logo

Information Technology Ethics

   

Added on  2020-05-16

11 Pages3670 Words241 Views
1Information Technology Ethics
Information Technology Ethics_1
2ContentsInformation Technology Ethics..................................................................................................1PART 1:.....................................................................................................................................2Case Study 1.......................................................................................................................2Case Study 2:......................................................................................................................3Case Study 3:......................................................................................................................5Question 2...............................................................................................................................6PART 2.......................................................................................................................................7i...........................................................................................................................................7ii..........................................................................................................................................8iii.........................................................................................................................................8References................................................................................................................................10
Information Technology Ethics_2
3PART 1:Question 1Case Study 1 Company X has just signed a business agreement with Company Y, which entitles both of them to access each other clients’ records. Mr. Faisal, a softwareprogrammer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company’s database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated. Several weeks later and during a normal test on the software developed, Faisal discovered a serious ‘security hole’ in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in Company Y’s database system could not be trusted as the security hole posed a threat even on Company X’s database system. Faisal told his manager about the problem and explained its significance. The manager's response was, "That's not our problem; let's just be sure that our software functions properly." Faisal is not sure what to do. Refusing to work on the project means disobeying his manager’s orders. Continuing to work on the project, means disobeying one of God’s commands, this requires him to be truthful and sincere in his dealings.Q1. What's going on? The company X is in a business agreement with company Y. The database of company Y contains a security hole due to which it is also affecting the database of company Y. The manager is not listening to the software programmer. He just wants his software to function properly. The software programmer is in dilemma of working on the project. Q2. What are the facts? By testing it was concluded that the database system of company Y has a security hole and it will definitely affect the database system of company Y. Faisal cannot refuse the project because it will be against his manager’s order and while continuing the project he will be disobeying the God’s commands. Q3. What are the issues (non-ethical)? The issues are that the database system of Y has security hole, the manager is not listening, and the software programmer do not want to disobey his manager’s as well as God’s commands.Q4. Who is affected?
Information Technology Ethics_3
4All the three companies i.e. X, Y, and Z is affected. The software programmer is also affected.Q5. What are the ethical issues and implications? It is unethical and wrong code of conduct if company Z do not tell company X that their database is getting affected because of company Y. Company Y should also know about its database. Apart from this, if company Z only think about its business growth at the cost of others business it is against the ethical code of conducts.Q6. What can be done about it? The company Z should acknowledge company X and Y about the security threats and poles.Q7. What are the options? One of the options is to check the database of company Y and analyse the security pole and correct it. Other option is to break the agreement between company X and company Y. Q8. Which option is best - and why?The best option is to analyse company Y’s database system and correct the security poles so that they do not affect the functionality of the software.Case Study 2: In April 2014, Donald Sterling, then owner of the National Basketball Association (NBA)’s San Diego Clippers, was accused of making racist remarks about African Americans. It turns out that Sterling’s then (girl) friend, V. Stiviano, had recorded those remarks on an electronic device and then later decided to make them available to a wider audience. This incident received extensive media coverage in the United States and beyond. Many people were appalled by Sterling’s remarks, and some also pointed out the irony in this incident, given that the majority of the players on his basketball team (who werelargely responsible for generating income for Sterling) were African Americans.Shortly following the fallout from this controversy, Sterling was forced by the NBA to sell his team to a new owner. While most people agreed that Sterling should resign and be required to relinquish his NBA franchise, some were nevertheless troubled by the manner in which his remarks, which were made in confidence to a close friend, were secretly recorded via a digital device and then(eventually) made available to the public. The practice of secretly recording someone’s private conversations is not exactly new; after all, law enforcement authorities have used “wiring” devices to trap suspected criminals into disclosing information that can lead to their arrests. But the idea that ordinary people, especially those in intimate relationships, can now so easily record conversations in deceptive ways via their tiny digital devices can seem chilling.
Information Technology Ethics_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Ethics
|8
|1565
|88

Professional IT Practice and Ethics
|9
|2198
|83

Information Technology Ethics - Assignment
|18
|4955
|278

Information Technology Ethical Issues : Assignment
|8
|2026
|109

Early Launch of System Computer Computing and Maths
|6
|2313
|217

project manager Assignment PDF
|7
|2136
|77