{"id":1917,"date":"2026-02-10T17:31:59","date_gmt":"2026-02-10T17:31:59","guid":{"rendered":"https:\/\/www.colapapers.com\/?p=1917"},"modified":"2026-02-10T17:32:04","modified_gmt":"2026-02-10T17:32:04","slug":"mn501-assignment-1-ethical-issues-in-ict-and-smart-technologies-short-essay","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/dissertations\/mn501-assignment-1-ethical-issues-in-ict-and-smart-technologies-short-essay\/","title":{"rendered":"MN501 Assignment 1 ethical issues in ICT and smart technologies short\u2011essay"},"content":{"rendered":"<h2 id=\"mn501-network-management-in-organisations--assignm\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">MN501 Network Management in Organisations \u2013 Assignment 1 (Updated Ethical ICT Assessment Brief)<\/h2>\n<h2 class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base first:mt-0\">Assessment overview<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Unit code:<\/strong>\u00a0MN501<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Unit title:<\/strong>\u00a0Network Management in Organisations<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Assessment type:<\/strong>\u00a0Assignment 1 \u2013 Short analytical essay<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Assessment title:<\/strong>\u00a0Ethical issues arising from the use of ICT and smart technologies<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Weight:<\/strong>\u00a010% of unit grade<span class=\"inline-flex\" aria-label=\"MN501 - Network Management in Organisations\" data-state=\"closed\">\u200b<\/span><\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Length:<\/strong>\u00a0800\u20131,000 words (excluding reference list)<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Due date:<\/strong>\u00a0Week 7, Friday, 11:55 pm (learning management system time zone; check current unit outline for exact date)<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Submission:<\/strong>\u00a0Online via Moodle with completed Assignment Cover Page<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base first:mt-0\">Purpose and learning outcomes<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">This task develops your skills in research, critical analysis and high\u2011standard academic writing in the context of ICT and networked environments. You are expected to:<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Identify potential ethical and social issues related to IT and network administration.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Discuss ethical and social issues arising from the deployment and management of ICT systems.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Interpret professional codes of ethics published by recognised bodies (e.g. ACS, EA, ACM).<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Evaluate ethical behaviour with reference to these codes.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Propose ethically defensible solutions that protect individuals and benefit society.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">You must work at an abstract, conceptual level, support arguments with clear reasoning, and demonstrate critical thinking rather than descriptive commentary.<\/p>\n<h2 id=\"task-description\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Task description<\/h2>\n<h2 class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base first:mt-0\">Scenario allocation<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Select\u00a0<strong>one<\/strong>\u00a0scenario based on the\u00a0<strong>last digit<\/strong>\u00a0of your student ID:<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">ID ends in\u00a0<strong>0 or 5<\/strong>\u00a0\u2192 Scenario 0: Wearable technologies in the workplace<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">ID ends in\u00a0<strong>1 or 6<\/strong>\u00a0\u2192 Scenario 1: Smartphones for clinical communication in hospitals<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">ID ends in\u00a0<strong>2 or 7<\/strong>\u00a0\u2192 Scenario 2: Fear of Missing Out (FoMo) and social media<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">ID ends in\u00a0<strong>3 or 8<\/strong>\u00a0\u2192 Scenario 3: Oversharing on social media apps and cyberbullying<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">ID ends in\u00a0<strong>4 or 9<\/strong>\u00a0\u2192 Scenario 4: Consumer apps and weak security<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">You will investigate and reflect on your allocated scenario using one or more recognised ICT professional ethical codes, such as the\u00a0<strong>ACS Code of Professional Ethics<\/strong>,\u00a0<strong>EA ethical guidelines<\/strong>, or the\u00a0<strong>ACM Code of Ethics and Professional Conduct<\/strong>.<\/p>\n<h2 class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base first:mt-0\">Scenario prompts<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">You must address the prompt for your allocated scenario:<\/p>\n<ol class=\"marker:text-quiet list-decimal\" start=\"0\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Wearable technologies in the workplace<\/strong><br \/>\nSmart glasses, smart watches and other wearables are entering workplaces. Their always\u2011on recording capabilities make it easy to capture and share images, audio and video of colleagues and customers without consent.<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">What ethical issues arise from the use of wearable technologies in the workplace?<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Consider privacy, consent, surveillance, data ownership, power imbalance and workplace culture.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Smartphones in clinical communication<\/strong><br \/>\nNurses and other clinicians increasingly use smartphones for messaging, clinical apps and workflow support in hospitals. Storing or transmitting patient data on these devices raises privacy and security concerns.<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Identify the key privacy risks in this context and explain them in detail.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Consider confidentiality, access control, data leakage, device loss, cloud backup and regulatory expectations.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>FoMo and social media addiction<\/strong><br \/>\nSocial media platforms encourage constant engagement and can foster Fear of Missing Out (FoMo).<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Discuss how prevalent FoMo has become in society and analyse its ethical impacts.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Consider mental health, autonomy, manipulation by design, data exploitation and social relationships.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Cyberbullying and oversharing in apps<\/strong><br \/>\nYou receive an event invitation from an unknown third party via a mobile app and do not know how they obtained your details.<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Discuss what security and privacy issues arise from sharing too much personal information on social media apps.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Consider profiling, data brokerage, harassment, cyberbullying and loss of control over personal data.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Consumer apps and weak security<\/strong><br \/>\nMany consumer apps (health, ride\u2011sharing, banking, retail) provide convenience yet may expose users to security and privacy breaches.<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Choose a real app that you have used recently and identify any known or potential privacy\/security breaches associated with it.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Is it ethical for companies to release apps with only basic levels of security? Discuss from a professional\u2011ethics perspective.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2 id=\"required-structure-and-headings\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Required structure and headings<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Use the following headings in your 800\u20131,000\u2011word essay. Each heading aligns with marking criteria.<\/p>\n<ol class=\"marker:text-quiet list-decimal\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Introduction (4\u20136 sentences)<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Briefly introduce your scenario and the ICT or smart technology involved.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">State the main ethical issue(s) you will discuss and mention which professional code(s) you will refer to.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Identification<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Identify at least\u00a0<strong>two significant ethical issues<\/strong>\u00a0in your scenario (e.g. privacy, confidentiality, informed consent, duty of care, misuse of data, professional responsibility).<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Name each issue clearly.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Analysis<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Analyse the identified issues in terms of their impact on:<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">the organisation or business (reputation, legal exposure, trust, security posture, operational risk), and<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">individuals and society (wellbeing, rights, fairness, vulnerability, digital divide).<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Use relevant concepts from ICT ethics and network management where appropriate.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Evaluation and justification<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Evaluate the situation using at least one professional code (e.g. ACS, EA, ACM).<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Explicitly link the behaviour or decisions in your scenario to specific principles or clauses (e.g. public interest, privacy, competence, honesty, respect).<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Justify what would count as ethical or unethical conduct and argue for one or more practical, ethically sound courses of action or policy responses.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Conclusion (2\u20133 sentences)<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">State your overall judgement about the ethical acceptability of the practices in your scenario.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Briefly summarise how adherence to professional codes and improved policies can mitigate the issues.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>References<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Provide a properly formatted reference list using\u00a0<strong>APA<\/strong>\u00a0or\u00a0<strong>IEEE<\/strong> consistently.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2 id=\"formatting-and-submission-requirements\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Formatting and submission requirements<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Format:<\/strong>\u00a0MS Word document (.doc or .docx).<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Spacing:<\/strong>\u00a01.5 line spacing.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Font:<\/strong>\u00a011\u2011point Calibri (Body).<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Margins:<\/strong>\u00a02 cm on all sides.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Headings:<\/strong>\u00a0Use the section headings listed above.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Referencing:<\/strong><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In\u2011text citations and reference list in\u00a0<strong>APA<\/strong>\u00a0or\u00a0<strong>IEEE<\/strong>\u00a0style; choose one and use it consistently.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Use credible academic and professional sources (e.g. journal articles, professional codes, reputable reports).<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 id=\"academic-integrity\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Academic integrity<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">All work must be your\u00a0<strong>own<\/strong>.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">You may not copy solved assignments or essays from online repositories, \u201cstudy help\u201d sites, or other students. Using third\u2011party solutions (including contract cheating services) breaches academic integrity policies.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Academic misconduct penalties range from a mark of zero to exclusion from the course or cancellation of the award, depending on severity. Check your institution\u2019s\u00a0<strong>Academic Misconduct<\/strong>\u00a0and\u00a0<strong>Plagiarism<\/strong>\u00a0policies for full details.<\/p>\n<\/li>\n<\/ul>\n<hr class=\"bg-subtle h-px border-0\" \/>\n<h2 id=\"marking-criteria-100-marks-10\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Marking criteria (100 marks, 10%)<\/h2>\n<div class=\"group relative\">\n<div class=\"w-full overflow-x-auto md:max-w-[90vw] border-subtlest ring-subtlest divide-subtlest bg-transparent\">\n<table class=\"border-subtler my-[1em] w-full table-auto border-separate border-spacing-0 border-l border-t\">\n<thead class=\"bg-subtler\">\n<tr>\n<th class=\"border-subtler p-sm break-normal border-b border-r text-left align-top\">Aspect<\/th>\n<th class=\"border-subtler p-sm break-normal border-b border-r text-left align-top\">Description<\/th>\n<th class=\"border-subtler p-sm break-normal border-b border-r text-left align-top\">Marks<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Introduction<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Introduces scenario and ethical issues clearly in 4\u20136 sentences<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">20<\/td>\n<\/tr>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Identification<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Identifies at least two important ethical issues<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">10<\/td>\n<\/tr>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Analysis<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Analyses these issues for their impact on business and society<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">20<\/td>\n<\/tr>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Evaluation and justification<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Evaluates the issues using professional codes and justifies positions and recommendations<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">20<\/td>\n<\/tr>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Conclusion<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Provides a clear, logically aligned conclusion in 2\u20133 sentences<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">20<\/td>\n<\/tr>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Reference style<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">Uses APA or IEEE consistently and correctly<\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">10<\/td>\n<\/tr>\n<tr>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\"><strong>Total<\/strong><\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\"><\/td>\n<td class=\"px-sm border-subtler min-w-[48px] break-normal border-b border-r\">100<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"bg-base border-subtler shadow-subtle pointer-coarse:opacity-100 right-xs absolute bottom-0 flex rounded-lg border opacity-0 transition-opacity group-hover:opacity-100 [&amp;&gt;*:not(:first-child)]:border-subtle [&amp;&gt;*:not(:first-child)]:border-l\">\n<div class=\"flex\"><\/div>\n<div class=\"flex\"><\/div>\n<\/div>\n<\/div>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">A detailed rubric mirrors the above aspects and differentiates performance levels (HD to Fail) in terms of critical thinking, argument quality, use of sources, cohesion and referencing accuracy. Essays that simply describe technologies without ethical analysis, that fail to use professional codes, or that rely heavily on uncredited online solutions will not meet higher\u2011grade standards.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">A concise introduction to Scenario 1 would state that smartphone use among nurses promises faster clinical communication yet creates significant risks for patient confidentiality and data security whenever unsecured messaging apps or personal cloud backups are involved. A strong identification section would name privacy breaches and professional duty of care as the core issues, since unencrypted photos of wounds or lab results can be copied, forwarded and stored beyond hospital control. In the analysis, effective work links these practices to reputational harm and regulatory exposure for the hospital, as well as loss of trust, embarrassment and potential discrimination for patients whose data is disclosed. When evaluating the scenario, high\u2011quality answers explicitly tie recommended behaviour to clauses in the ACS or ACM codes that require respect for privacy, protection of personal information and prioritisation of public interest, and then argue that policies must restrict clinical images to approved, audited systems. The justification usually concludes that unmanaged personal\u2011device use is ethically unacceptable, and that providing secure clinical communication tools plus staff training offers a more responsible balance between efficiency and patient rights.<\/p>\n<h2 id=\"suggested-recent-references-example-set-for-ict-et\" class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">References<\/h2>\n<p class=\"mb-2 mt-4 [.has-inline-images_&amp;]:clear-end font-sans visRefresh2026AnswerSerif:font-editorial font-semimedium visRefresh2026Fonts:font-bold text-base visRefresh2026Fonts:text-lg first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Stahl, BC, Timmermans, J &amp; Flick, C 2016, \u2018Ethics of emerging information and communication technologies: On the implementation of responsible research and innovation\u2019,\u00a0<em>Science and Public Policy<\/em>, vol. 44, no. 3, pp. 369\u2013381, doi:10.1093\/scipol\/scw069.<span class=\"inline-flex\" aria-label=\"Report: Exploring ICT Ethical Issues and Implications\" data-state=\"closed\">\u200b<\/span><\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Australian Computer Society (ACS) 2023,\u00a0<em>ACS Code of Professional Ethics<\/em>, viewed 10 February 2026, &lt;<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"https:\/\/www.acs.org.au\/&amp;gt;.\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">https:\/\/www.acs.org.au\/&amp;gt;.<\/span><\/a><span class=\"inline-flex\" aria-label=\"ACS Code of Professional Ethics for ICT Professionals - Studylib\" data-state=\"closed\">\u200b<\/span><\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Association for Computing Machinery (ACM) 2018,\u00a0<em>ACM Code of Ethics and Professional Conduct<\/em>, viewed 10 February 2026, &amp;lt&gt;<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"https:\/\/www.acm.org\/code-of-ethics&amp;gt;.%5B3\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">https:\/\/www.acm.org\/code-of-ethics&amp;gt;.[3<\/span><\/a>]<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ventola, CL 2014, \u2018Social media and health care professionals: Benefits, risks, and best practices\u2019,\u00a0<em>P&amp;T<\/em>, vol. 39, no. 7, pp. 491\u2013520, &lt;<a class=\"reset interactable cursor-pointer decoration-1 underline-offset-1 text-super hover:underline font-semibold\" href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4103576\/\" target=\"_blank\" rel=\"nofollow noopener\"><span class=\"text-box-trim-both\">https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4103576\/<\/span><\/a>&gt;.<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Koivunen, M &amp; Saranto, K 2018, \u2018Nursing professionals\u2019 experiences of the use of electronic health records in everyday practice in hospital wards\u2019,\u00a0<em>International Journal of Medical Informatics<\/em>, vol. 110, pp. 31\u201337, doi:10.1016\/j.ijmedinf.2017.11.006<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>MN501 Network Management in Organisations \u2013 Assignment 1 (Updated Ethical ICT Assessment Brief) Assessment overview Unit code:\u00a0MN501 Unit title:\u00a0Network Management in Organisations Assessment type:\u00a0Assignment 1&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4283,4170,880],"tags":[],"class_list":["post-1917","post","type-post","status-publish","format-standard","hentry","category-business-ethics-essay","category-information-communication-technology-ict","category-professional-ethics-essays"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/posts\/1917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/comments?post=1917"}],"version-history":[{"count":1,"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/posts\/1917\/revisions"}],"predecessor-version":[{"id":1927,"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/posts\/1917\/revisions\/1927"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/media?parent=1917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/categories?post=1917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/dissertations\/wp-json\/wp\/v2\/tags?post=1917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}