PAPA MODEL – Information Technology

Table of Content
  1. PAPA Model:Today, the monolithic usage of computing machine scientific discipline & A ; information engineering in concern universe and other intuitions has brought many ethical issues and concern. Mason introduced four most important ethical issues of the information epoch on 1986: which are Privacy, truth, belongings and handiness abbreviated to PAPA. Mason’s PAPA theoretical account focused on the single damage which could originate from the unethical or abuse of information and information engineering. Based on the Framework developed by Mason we can analyse and make in the decision on ethical issues emerged by the unethical usage of information engineering. PAPA theoretical account enlighten depth cognition on what the Privacy, truth, belongings and truth agencies, how they are interrelated, what are their differences and how they help us to make in the decision on ethical issues.

Privacy:In general apprehension privateness means the right to be free from secret examination and to find whether, when, how and to whom, one’s personal or organisational information is to be revealed. The privateness Act 1988 regulates how personal information is handled. The Privacy Act defines personal information as

…information or an sentiment, whether true or non, and whether recorded in a material signifier or non, approximately and identified single, or an person who us moderately identifiable. There are two chief factors which threaten our privateness today, foremost growing of information engineering with its capacity of examination, communicating, calculating, retrieval and storage, and secondly the increased value of information in determination devising.

This essay could be plagiarized. Get your custom essay
“Dirty Pretty Things” Acts of Desperation: The State of Being Desperate
128 writers

ready to help you now

Get original paper

Without paying upfront

Accuracy:It is the status or quality of being true, right or exact ; free from mistake or defect. Inaccuracy may do take awaying state of affairs on person’s life, organisations and concern values. Here arises some inquiry: who should be responsible for truth and genuineness of collected information? How can one believe that the informations will be right inputted, processed decently and presented to users? On what footing should we believe bugs in database or system and processing are non done with purpose and occurred accidently. Who takes the duty for bug in information and how the victim will be reimbursed.

Property:Property issues are concentrated on ownership and value of information. It besides seeks the reply of few inquiries like, who is the proprietor of information. What is the value for the exchange, and in which manner the entree to information or the resorts should be allocated? Here belongings means the rational belongings and its right. Once the rational belongings is provided someplace or transmitted, it is complicated to maintain within the individual as it become catching and more hard to be reimbursed.

Handiness:its issues are concerned on who has the permission to entree the information, who holds the rights or keys to entree it, what data an person or organisations are privileged to get with which precautions and under what footings and conditions?

  1. After traveling through the scenario provided and from my ain research I consider, all four countries have given rise to ethical issues for Joseph where some has higher degree of issue where as other has low degree consequence. Most significantly it gives rise to privateness issues followed by others.

Privacy issues:Joseph’s personal or we can state really confidential information was compromised which could take to really black effects, individuality larceny makes life suffering. If Joseph had given attending on lecture’s warning to them to be careful and argus-eyed while supplying personal information to companies over cyberspace, he might be on safe side but instead he thought him old fashioned and ne’er thought some issues may originate while supplying information to company like Sony. How can one make up one’s mind on whom to swear? How much information can one give to others?

Accuracy Issues:Bing the client of Sony Joseph had right to acquire accurate and timely information, to whom he had provided his personal information to recognition card inside informations with trust. Accurate information of personal information and recognition card inside informations being hacked was provided merely after a whole hebdomad of the incident followers by other misleading and bogus information. Though, the hackers couldn’t non make any abuse of informations they might hold destroyed everything in a hebdomad clip clients could take safeguard to

Property Issues:When Joseph could non reconstruct the backup file it gives rise to belongings issues. He bought games from Sony he collected trophies but did he truly have that? Did Sony have the informations that clients provided?

  1. Sony’s informations breach is one of biggest informations breach to day of the month which has given rise to assorted concerns in the Sony’s privateness policy and security steps. Though, other issues besides marked a inquiry to Sony’s direction specially it has fueled to Privacy concern. When an organisation gathers personal information of its clients, employees and other stakeholders they must guarantee the safety and security of those. Breach of personal information can be proved really unsafe and it has been proved in many instances for illustration Jessica’s Story of mail cozenage. The chief issue and the inquiry arise to Sony is where they truly serious on Privacy issues, had they meet all the privateness steps and followed the protocol. If they had done so how person could chop and come in into their system. Breach of over 77million histories including all the personal inside informations and recognition card of the client was non a little issue. This issue gave a large inquiry grade to Sony. The direction took a whole hebdomad to inform its client on existent ground for closing down of its web, which is questionable. If a breach does happen, effectual handling of the response is a key.This means planning and fixing for such an event in progress. A policy should be drawn up, under which it is suggested that prompt presentment is made to both the clients and the regulators. All staff should hold informations protection preparation appropriate to their function, and appropriate compensation, support and remedial programs should be prepared. Though it was Sony violated the privateness of its client“ Appropriate proficient and organizational steps shall be taken against unauthorizedor improper processing of personal informations and against inadvertent loss or devastation of, or harm to, personal information. ”

4. I find some statements made by Privacy commissioner Timothy Pilgrim questionable. He stated that Sony did hold a instance to reply as they “ did non deliberately unwrap any confidential information ” is non surprising, merely put Australia has no existent commercial Privacy or security statute law for Sony to transgress. The fact that Sony did non demo a responsibility of attention and/or displayed a complete deficiency respect for the personal information entrusted

to them by their clients is wholly ignored by the commissioner. Sony ‘s responsibility of attention is to keep appropriate IT security systems, policies and processs to keep client informations confidential, private and available whether at remainder, in theodolite or in procedure. It is obvious that they did non take these responsibilities of attention duties earnestly until “ that proverbial substance ” hit the fan. Statement by Pilgrim “Sony has now excess security steps to beef up protection around the web platforms” highlights its historical neglect for client confidentiality in their corporate civilization and I do non believe that any Australian Government functionaries should notice and seek to forgive such obvious individualistic behaviour. Can he reply us what sensible stairss Sony took to protect individual’s certificates. Now, they really created a CSO function. They did n’t hold this before? What mulcts were handed down for this breach? How can he demo that statute law protects individual’s information to abroad organisations? “ I opened this probe because I was concerned that Australians ‘ personal information may hold been compromised, ”

Pilgrim said. However, his concerns were baseless, with Pilgrim happening that the company had n’t breached the Act. Seriously, merely why does Sony Corporation necessitate our full day of the month of birth? Year merely should be equal to verify a client is over 18 – investigation further merely if the twelvemonth reveals person turning 18 that twelvemonth. As such, Sony should be 100 % apt for any loss plus amendss for emotional hurt to any client, their partner and immediate household, in regard of any client who has their individuality stolen and fraud committed. And besides it has to be made clear that whether it identified a perpetrator in the invasion. Guilty must be punished.

Cite this page

PAPA MODEL – Information Technology. (2017, Jul 25). Retrieved from

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront