IT Ethics

   

Added on  2023-04-21

8 Pages1565 Words88 Views
Running head: IT ETHICS
IT Ethics
Name of the Student
Name of the University
Author’s Note:
IT Ethics_1
2
IT ETHICS
Table of Contents
Part 1: ACS Codes of Professional Conduct..............................................................................3
Part 2: Ethical Theory................................................................................................................5
References..................................................................................................................................8
IT Ethics_2
3
IT ETHICS
Part 1: ACS Codes of Professional Conduct
Question 1
Although, the first couple of weeks were smoother, however after that during a
normal test on the developed software, Faisal discovered a major security hole within the
database system of company Y by which hackers could easily gain confidential data
regarding the customers (Dewey 2016). However, when he told this to his manager, his
manager replied that it was not their headache as long as the organizational software
functions were working perfectly. This was one of the major ethical issue in the given case
study.
Question 2
As per an ethical point of view, this is absolutely unethical for the manager of
Company Z to suppress the news of security hole in the database system of company Y and
hence there is a high chance that the hackers could easily get into the database system and
obtain all types of confidential information or data (Peters 2015). Moreover, when Faisal
mentioned about this issue to his manager, he was reluctant and also mentioned to ensure that
their software functions are working perfectly. Faisal was hence in a significant dilemma that
whether he should obey or disobey his manager.
Question 3
The manager of Company Z and the security manager of Company Y are majorly
responsible for this type of action in the provided case study. At first, the security manager of
Company Y is responsible in this scenario since he or she did not consider or check the
security system and database system of the company and hence this kind of security hole has
taken place (Kagan 2018). Moreover, he or she has also taken any security precaution or
IT Ethics_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Ethics
|11
|3670
|241

Professional IT Practice and Ethics
|9
|2198
|83

Recognition of Moral Dimension
|4
|994
|412

Information Technology Ethics - Assignment
|18
|4955
|278

Professional Ethics in IT
|9
|1403
|367

Professional Issues in IT: Case Studies Analyzing Ethical Dilemmas in Organizations
|12
|1185
|157