Table of Contents Introduction......................................................................................................................................1 Ethical dilemma..........................................................................................................................1 Analysis of ethical dilemma from perspective of ACS Code of professional conduct...............2 Recommendation.........................................................................................................................3 Conclusion.......................................................................................................................................3 References........................................................................................................................................5
Introduction (1500) Ethical dilemma refers to decision-making problem which arises in between probable two moral imperatives neither of which is unambiguously preferable or acceptable. The complexity takes place due to situational conflicts in those situation that results within breaching another (Nyman and Burke, 2016). This report is based Ken an ICT Professional (Information and Communications Technology) faced an ethical dilemma. As per this case, due to certain reasons Ken cannot go online on certain day as it will lead to breach but they went online. This document includescertain ethicaldilemma's withrespecttoKen andalsoperspectivesfromACS (Australian Computer Society) code of ethics are taken into consideration. Ethical dilemma With respect to this case, Ken was a Information and Communications Technology Professional, due to some reasons they were not able to be 'live' on coming “Monday” as it will lead to breach. But they went live which lead to ethical dilemma. A condition or a problem in which decision-making process in between two assert-able options and neither of them is appropriate with respect to ethical orientation is referred toethical dilemma or paradox. In this case the two conditions were either they go online or not. But both of these conditions were not accountable in ethics. The major cause for this has been illustrated below with respect to both the situations. I.The first condition is that, they can go live but systems were not tested. II.The other situation was they cannot go live as privacy of their clients will get vulnerable Neither of conditions are apt as in both the ethics are breached. Suppose if first condition is taken into consideration then it means there can be any kind interruption in the session like a third person can get into a network and interrupt entire session (Browning,2016). There is also a possibility that an intruder may replace the voice of Ken with their to misguide the people. On the other hand, if they do not go live then it will lead their clients to dissatisfied with Ken and may not opt for services that are provided by them in future. Both of these conditions will not give appropriate results. But still then Ken decides to go live and address their clients. In such kind of situations, ethics have to be considered. Generally, ethics denotes difference among what is right to do and what is not. It is a thin line which guides individual to analyse their steps with respect to deontologism, consequentialism and virtuousness. Ethics of 1
Ken made them to go live for dealing with queries or provide them with new sessions in this context to their clients. But as per their seniors Ken have to face certain repercussions due to this. Analysis of ethical dilemma from perspective of ACS Code of professional conduct. ICT Professional, Ken was live even after having discussions with their seniors. The reason behind of not going live is that it will lead to breach in policies of their firm as the systemswerenottestedaccordingly.Tounderstandthisaninstancecanbetakeninto consideration like Ken has gone online as systems are untested it can have various issues. Like if they were having confidential meeting with their clients then suppose third person gets into a network then there security will be breached, the purpose of meeting will not be met (Balch and Balabanova, 2016). If this was not the condition, lets says a general session was to be carried out like giving training to their employees with respect to certain issues such as security is discussed then when third person have access to this then they will have an insight into these issues which denotes that the same information can be used for some illegal purpose. Another example can be taken, Ken is teaching new employees about security and understanding of how to recognise if third person is having access to your system. Then intruder can make use of this information and can opt for alternative method for entering into a device by which they cannot be caught. These examples denote that opting for going live was not an ethical method. On the other hand, if Ken do not go online then people who were waiting for this session will have certain issues. For an instance, if someone has postponed their schedule for this session and it do not happened then it will lead them to waste their time & also through this, they will not opt for having sessions with them in future. As per ACS Code of Ethics, there is need to honour as well as uphold dignity and effectualness related with being professional. According to this, there is need for members to stay on by code of ethics (Pope,2016). It is the responsibility of Ken to follow this being a member of Information and Communication Technology. This comprises of basically six core ethical values that are associated with professional conduct. The ACS society needs to comply to these values as an act of responsibility as well as integrity within entire professional dealings. Ken belongs to ICT industry that is rapidly growing and is vulnerable to various attacks as well as breach within security policies. It is mandatory that employees needs to abide to professional standardsforimprovisationaswellasenhancementswithinimageofindustry.Asper professionalism perspective Ken was supposed to following steps: 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Remain knowledgeable, informed engaged with respect to professional work and take respective actions with respect to those who do not comply to them. Cooperate within advancement in ICT through communication with other professionals or public rather than leading to breach within security. With respect to professional development, Ken was supposed to remain updated with respect to certain standards, practices as well as technologies with respect to field in which they are carrying out their operations. For an instance, if Ken possess knowledge with respect to technology and breach which are possible with respect to live session then they would not have taken such steps which can lead them to leak of information which is furnished by clients on the other side as well as given by Ken. In addition to this awareness must be provided with respect to issues that leads to creation of adverse impact on organisation on the whole (Robinson,2016). In context of competence, Ken should not have undertaken the responsibility of this live session if they are not competent to perform and also if they have undertaken this then they (Ken) needs to have an appropriate guidance by their seniors or expertise with respect to what can be done. It is not possible to acknowledge all the aspects of ICT but as an professional it is necessary to possess additional information as well as expertise. Along with this, Ken needs to attempt to render services as well as products that will be able to match financial as well as operational needs of their clients or stakeholders. Along with this, they need to be aware with significant legislations as well as standards and have to carry out their operations accordingly. Australian Computer Security (ACS), individuals are not supposed to breach public trust or of stakeholders. Ken needs to have utmost integrity as well as honesty with respect to decisions and actions that are undertaken by them. In addition to this, Ken have to be realistic with respect to project which is be carried out through them. It also includes enhancement within quality of life to understand perceptions with respect to work and enhance competence. Along with this, public interest must also be considered with respect to what is the influence of any specific step. Recommendation From above it has been very evident that Ken has followed code of conduct as per ACS. They were supposed to follow those regulations to have better results. Suppose, in this case Ken needs to abide to regulations but due to ethical dilemma it lead to consequences like their was breach within security. It is recommended that all the aspects must be taken into consideration with 3
respect to code of conduct. With respect to this, security of systems as well as entire network must be taken into consideration before going online. It is essential to test the systems before any step is being taken by them. Conclusion It is observed that ethical paradox refers to condition in between two situations which will lead to decision-making with respect to ethical consideration. In addition to this, individuals must comply to code of conduct while furnishing their services as it will assist them to carry out their roles in an appropriate manner and without any harm to any individuals who are involved in project. 4
References Books and journals Balch, A., & Balabanova, E. (2016). Ethics, politics and migration: Public debates on the free movement of Romanians and Bulgarians in the UK, 2006–2013.Politics,36(1), 19-35. Browning, C. S. (2016). Ethics and ontological security.Ethical security studies: A new research agenda, 160-73. Nyman, J., & Burke, A. (Eds.). (2016).Ethical security studies: A new research agenda. Routledge. Pope, K. S. (2016). The code not taken: The path from guild ethics to torture and our continuing choices.Canadian Psychology/Psychologie canadienne,57(1), 51. Robinson,F.(2016).Feministcareethicsandeverydayinsecurities.InEthicalSecurity Studies(pp. 116-130). Routledge. 5