondary schools: From the perspective of ICT directors, head teachers, teachers and students.International Journal of Education and Development using Information and Communication Technology,11(1), p.36. Ancker, J. S., Silver, M., Miller, M. C., Kaushal, R. (2013). Consumer experience with and attitudes toward health information technology: a nationwide survey.Journal of the American Medical Informatics Association,20(1), 152-156. Anderson, N., 2015. Digital technologies and equity: gender, digital divide and rurality.Teaching and Digital Technologies: Big Issues and Critical Questions, p.46. Australian Computer Society (2012). Bagshaw, E. (2015). Tech crisis: Only half of Australia's students IT savvy. Baskerville, R., Spagnoletti, P., Kim, J. (2014). Incident-centered information security: Managing a strategic balance between prevention and response.Information management,51(1), 138-151. Bilbao-Osorio, B., Dutta, S., Lanvin, B. (2013). The global information technology report 2013. Broadbent, R., Papadopoulos, T. (2013). Bridging the digital divideAn Australian story.Behaviour Information Technology,32(1), 4-13. Burmeister, O., Al-Saggaf, Y., Schwartz, M., Johnson, L. (2014). Internet resources to help Australian ICT professionals identify and solve ethical challenges. ACIS. Cezar, A., Cavusoglu, H., Raghunathan, S. (2013). Outsourcing information security: Contracting issues and security implications.Management Science,60(3), 638-657. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Davison, R. M., Ou, C. X., Martinsons, M. G. (2013). Information technology to support informal knowledge sharing.Information Systems Journal,23(1), 89-109. Disterer, G., 2013. ISO/IEC 27000, 27001 and 27002 for information security management. Floridi, L., Taddeo, M. (Eds.). (2014).The ethics of information warfare(Vol. 14). Springer Science Business Media. Friedman, B., Kahn Jr, P. H., Borning, A., Huldtgren, A. (2013). Value sensitive design and information systems. InEarly engagement and new technologies: Opening up the laboratory(pp. 55-95). Springer Netherlands. Goodman, K. W., Meslin, E. M. (2014).Ethics, information technology, and public health: duties and challenges in computational epidemiology(pp. 191-209). Springer London. Hansson, S. O. (2013). Difficulties for Moral Theories. InThe Ethics of Risk(pp. 21-43). Palgrave Macmillan UK. Hu, Q., Dinev, T., Hart, P., Cooke, D. (2012). Managing employee compliance with information security policies: the critical role of top management and organizational culture*.Decision Sciences,43(4), 615-660. Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.Computers Security,31(1), 83-95. Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology.Canadian Public Administration,57(2), 295-317. Kerven, D., Meso, P. (2016). Adding a Student Research Component to an Information Technology Ethics Course. Kolkowska, E., Dhillon, G. (2013). Organizational power and information security rule compliance.Computers Security,33, 3-11. Kowal, J., Roztocki, N. (2013). Organizational Ethics and Job Satisfaction of Information Technology Professionals in Poland. Laszka, A., Felegyhazi, M., Buttyan, L. (2015). A survey of interdependent information security games.ACM Computing Surveys (CSUR),47(2), 23. Lee, C. H., Geng, X., Raghunathan, S. (2013). Contracting information security in the presence of double moral hazard.Information Systems Research,24(2), 295-311. Lind, T. and Stjernstrm, O., 2015. Organizational Challenges for Schools in Rural Municipalities: Cross-National Comparisons in a Nordic Context.Journal of Research in Rural Education (Online),30(6), p.1. Lowry, P. B., Posey, C., Bennett, R. B. J., Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust.Information Systems Journal,25(3), 193-273. Luftman, J., Zadeh, H. S., Derksen, B., Santana, M., Rigoni, E. H., Huang, Z. D. (2013). Key information technology and management issues 20122013: an international study.Journal of Information Technology,28(4), 354-366. Luftman, J., Zadeh, H. S., Derksen, B., Santana, M., Rigoni, E. H., Huang, Z. D. (2012). Key information technology and management issues 20112012: an international study.Journal of Information Technology,27(3), 198-212. Marchewka, J. T. (2014).Information technology project management. John Wiley Sons. Nathan, G. (2015). Innovation process and ethics in technology: an approach to ethical (responsible) innovation governance.Journal on Chain and Network Science,15(2), 119-134. Pegrum, M., Oakley, G. and Faulkner, R., 2013. Schools going mobile: A study of the adoption of mobile handheld technologies in Western Australian independent schools.Australasian Journal of Educational Technology,29(1), pp.66-81. Peltier, T. R. (2013).Information security fundamentals. CRC Press. Poole, B. J., Sky-McIlvain, E. (2014). Education for an information age. Posey, C., Roberts, T. L., Lowry, P. B., Hightower, R. T. (2014). Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.Information management,51(5), 551-567. Prestridge, S., 2012. The beliefs behind the teacher that influences their ICT practices.Computers education,58(1), pp.449-458. Quinn, M. J. (2014).Ethics for the information age. Pearson. Raggatt, M. (2016). Digital technologies value to boom but women and mature aged missing out. The Sydney Morning Herald. Retrieved 21 April 2016, from https://www.smh.com.au/technology/sci-tech/digital-technologies-value-to-boom-but-women-and-mature-aged-missing-out-20160317-gnlg1w.html Robey, D., Anderson, C., Raymond, B. (2013). Information technology, materiality, and organizational change: A professional odyssey.Journal of the Association for Information Systems,14(7), 379. Rothlin, S., McCann, D. (2016). The Social Environment: Ethics and Information Technology. InInternational Business Ethics(pp. 341-363). Springer Berlin Heidelberg. Saha, B. (2015). The analytical study of the application of the ethical theories in the business governance.Scholedge International Journal of Business Policy Governance ISSN 2394-3351,1(3), 28-31. Siponen, M., Vance, A. (2014). Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems,23(3), 289-305. Siponen, M., Mahmood, M. A., Pahnila, S. (2014). Employees adherence to information security policies: An exploratory field study.Information management,51(2), 217-224. Skues, J.L. and Cunningham, E.G., 2013. The role of eà ¢Ã¢â€š ¬Ã‚ learning coaches in Australian secondary schools.Journal of Computer Assisted Learning,29(2), pp.179-187. Slade, S., Prinsloo, P. (2013). Learning analytics ethical issues and dilemmas.American Behavioral Scientist,57(10), 1510-1529. Sosa, D. (2015). 6 The Vice of Virtue Theory.Moral and Intellectual Virtues in Western and Chinese Philosophy: The Turn Toward Virtue, 77. Stack, S., Watson, J. and Abbott-Chapman, J., 2013. The national broadband network and the challenges of creating connectivity in education: The case of Tasmania.Australasian Journal of Educational Technology,29(2), pp.283-302. Stahl, B. C., Eden, G., Jirotka, M., Coeckelbergh, M. (2014). From Computer Ethics to Responsible Research and Innovation in ICT: The transition of reference discourses informing ethics-related research in information systems.Information Management,51(6), 810-818. Stahl, B. C., Flick, C., Hall, R. (2013). Evaluating research quality in technology ethics.The possibilities of ethical ICT, 435. Stahl, B. C., Flick, C., Hall, R. (2013). Evaluating research quality in technology ethics.The possibilities of ethical ICT, 435. Tamjidyamcholo, A., Baba, M. S. B., Tamjid, H., Gholipour, R. (2013). Information securityProfessional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language.Computers Education,68, 223-232. Taylor, R. W., Fritsch, E. J., Liederbach, J. (2014).Digital crime and digital terrorism. Prentice Hall Press. Tran, S. T., Le Ngoc Thanh, N. Q. B., Phuong, D. B. (2013). Introduction to information technology. InProc. of the 9th inter. CDIO conf.(CDIO). Vacca, J. R. (2012).Computer and information security handbook. Newnes. Van den Hoven, J., Van de Poel, I., Vermaas, P. E. (2014).Handbook of ethics, values and technological design. Dordrecht: Springer. Vaughn, L. (2015).Doing ethics: Moral reasoning and contemporary issues. WW Norton Company. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102. Warren, M., Lucas, R. (2016). Ethics and ICT: Why all the fuss?.Journal of Information, Communication and Ethics in Society,14(2). Yang, Y. P. O., Shieh, H. M., Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, 482-500. Yusri, I.K. and Goodwin, R., 2013. Mobile learning for ICT training: Enhancing ICT skill of teachers in Indonesia.International Journal of e-Education, e-Business, e-Management and e-Learning,3(4), p.293. References