This paper explores the ethical considerations of monitoring employees' content in the workplace and the ethics of classification in a chosen organization. It also discusses the privacy and security breaches at Acxiom.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CASE STUDY AND ETHICAL CONSIDERATIONS CASE STUDY AND ETHICAL CONSIDERATIONS Name of the student Name of the university Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CASE STUDY AND ETHICAL CONSIDERATIONS Introduction The aim of this paper is to understand the issue of data protection and the importance of understandingcertainethicaldilemmas.Thisreportwillbehighlightingtheissueof classification model and the ethical considerations of the same. It has been further observed thatmatterofmonitoringtheactivitiesoftheemployeeswithinthecontextofthe organization has number of ethical issues. It is both from the perspective of the employee and the employer which is likely to be impacting the productivity issues. However what has been the central theme of discussion in the body of research in this paper is the viewpoint that ethical issues and dilemmas are one of the key issues of every workplace what is crucial here is to understand both of these perspectives in order to make the right decision at the right place. 1.0 Case Study – Prevention better than litigation? Monitoring of employee computer use: 1.1On the question of ethical considerations of monitoring the employee’s content in the workplace has been one of the most discussed and contentious issues of the academic debate. It is crucial to note that the use of the internet is indispensable for everyday use and it is also the gateway to distraction. Countries like U.S has highest number of employees distasted by the pornographic contentat the workplace. Over 30 to 40 % of the employees are engaged in all forms of non-work related activities(Wilding, 2017). In such situations, the issue of monitoring of the employees have becomes one of the recent practices. However on the question of maintain the basic ethical standards, the questions are raised for the such actions. It is important to note that it is acceptable to monitor the employees’ activities on the basis that there are number of risks associated with the
2CASE STUDY AND ETHICAL CONSIDERATIONS process of free access to the internet one hand,it is to ensure security and enhance productivityof the employees, such actions are permitted(Wilding, 2017). Form the point of view of the employer, it is justified on the ground that he or she is getting paid for remaining productive at work and for the company, it is not accepted to be engaged in other kindsof activities by side-lining the main activity(Ajunwa et al., 2017). Moreover the company is providing the required resources which cannot be utilised for fulfilling unethical activities at work.In addition to the use of the company’s resources, it is as important to maintain certain basis standards in order to maintain a healthy work culture where the employees are motivated and more driven to work than all other sectors(Sprague, 2018). It is not the duty of the management to remain ignorant about such behaviour occurring inside the organization. Hence it is to be argued that the employer keeps all the right to monitor such activity at the workplace. 1.2The obvious response of such issues is the dichotomous perspective of the employer and the employees. On one hand it is the ethical perspective ofthe employerand one the other, it is the opinion of the employees who is of the view that such monitoring is the breach of privacy of the individuals(Ford et al 2015). In order to avoid such issues, it has been important to develop a solute that is acceptable on both sides since it is the tussle between the legal and ethical considerations. The solution lies in the clear policy development for the company that adheres to the legal aspects of the employers and communicate these issues to the employees that they are the trusted employees of the company and there are certain standards that are to be respected(Ford et al., 2015). This solution will leave the employees with the message that employer is acting as the big bother; instead it is the partner in productivity. These solution will be helpful balancing and reconciling both side of the parties. Such solutions are crucial for the company due to the fact they are acceptable by the employer and the employee on the ground that there
3CASE STUDY AND ETHICAL CONSIDERATIONS are certain role for the employees to adhere, it is accepted to indulge in activities beyond the productive hours at the workplace, however it is not accepted inside the workplace which tries to promote a healthy work culture(Ajunwa et al., 2017). This solution should be based on the written contract of the company handed over to them at the initiation of the services attached with the list of steps to be undertaken in case of such breach. This will provide the employees a feeling of respect and trust towards their work which will act as the motivating factor for them(Ajunwa et al., 2017). 2.0 Case Study – The Ethics of Classification: 2.1 classification is one of the issues that has been used in every field of practice. Such classifications are made on the basis of age, sex, gender and marital status. However what is crucial here is to note attributes like weight, chronic illness and marital status are ethical so long it is used for the purpose of the respective authority and not shared with the any other organization. In case of increasing productivity of the organization, it is ethical to keep such data since it is used against their patients, however it is to be mentioned that such data are susceptible torisk and threat which makes it vulnerable(Elliot, 2016). However it is important to note that keeping such information of the patients might impact their risk of getting decimation and negative perception about them since they are subjected to number of social norms(Eshleman et al., 2017). Hence it is very crucial to develop the robust database on the basis of which trust can be ensured. Nonetheless it is important to understand the fact that keeping such data is always at higher risk. 2.2 in order to achievesimilar outcome forthe hospital,it will be using the following attributes in the context of the hospital: age , gender and case history and family background. The rationale of classifying people on the basis of their age and gender is due to the fact this
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CASE STUDY AND ETHICAL CONSIDERATIONS will enhance the process of bringing efficiency in work. In case of age and gender, it is crucial for the hospital to cater to the right patients in less time. In case the third category of classification, it is based onthe family background of the people since it is important to contact the relative and near ones in case of a serious issue(Song et al,. 2017). This process will include the marital status of the patients in order to make it easier for the hospital authority to find out the closest partners in case of emergency(Sprague, 2018). However this marital status cannot be used against them in any situation which might impact their treatment any possible ways. The rationale of keeping the case history of the patients is due to the fact that itwill make the process of functioning more efficient and smooth and less time consuming. 2.3 In case of an alternative model of classification, it can be adopted by developing the image processingandpattern recognition of thepatients since it is not necessary tokeep the physical data for the purpose of making the process efficient and smooth. It is important for the purpose due to the fact they are for the doctors to response in easier way. The rationale behind the choice of the pattern recognition ofthe patient is important for the purpose that it does not include the personal data of the patient which are in threat of being leaked(Song et al,. 2017).This alternative model is useful in deriving the data in case of requirement and it also has less tendency of getting leaker. Moreover such information’s are less susceptible to leak and threat of privacy breach(Elliot, 2016).Moreover the method of pattern screening and the image recognition is not susceptible to discrimination of the individuals since they are discriminatory like the previous modes of classification. It I important for the organization to develop the alternative system of registration in case of developing classification in the system. 2.4 In case of database of the hospital, it is necessary to develop the required protection and security for ensuring that their data is duel protected. It is crucial for the hospital to develop a
5CASE STUDY AND ETHICAL CONSIDERATIONS robust system of protection(Song et al,. 2017). It is important to develop the breach at the initial period in order to stop from such issues further escalating. In order to protect such data breach and ensure higher security, the hospital has to undertake the process of security audit for the purpose of creating protection of the same(Sprague, 2018).It is also important for the hospital administration to manage and maintain their recovery plan for the information of the patients and employees. In case of any breach, the aggrieved authority is to be communicated for ensuring that they are aware of such event(Elliot, 2016). Some of the ways of protecting the data are : instituting end security protectionand backing of the data in another database. It is also important to consider the fact that monitoring the behaviour of the employees insidethe system is equally important since in most of the cases, thedata breachis initiated at the inside level(Song et al,. 2017). The hospitals should also develop the habit of performing the regular vulnerability assessment of the threats and risk of privacy breach in order to understand the chances of such breach at a regular interval. 3.0 Case Study – Privacy and security breaches at Acxiom: 3.1 Since it has been observed that Acxiom is one of the largest information keeper for billions of consumers, thereare higher threats and vulnerabilities attached to this process. There have been previous cases of data theft and privacy breach which has been impacting the threat perception of the people(Sprague, 2018). However one of the feasible options for such cases is the adoptionof robust security system in place. It should start with the process heavy security and password for each user. Controlling the data sensible is the key to develop a robust structure of data protection(Lipman, 2017). In addition to these basic steps, it is important to develop a strong cryptography for the purpose of managing and protecting the information during transmission since it has been observed that highest percentage of information leak takes pace during the process of transmission and transfers(Souza et al.,
6CASE STUDY AND ETHICAL CONSIDERATIONS 2016). For this structure it is important to develop the proper configuration and setup.It is also important to monitor who are the potential and highest users ofthe system since it might also be possible that peoplewho are working inside aresusceptible to threat and vulnerabilities.This is only possible when there are strategic experts onthe other side to protect and prevent any probable data breach. 3. 2 considering the above mentioned case study, it has been observed that there are large numberof private sectorbodies whoare responsible for keepingthe large array of information of theconsumers(Khokhar et al., 2016). However these private bodies are ultimately operating under the broader umbrella of the government and in case of threat to the government, the threat perception of the private sector is equally involved. This makes the process of developing number of security layers by the private sectors. However in case of any threats generated at the international platform, it is primarily the government who are the representatives of the people and they are liable to answer. It is to be argued that it is ethical for the government to keep the data of the private sector(Wrightet al., 2017). 3.3 in addition to the government bodies responsible for protecting the data, there are organizations like the Research and analytic wing of the government of the criminal procedures management and the civil bodies who are responsible for managing the civil affairs of the citizens and most importantly the police forces should have access to the database in order to locate and find convicted individuals easily(Sprague, 2018). It is to be considered on the ground thatsuch bodes should have theaccess to such data due tothe fact that they are responsible for the protection of the citizens than any other civic bodies ad any form of threat is to be dealt with utmost care and concern. Conclusion
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CASE STUDY AND ETHICAL CONSIDERATIONS This paper has developed the understanding of the ethical nuances in the context of a chosen organization. It has been observed that in name of privacy protection and security assurance, employees are monitored in the workplace for their use of content. However the employer reserves the right to create such protocol that can create environment of interferences in the work of the employees. In case of the hospital, keeping of database having the classification model based on the categorisation of the individual also suffers from the ethical dilemmas however it is not to deny that there is no ethical breach. Lastly, it has discussed about the privacy of the individual when there is a leak of information for the organization that are responsible for maintaining these database. Hence this paper made an analysing the ethical issues of the different context in order to understand the different aspects of the same.
8CASE STUDY AND ETHICAL CONSIDERATIONS Reference Ajunwa, I., Crawford, K., & Schultz, J. (2017). Limitless worker surveillance.Calif. L. Rev.,105, 735. Elliot, D. (2016). The Turn to Classification in Virtue Ethics: A Review Essay. Eshleman, M. C., James, S. M., Jankovic, V., Kaeslin, I., Keogh, G., Midson, S., ... & Vaccarezza, M. S. (2017).The Ethics of Nature and the Nature of Ethics. Lexington Books. Ford, J., Willey, L., White, B. J., & Domagalski, T. (2015). New Concerns in Electronic Employee Monitoring: Have You Checked Your Policies Lately?.Journal of Legal, Ethical and Regulatory Issues,18(1), 51. Khokhar, R. H., Fung, B. C., Iqbal, F., Alhadidi, D., & Bentahar, J. (2016). Privacy- preserving data mashup model for trading person-specific information.Electronic Commerce Research and Applications,17, 19-37. Lipman, R. (2015). Online privacy and the invisible market for our data.Penn St. L. Rev.,120, 777. Song, Y. Y., & Ying, L. U. (2015). Decision tree methods: applications for classification and prediction.Shanghai archives of psychiatry,27(2), 130. Souza, R., & Patil, C. (2016). Big Data Integration, Privacy, and Security.The Human Element of Big Data: Issues, Analytics, and Performance, 195.
9CASE STUDY AND ETHICAL CONSIDERATIONS Sprague, R. (2018). Survey of (Mostly Outdated and Often Ineffective) Laws Affecting Work-Related Monitoring.Chi.-Kent L. Rev.,93, 221. Tsesis, A. (2019). Data Subjects' Privacy Rights: Regulation of Personal Data Retention and Erasure.University of Colorado Law Review,90. Wilding, E. (2017).Information risk and security: preventing and investigating workplace computer crime. Routledge. Wright, S. A., & Xie, G. X. (2017). Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations.Journal of Business Ethics, 1-18.