logo

School of Computing and Mathematics - Assignment

4 Pages1443 Words28 Views
   

Added on  2021-04-19

School of Computing and Mathematics - Assignment

   Added on 2021-04-19

ShareRelated Documents
SCHOOL OF COMPUTING AND MATHS, CHARLES STURT UNIVERSITYEarly Launch`Assignment 1: Doing Ethics TechniqueYour NameStudent NumberWord Count: 900
School of Computing and Mathematics - Assignment_1
Title of you case study/scenarioITC506 Assessment Item 1- Marking SheetTotal Obtained Marks/100 & /15Q1. What's going on?The scenario here is that the CIO of the company wants the software to launch earlier than the deadline as per the order of CEO who wants to increase the opportunity of getting new projects by delivering the software a month earlier than the deadline. The CIO wants the software without any encryption and suggests that the encryption can be done after the product has been delivered via an over the air (OTA) update(Bell, 2016). The project manager said that the software is difficult tobe delivered within time. Skipping the encryption will lead to security vulnerability and the software can be hacked which will result in sensible data loss. The project director states that the chance of hacking is less and the team will get handsome bonus if the software gets delivered before deadline. Q2. What are the facts?The facts are that the software is difficult to deliver within a month earlier than deadline according to the senior developer. The CEO wants the software to be delivered to create a possibilityfor the company to get more projects in future. The CIO thinks that the encryption can be done later after the delivery of the software to the client. The senior developer and the project manager is aware about the fact that the suggestion of project director to skip encryption can lead the software vulnerable to hacking attempts and leakage of sensible data. Security of any software is one of the key factors of it to be stable and deliver the work to its users without any type of security threats(Bell, 2014). The process of skipping the encryption and later giving the the encryption via an Over The Air (OTA) update is also risky because the software can be hacked before the update.Q3. What are the issues?The issues here are that the CEO of the company wants the software to be delivered early which will pave way for new projects in future and also increase the fame of the company resulting in getting further projects. The CIO has asked the project director to skip the encryption of the software to deliver it early and also told about the handsome bonus if the software is delivered by the team earlier than the deadline. The senior developer though suggests that the encryption shouldnot be skipped and the product can not be delivered early (Harris Jr et al., 2013). The project mangeralso claims that there is risk of the software getting hacked. The project director though suggested toadd the encryption after the delivery via OTA. Q4. Who is affected?The client is affected here in long run if the encryption is skipped as the software can be hacked easily and which will leak the sensible data of the users. The reputation of the developer company will also be affected if the OTA is late and any security risk occurs within that timeframe. The whole project team will be affected if the software has security loopholes (Meine & Dunn, 2013). The CIO will also be affected if the team fails to meet the expectations of the CEO. The CEO will also be affected in long term if the software is delivered late and may lose the chance of getting new projects.Your Name
School of Computing and Mathematics - Assignment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COM ITC506 - Information Technology Ethics - Early Launch
|7
|2107
|68

TopICS IN IT ETHICS 1 TOPICS IN IT ETHICS Topics in IT Ethics Name of the University Author
|6
|1474
|250

Information Technology Ethics- Assignment
|6
|1373
|28

Early Launch Ethical Issue Identification
|6
|1383
|41

[PDF] Managing Ethical Dilemma
|5
|1260
|52

Information Technology Ethics
|7
|1323
|343