UNIVERSITY EXAMINATIONS: 2012/2013
EXAMINATION FOR THE BACHELOR OF SCIENCE IN
INFORMATION TECHNOLOGY
BIT 2109 PROFESSIONAL ISSUES IN I.T
DATE: AUGUST, 2013 TIME: 2 HOURS
INSTRUCTIONS: Answer Question ONE and Any Other TWO Questions
QUESTION ONE (COMPULSORY)
a) The U.S government issued a new export control policy in January 1997 that shifted
focus from maximum allowable encryption strength and encouraged vendors to
implement key recovery i.e. the ability of law enforcement officials to retrieve
encryption keys from a central database and decode messages if necessary. Vendors
that incorporate an approved key recovery mechanism in their products can export
encryption of any length; Vendors that do not make the commitment are limited to
exporting products with a maximum key length of just 40 bits.
i). Define data encryption as per the above case. [ 3 Marks]
ii). Briefly explain under what circumstances can privacy and confidentiality of
iii). Individuals and organizations be infringed. [6 Marks]
iv). Why does data encryption create a dilemma for most governments?
[4 Marks]
v). Discuss the fair information principles. [8 Marks]
b) Discuss the moral dimension of information age. [5 Marks
c) Describe four possible health risks associated with the prolonged use of computers
[4 Marks]
QUESTION TWO
a) As the information system manager at global1000 company, you have been told by
the senior vice president of operations to implement an ERP system within the next
two years. After several months of investigation you have selected an ERP system
from a reputable vendor. The system would address the complete scope of your
company supply chain management. The middle level managers are resistant to the
implementation of the system
i). Describe the reasons for the middle level managers’ resistance to the
implementation of the system. [5 Marks]
ii) What recommendations can you make to break the impasse over proceeding
with the project. [6 Marks]
b) Define a contract. [3 Marks]
c) Briefly explain the types of contracts used by software developers [6 Marks]
QUESTION THREE
a) Using an appropriate example describe the approach you would take to ethical
decision making. [10 Marks]
b) Describe the candidate ethical principles that can be employed in making an ethical
decision. [10 Marks]
QUESTION FOUR
a) Describe the kind of protection offered by copyrights, trade secret and patents giving
two benefits and two limitations of each for developers of computers software.
[9 Marks]
b) Discuss giving examples of the values embedded, technology such as the internet.
[6 Marks]
c) Briefly explain four types of policy approaches that can be taken to control
Behaviour on the internet. [5 Marks]
QUESTION FIVE
a) Differentiate between computer crime and computer abuse. [4 Marks]
b) Briefly discuss the following types of computer misuse as defined by the English
Criminal Law [8 Marks]
(i) Computer fraud
(ii) Computer Hacking
(iii) Forgery
(iv) Pornography
c) Describe briefly how information technology has affected the quality of life in
relation to Equity, Access, boundaries and dependence. [8 Marks]