Enterprise-level Networking-2C
Enterprise-level Networking-2C: Order Now
Ethical and Social Issues in Information Systems. (n.d.). Chapter 4. Retrieved from http://www.prenhall.com/behindthebook/0132304619/pdf/laudon%20MIS10_CH-04%20FINAL.pdf
Lynch, M. (2000) Ethical Issues in Electronic Information Systems. University of Texas. Sections on Electronic Networks (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Elec_Nets); Access to networks (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Access); and Electronic Databases (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#ED) retrieved December 20, 2011.
Amrhein, D., and Quint, S. (2009) Cloud computing for the enterprise: Part 1: Capturing the cloud. IBM Corporation. Retrieved on December 1, 2011 from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html
Enterprise-level Networking-2C
Optional Reading
Chee, B. and Franklin, C. (2010) Applications for Clouds. Chapter 4 in Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center. CRC Press. Retrieved on December 1, 2011, from http://media.techtarget.com/searchSystemsChannel/downloads/Cloud_Computing_Techn_Strat_of_the_Ubiq_Data_Cent_Chapter_4.pdf
Assignment Overview
There is no doubt that at the enterprise level, the management of organizational information is a very complicated process, reflecting not just issues of technology but fundamental issues of the distribution of power and control. Information is power, and the distribution and maintenance of that information has direct effects on both internal and external consequences of organizational behavior. One of the key issues involved in the movement toward cloud computing on the part of many organizations has to do with handing over to external contractors a certain share of the organizational power granted by access to and control over organizational data. Over and over, we are assured by such contractors that they would never misuse data or allowed to be compromised in any way. Yet deep down, we also understand that whatever can go wrong, eventually will, and that the wider the control over the data is shared, the more places are available for it to be compromised.
Enterprise-level Networking-2C
The case for this module calls for you to think about some of these ethical concerns and issues posed by distributing access to organizational data more widely. Let’s begin by thinking about what’s peculiar about the enterprise level of information systems. A good place to begin here is grounded in the systems engineering body of knowledge:
Ethical and Social Issues in Information Systems. (n.d.). Chapter 4. Retrieved from http://www.prenhall.com/behindthebook/0132304619/pdf/laudon%20MIS10_CH-04%20FINAL.pdf
So how does “the cloud” affect enterprise computing? Here’s a perspective on the issue from one of the major vendors of cloud computing services:
Amrhein, D., and Quint, S. (2009) Cloud computing for the enterprise: Part 1: Capturing the cloud. IBM Corporation. Retrieved on December 1, 2011 from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html
But now, to return to the operational level. A number of years ago, Margaret Lynch of the University of Texas outlined a series of ethical issues and concerns relating to electronic information generally. You can review her perspective on three of these issues here:
Lynch, M. (2000) Ethical Issues in Electronic Information Systems. University of Texas. Sections on Electronic Networks (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Elec_Nets); Access to networks (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Access); and Electronic Databases (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#ED) retrieved December 20, 2011.
Case Assignment
Enterprise-level Networking-2C: Order Now
When you’ve had a chance to read this article, review information from the background readings and research other sources on your own, please prepare a short paper on the topic:
?Ethical challenges raised by Lynch that are either (a) simplified and resolved or (b) made more complex and difficult by the transition to cloud-based information networks.
Assignment Expectations
Your paper should be from 3?5 pages. Take a definite stand on the issues, and develop your supporting argument carefully. Using material from the background information and any other sources you can find to support specific points in your argument is highly recommended; try to avoid making assertions for which you can find no support other than your own opinion.
You will be particularly assessed on:
?Precision: Your draw on a range of sources, and to establish your understanding of the historical context of the question. You carried out the exercise as assigned, or carefully explained the limitations that might have prevented your completing some parts (running out of time isn?t generally considered an adequate limitation).
?Support for assertions: You use examples, citations (especially to the required readings), and elaboration to support assertions. You provide evidence that you have read the required background materials.
?Clarity: Your answers are clear and show your good understanding of the topic. You see what the module is all about and to structure your paper accordingly.
?Breadth and Depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
?Critical thinking: The paper incorporates YOUR reactions, examples, and applications of the material to business that illustrate your reflective judgment and good understanding of the concepts. It is important to read the “required readings” posted in the background material plus others you find relevant. Your informed commentary and analysis is vital — simply repeating what your sources say does not constitute an adequate paper.
?Overall quality: Your paper is well written and the references, where needed, are properly cited and listed