Sunday, December 8, 2019

Topics in Information Technology Ethics for Computer Applications

Question: Discuss about theTopics in Information Technology Ethics for Computer Applications. Answer: Introduction Doing Ethics Technique (DET) is defined as a tool which assists in finding different ethical and non-ethical issues relating to a situation by giving answers to simple questions (Lekakos, Vlachos Koritos, 2014). This paper will implement Doing ethics technique on the situation provided in Scenario 3: Early launch (Video 1) (Al-Saggaf, 2016). The DET will assist in determining ethical issues provided in the scenario and analyse the potential implications of such ethical issues. Ethical theories will be implemented for assessing the morality of the situation. Further, different options will be discussed to find the most suitable solution to the ethical problems that occurred due to adoptions and use of ICT. Doing Ethics Technique What is going on? In the video, based on the recommendation of the CIO, project director is asking the project manager to deliver the software one month earlier than its original deadline. In order to save the time, he is asking him to avoid the encryption of the software. The project manager denies by saying that the senior developer has emphasised the importance of the encryption for the security of the software without which it might get hacked. The project director said that delivering the project earlier will give additional benefits to the project manager and his team. He also said that they can attach the encryption to a software update after delivering the software. What are the facts? Encryption helps in protecting personal data by converting it into code which can only be accessed by the person who has the code key (Singh, 2013). It prevents unauthorised access and protects the data in case of a breach (Rewagad Pawar, 2013). Project manager emphasis on the importance of encryption for the software and how lack of security can negatively affect millions of people. Project director tries to entice the project manager by saying that he and his team will receive bonuses if they deliver the software without encryption. What are the issues? The key issue is the security of the software since the project director is asking it to release the software without encryption. The project director is avoiding the recommendation of the senior developer that encryption is vital for the security of the software. For personal and companys gain, project director is willing to sacrifice the security of millions of people which is morally incorrect. The project director is enticing the project manager by saying that he and his team will receive additional benefits if they deliver the software one month before the deadline. Who is affected? Project Manager: The project manager is responsible for ensuring the security of the software and delivering it one month earlier than the deadline without encryption increases the risk of hacking. Project manager is responsible for protecting the privacy of millions of people who will get affected in case the software gets hacked. People: Without encryption, it is easier for cybercriminals to hack the software and collect the personal information of people who are using the software. Organisation: In case the software gets hacked, the reputation of the company will be lost, and it will be difficult for them to get new clients in the future. Client: The client will suffer the most in case the data gets led by hackers. The client can also sue the software development company for providing software without encryption which increases the risk of cyber-attacks. What are the ethical issues and implications? The primary ethical issue is the security of millions of people whose personal details will be leaked in case the software gets hacked. According to Deontological ethical theory, rightness or wrongness of an action prevail over it right or wrong consequences (Yazdani Murad, 2015). Therefore, based on this theory, it is ethically incorrect for CIO and project director to force and entice the project manager by saying he and his team will receive handsome bonuses if they deliver the software a month earlier than the deadline without encryption. The implications of the ethical issues might negatively affect millions of people by leaking their sensitive data (Derr, 2012). The company and its employees will also negatively affect due to adverse implications of issues. What can be done about it? In order to avoid ethical issues, CIO and project director should listen to the project manager and his team and take into consideration their recommendations. They should not force the team to deliver the software one month earlier without encryption to gain an unfair advantage. The company should focus on improving the quality and security of its software rather than providing it earlier than deadline to make the client happy. What options are there? Project managers can accept the offer of project director and deliver the software without encryption which makes it easier for cybercriminals to hack and collect the personal data of millions of users. Project director can avoid the recommendation of the project manager and deliver the project by hiring a new team of developers. Project director can listen to the recommendations of project manager and his team and focus on the security of the software rather than gaining an unfair advantage. Which option is best and why? The best option in this scenario is that project director listens to project manager and his team and dismisses the decision to deliver the software one month before the deadline. The software should be encrypted to protect the data of its users. The company can avoid the risk of hacking by delivering the software on the deadline after completing its encryption. It is the ethical decision since it will protect the reputation of the company and data of millions of users. Conclusion Conclusively, it is ethically incorrect for companies to put their advantage above peoples security. The top-level management should consider the recommendations of the team before taking any shortcuts which may negatively affect others. In this case, it is ethically wrong for the company to force and deliver the software one month early without encryption since it may get hacked and leaked personal data of millions of users. References Al-Saggaf, Y. (2016, October 31). Scenario 3: Early Launch. [Video File]. Retrieved from https://www.youtube.com/watch?v=v5M7ohdZ6qA Derr, C. L. (2012). Ethics and leadership.Journal of Leadership, Accountability and Ethics,9(6), 66. Lekakos, G., Vlachos, P., Koritos, C. (2014). Green is good but is usability better? Consumer reactions to environmental initiatives in e-banking services.Ethics and Information Technology,16(2), 103-117. Rewagad, P., Pawar, Y. (2013). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Yazdani, N., Murad, H. S. (2015). Toward an ethical theory of organizing.Journal of Business Ethics,127(2), 399-417.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.