Ethical principles relating to ICT and IT Management.
Ethics is a synthesis of three elements, (a) law, (b) morals, (c) and personal conduct:
A) Is it legal? For example, it is illegal to download and install pirated software. Maintaining good licensing and documentation protects an organization from potential litigation.
B) Is it moral? Society shapes issues of right and wrong; and people are expected to uphold common values. For example, it is unacceptable to abuse administrative authority to look up co-workers' salaries.
C) Is it something you would do? There are circumstances when an action may be both legal, and immoral. Conversely, a moral remedy may be unlawful. The controversy surrounding systems administrator, Eric Snowden, serves as a relevant example for ICT ethics and personal conduct.
Snowden is accused of stealing and publishing classified government information. Reuters reports that Eric Snowden used his role as a systems administrator to persuade co-workers to collect passwords (McNamara, 2013).
However, Snowden maintains his innocence as a whistle blower. Snowden argues that the National Security Agency (NSA) illegally collects phone records of millions of Americans (Wiebe, 2013). Snowden's motivation may be moral, but his actions were illegal.
In a quasi-related case, U.S. Federal District Court Judge, Richard Leon, ruled that the the NSA phone program is likely unconstitutional (Gerstien, 2013). The Department of Justice is expected to appeal the decision. The NSA actions are legally unethical if upper courts uphold Leon's decision. The director of the NSA, Gen. Keith Alexander had previously stated, "I think what we're doing to protect American citizens here is the right thing" (Michaels, J., 2013).
Some view Snowden as a hero, and other's view him as a traitor. In regard to ICT, Snowden was an unethical system administrator. Snowden lacks integrity because he abused his administrative privileges by trolling confidential data.
ICT is an institutional process that contributes value to organizations (Brynjolfsson, 2003). Information Technology (IT) is responsible for an organizations' systems, services, and support. Typical responsibilities include:
- ICT related purchasing.
- Maintaining sensitive data on file servers, databases, and backups.
- Ensuring the electronic privacy for all individuals within the organization.
- Intellectual property and software licensing.
- Preventing digital fraud.
Network administrators have the "digital" keys to everything on the network. Network administration requires ethical conduct to ensure standards of integrity, confidentiality, and availability.
Why did you create this artifact?
This artifact demonstrates the ethical principles of ICT. I chose to review The Adventures of an IT Leader, by Robert Austin, Richard Nolan, and Shannon O'Donnell, for a class project. The story examines typical ICT challenges and presents examples of effective leadership skills to overcome them. In each situation, the IT leader had to navigate through a variety of ethical issues.
References:
Brynjolfsson, E. (2003, July). The IT Productivity Gap. Optimize Magazine (21). Retrieved from
http://ebusiness.mit.edu/erik/Optimize/pr_roi.html
Gerstein, J., (2013, December 16th). Retrieved from:
http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
McNamara, J. (2013, November 8th) Retrieved from:
http://www.networkworld.com/community/blog/snowden-used-sys-admin-role-collect-passwords-reuters
Michaels, J. (2013, June 13th). Retrieved from:
http://www.usatoday.com/story/news/politics/2013/06/12/alexander-nsa-cyber-snowden/2415217/
Wiebe, K., (2013, December 17th). Retrieved from:
http://www.cnn.com/2013/12/17/opinion/wiebe-snowden-amnesty/
Artifact: Evaluate and use ICTs appropriate to one's own career.
Promote Enterprise Network Security Strategies.
This artifact acknowledges that I have met the training standard for Information Systems Security Professionals, set forth by the National Secuirty Agency (NSA) and the Committee on National Security Systems (CNSS).
The Cisco Certified Network Associate Security (CCNA Security) validates my knowledge and ability to secure enterprise networks.

CCNA Security curriculum outlines infrastructure security, as follows: firewall installation, monitoring and troubleshooting; integrity, confidentiality and data availability.
UW-Stout participates with the Cisco Networking Academy. I achieved the CCNA Security certification through a series of lectures, discussions, course manuals, and extensive lab work.
Cryptography and encryption technologies are integrated with every infrastructure system at my workplace, including:
- Internal certificate authority (CA) servers distributes certificates to internal systems.
- Workstations use certificates to authenticate with a process similar to user authentication.
- Secure socket tunneling protocol (SSTP) virtual private networks (VPNs) allows remote access.
- Microsoft Direct Access and Terminal Services Gateway use public key infrastructure (PKI) certificates to support remote access.
- BranchCache uses hashes to ensure data integrity.
Analyze the philosophy and principles underlying the organization and operation of ICT enterprises.
This artifact explores ICT philosophy and principles through an interview conducted with Tim Hapeman, IT Director at Oconomowoc Residential Programs (ORP).
ORP provides group homes, work opportunities, and educational services for people with mental disabilities. They are a $100 Million dollar company and have locations across the Midwest. The IT department services over 100 locations and provides network services for over 2000 employees
Hapeman has been with ORP for ywo years. He previously worked for Goodwill Industries, as the Manager of Information Technology, and Leprino Foods, as their System and Security Supervisor. Hapeman has a bachelor in Mathematics from Michigan State University, as well as a graduate degree in Computer Information Technology from Regis University in Denver, Colorado.
Peter A. High's, World Class IT, argued that businesses need successful IT departments in order to succeed. High outlined five principles that align IT with business strategy:
- Talent. Recruit, train, and retain talented staff.
- Infrastructure. Build and maintain robust IT systems.
- Project Management. Systematic planning and implementation ensure success.
- IT and Business Partnerships. Develop teamwork and communication between departments.
- External Partnerships. Collaboration with vendors, customers, and consultants.
ICT diffusion principles are applied throughout the interview process. The adoption phase consists
of information gathering, design, and development. The process begins with an analysis of High's World Class IT. The interview questions are designed from modeling High's sub-principles of IT and business partnerships.
Evaluate and use ICT appropriate to IT Management.
The validation examines Microsoft server message block
network protocol (SMB2). It represents relationships between technology, organizations, and staff.
This validation uses an ICT innovation process called diffusion.
The four principles of innovation diffusion are adoption, implementation, use, and
effect. This validation uses the diffusion
process through the research project.
This artifact documents an organizational problem with server message block protocol (SMB). ICT provides a
scientific approach to identify and resolve this problem. As such, it introduces SMB2 protocol innovations.