This report analyzes the ethical dilemma in Scenario 3: Early Launch video and applies the ACS code of ethics to find a potential solution. The video raises the issue of sacrificing software security for personal and professional gain, violating the principles of the ACS code of ethics.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
0 Topics in IT Ethics Scenario 3: Early Launch
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Introduction...............................................................................................................................2 Background................................................................................................................................3 ACS Code of Ethics......................................................................................................................3 Ethical Dilemma.........................................................................................................................4 Recommendation.......................................................................................................................5 Conclusion..................................................................................................................................6 References..................................................................................................................................7 1
Introduction The importance of business ethics has increased substantially on a global stage as the number of cases relating to illegal practices by companies and professionals increased (Floyd, Xu, Atkins & Caldwell, 2013). The Australian Computer Society (ACS) has provided Code of Ethics which ICT professional have to comply to act with integrity and responsibility in professional dealing (ACS, 2014). In this report, “Scenario 3: Early Launch” video will be analysed to understand the key ethical dilemma which is raised in this video. ACS code of ethics will be applied in the scenario to understand the ethical issue and find a potential solution to the problem. 2
Background In this video, the project director suggests to the project manager that the CIO wanted to deliver the software one month early before the deadline in order to make sure that the client is happy (Al-Saggaf, 2016). The project director suggested that they should save time on the delivery of the software by delivering it without encryption. Based on this suggestion, the project manager provides that according to the team, without encryption the software will be vulnerable towards cyber-attacks. The project director also provides that the project manager along with all his team members will earn bonuses if they agree to deliver the software without encryption (Al-Saggaf, 2016). ACS Code of Ethics ACS code of ethics provides various guidelines which professionals have to follow to ensure that they maintain integrity and respect towards their profession. Following are the key principles of the ACS code of ethics (ACS, 2014). The primacy of the public interest It is a duty of ICT professionals that they must give primacy to the public above their personal or business interests. The enhancement of quality of life ICT professionals have to strive in order to improve the quality of life of those who are affected by their work. Honesty It is a key trait of professionals which they must demonstrate through their skills, knowledge, products and services (Reynolds, 2018). Competence ICT professionals must act competently and diligently to protect the interest of their stakeholders. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Professional development ICT professionals must develop themselves and their staff on a professional level (ACS, 2014). Professionalism ICT professionals must act in a specific way to enhance integrity and respect of ACS and its members. Ethical Dilemma Based on the evaluation of the ACS code of ethics, the key ethical dilemma which is raised in the video can be evaluated. The ethical issue is that the CIO and project director of the company is deliberately trying to sacrifice the security of the software in order to receive a personal and professional advantage. They failed to comply with the first principle of ACS code of ethics which require them to give primacy to the public interest. Encryption enables companies to convert their information into a secret code which is only accessible through a specific key which protects their data from unauthorised access (Arora, Parashar & Transforming, 2013). Since the CIO and project director wanted to avoid encryption, it will increase the vulnerability of data of people who use the software. The CIO and the project director are giving more priority to their personal and business interest rather than ensuring that they do everything which they can to protect the interest of the public (Al-Saggaf, Burmeister & Weckert, 2015). Moreover, they are not honest while dealing with the client because they promised them to deliver secured software which they are not doing by sending it without encryption. For personal gains, they are willing to risk the business and market reputation of the client that could face substantial loss if the data of their users is compromised. This decision also shows the failure of the parties to act in a professional manner since their actions will not enhance integrity and respect of ACS and its members (Bernoth, Dietsch, Burmeister & Schwartz, 2014). People are less likely to believe in the integrity of ICT professionals if their data is violated due to lack of security infrastructure. Therefore, the third ending of the video is the best ethical option in this scenario in which the project director should listen to the team to ensure that the software is secured from cyber-attacks. 4
Recommendation As per the facts of this case, it is recommended that the management of the company should comply with the ACS code of ethics by delivering the software with encryption. They should give primacy to the public interest by ensuring that the software is secured to use and its users' data will not be vulnerable towards cyber-attacks. This will ensure that the data is protected from hacking and unauthorised access which will protect the interest of the client and the public. The project director and the project manager should be honest with the client, and they should clearly tell them that they might need more time to ensure the security of the software. Therefore, the third video ending is the right choice in this scenario which will ensure that parties act in a professional manner by ensuring that they did not adversely affect the integrity and respect of ACS and its members. 5
Conclusion To conclude, it is important that professionals must comply with the code of ethics to ensure that they discharge their duties in an ethical manner. In this video, the ethical dilemma which is raised is that the CIO and the project director wanted to deliver the software to the client one month earlier without encryption which will increase the risk of cyber-attack and data breach. This decision will violate provisions of ACS code of ethics since thecompanydidnotgiveprimacytothepublicinterest, behonestandmaintain professionalism in their work. Therefore, it is recommended that they should avoid risking the security of the software by avoiding encryption. They should ensure that the software is secured to protect the data of its users while complying with the provisions of the ACS code of ethics. 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References ACS. (2014).ACS Code of Professional Conduct Professional Standards Board Australian Computer Society. Retrieved from https://www.acs.org.au/content/dam/acs/rules- and-regulations/Code-of-Professional-Conduct_v2.1.pdf Al-Saggaf, Y. (2016, October 31).Scenario 3: Early Launch.[Video File]. Retrieved from https://www.youtube.com/watch?v=v5M7ohdZ6qA Al-Saggaf, Y., Burmeister, O., & Weckert, J. (2015). Reasons behind unethical behaviour in the Australian ICT workplace: An empirical investigation.Journal of Information, Communication and Ethics in Society,13(3/4), 235-255. Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing usingencryptionalgorithms.Internationaljournalofengineeringresearchand applications,3(4), 1922-1926. Bernoth, M., Dietsch, E., Burmeister, O. K., & Schwartz, M. (2014). Information management inagedcare:casesofconfidentialityandelderabuse.JournalofBusiness Ethics,122(3), 453-460. Floyd, L. A., Xu, F., Atkins, R., & Caldwell, C. (2013). Ethical outcomes and business ethics: Toward improving business ethics education.Journal of business ethics,117(4), 753- 776. Reynolds, G. (2018).Ethics in Information Technology. Boston: Cengage Learning. 7