ACS Code of Professional Conduct: Ethical Dilemmas in ICT
VerifiedAdded on 2025/06/23
|10
|1850
|456
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

ASSESSMENT ITEM 2 - ACS CODE OF
PROFESSIONAL CONDUCT
1
PROFESSIONAL CONDUCT
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
Introduction......................................................................................................................................3
Ethical dilemmas.........................................................................................................................4
Analysis of ethical dilemmas.......................................................................................................5
Recommendations........................................................................................................................6
Conclusion.......................................................................................................................................8
Reference.........................................................................................................................................9
2
Introduction......................................................................................................................................3
Ethical dilemmas.........................................................................................................................4
Analysis of ethical dilemmas.......................................................................................................5
Recommendations........................................................................................................................6
Conclusion.......................................................................................................................................8
Reference.........................................................................................................................................9
2

Introduction
In the contemporary scenario, Information and Communication Technology (ICT) in businesses
have gained significant pace. With the ICT it focuses on using the advanced tools that enhances
the communication activities among management and employees to manage the operations
effectively. As per the view of Thomas et al. (2018), use of ICT also result in attaining the
ethical problems and dilemmas that lead to unethical conduct. The report will focuses on the
provided case scenario of Ken and ethical dilemmas that affect their decision making. Along
with measuring the consequences of different actions that are taken by an ICT professional i.e.
Australian Computer Society Code of Professional Conduct.
3
In the contemporary scenario, Information and Communication Technology (ICT) in businesses
have gained significant pace. With the ICT it focuses on using the advanced tools that enhances
the communication activities among management and employees to manage the operations
effectively. As per the view of Thomas et al. (2018), use of ICT also result in attaining the
ethical problems and dilemmas that lead to unethical conduct. The report will focuses on the
provided case scenario of Ken and ethical dilemmas that affect their decision making. Along
with measuring the consequences of different actions that are taken by an ICT professional i.e.
Australian Computer Society Code of Professional Conduct.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Ethical dilemmas
In order to successfully implement the ICT system in the business individual faces ethical
dilemmas regarding to execute the system or not. The key ethical issues related with ICT are
privacy, accessibility and accuracy that needed to be maintained by employees. Privacy deals
with the safeguarding measures that are provided by the organization to be kept throughout the
service so that it may not lead to corrupt the data or information (Huda, 2019). On the other
hand, accessibility facilitate an overview regarding the users those who have access to the
information. Therefore, above are the key codes and factors that needed to be taken into
consideration to ensure performance of the ethical practices.
With the help of assessing the scenario it has been identified that ICT professional Ken has
developed the system for the client but the management has directed Ken to go live with the
untested system on the upcoming Monday. In this situation, Ken has told management personnel
that system is un-testified and might lead to raise the issue that will hamper the privacy of
confidential and private data (Bustard, 2018). With seeing the consequences of action
management has forcefully permit Ken to go live with the system.
In this situation Ken has faced ethical dilemma of going live with the system or not because the
system was un-testified and might lead to negative impact the client business activities. On the
other hand, untested system also leads to the attack of bug that might corrupt the system and
indulges in performing unethical activities. Along with this, Ken has also face dilemma
associated with accuracy that who will be alleged liable in the circumstance if system lead to
raise the errors (Rogerson et al. 2019). Thus, these are the two ethical dilemmas involved in this
case that needed to be overcome so that Ken may perform effective activities.
4
In order to successfully implement the ICT system in the business individual faces ethical
dilemmas regarding to execute the system or not. The key ethical issues related with ICT are
privacy, accessibility and accuracy that needed to be maintained by employees. Privacy deals
with the safeguarding measures that are provided by the organization to be kept throughout the
service so that it may not lead to corrupt the data or information (Huda, 2019). On the other
hand, accessibility facilitate an overview regarding the users those who have access to the
information. Therefore, above are the key codes and factors that needed to be taken into
consideration to ensure performance of the ethical practices.
With the help of assessing the scenario it has been identified that ICT professional Ken has
developed the system for the client but the management has directed Ken to go live with the
untested system on the upcoming Monday. In this situation, Ken has told management personnel
that system is un-testified and might lead to raise the issue that will hamper the privacy of
confidential and private data (Bustard, 2018). With seeing the consequences of action
management has forcefully permit Ken to go live with the system.
In this situation Ken has faced ethical dilemma of going live with the system or not because the
system was un-testified and might lead to negative impact the client business activities. On the
other hand, untested system also leads to the attack of bug that might corrupt the system and
indulges in performing unethical activities. Along with this, Ken has also face dilemma
associated with accuracy that who will be alleged liable in the circumstance if system lead to
raise the errors (Rogerson et al. 2019). Thus, these are the two ethical dilemmas involved in this
case that needed to be overcome so that Ken may perform effective activities.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Analysis of ethical dilemmas
From the above identification of ethical dilemmas it has been analyzed that these dilemmas has
permitted Ken to engage in unethical practice i.e. live implementation of system by the client
that has resulted in occurring key issues and errors (Poulsen, 2018). Privacy is undoubtedly one
of the utmost ethical problems that have resulted with the dilemmas. This problem is not
restricted to one problem somewhat it contracts with all of the personnel of the organization
along with the clients with whom organization are in contract with. It mainly ensues in the ICT
organization as privacy would be on the priority list.
Through reviewing the action of Ken it has been analyzed that he was unaware regarding level of
accountability i.e. to which he should report in such situation so that issues may not arise in the
setting (Lang et al. 2018). However, in this situation organization has not followed the Australian
Computer Society Code of Professional Conduct where professional development practices have
not been incorporated. The code of professional development increases the responsiveness of
issues distressing the profession and its association with the public so that professional may not
undertake the ineffective practices. Apart from this, code of conduct also emphasis on supporting
the education, training the professional so that they may develop the skills and competency
associated with ICT in order to attain the various career paths.
On the other hand, professionalism was not shown by Ken because the project was released to
the public i.e. client without being completed i.e. tested (Scalabrino et al. 2019). This practice
clearly showcases that the work was not executed in the professional manner by the ICT
organization.
From the analysis of ethical dilemmas and action undertaken by the ICT professional it has been
stated that the work done in the ICT organization is not accordant with the proper quality that
often result in arising the situation of issues and bugs (Ludi et al. 2018). In order to maintain the
quality organization would have engages in taking some time for conducting the proper testing
so that professional amends the complications. It has been assessed that there could be raise in
problems i.e. privacy ethical issue in the situation if the developed system is released to the
public without proper inspection.
Along with this, it has been also analyzed that considering the actions of ICT professional Ken it
has led to negative affect on the performance of client organization or public because without
being tested the system was live and used by the organization (Richardson, 2018).
5
From the above identification of ethical dilemmas it has been analyzed that these dilemmas has
permitted Ken to engage in unethical practice i.e. live implementation of system by the client
that has resulted in occurring key issues and errors (Poulsen, 2018). Privacy is undoubtedly one
of the utmost ethical problems that have resulted with the dilemmas. This problem is not
restricted to one problem somewhat it contracts with all of the personnel of the organization
along with the clients with whom organization are in contract with. It mainly ensues in the ICT
organization as privacy would be on the priority list.
Through reviewing the action of Ken it has been analyzed that he was unaware regarding level of
accountability i.e. to which he should report in such situation so that issues may not arise in the
setting (Lang et al. 2018). However, in this situation organization has not followed the Australian
Computer Society Code of Professional Conduct where professional development practices have
not been incorporated. The code of professional development increases the responsiveness of
issues distressing the profession and its association with the public so that professional may not
undertake the ineffective practices. Apart from this, code of conduct also emphasis on supporting
the education, training the professional so that they may develop the skills and competency
associated with ICT in order to attain the various career paths.
On the other hand, professionalism was not shown by Ken because the project was released to
the public i.e. client without being completed i.e. tested (Scalabrino et al. 2019). This practice
clearly showcases that the work was not executed in the professional manner by the ICT
organization.
From the analysis of ethical dilemmas and action undertaken by the ICT professional it has been
stated that the work done in the ICT organization is not accordant with the proper quality that
often result in arising the situation of issues and bugs (Ludi et al. 2018). In order to maintain the
quality organization would have engages in taking some time for conducting the proper testing
so that professional amends the complications. It has been assessed that there could be raise in
problems i.e. privacy ethical issue in the situation if the developed system is released to the
public without proper inspection.
Along with this, it has been also analyzed that considering the actions of ICT professional Ken it
has led to negative affect on the performance of client organization or public because without
being tested the system was live and used by the organization (Richardson, 2018).
5

Recommendations
There are certain recommendations that must be implemented by the ICT organization for
overcoming the ethical problems that often arises within the setting. The main problem that was
elevated in the case was that the project of developing system was completed on time but there
were some complications that have not resulted in testing the system. Thus, in this case there was
stress on Ken to unveil the project to the client or public without testing the quality and
performance of system. Hence, client or public faces the problem associated with the privacy and
security of the data and information.
In regard with overcoming the above problem it has been recommended that organization should
ask the client or purchaser to more time so that appropriate testing of the IT system can be done
with overcoming the existing gap and loop holes in the system. Along with this, it also
recommended that the organization should also include the discount rate to their client in place
of presenting the late project.
Another solution to the ethical dilemma would be that each and every employee should come to
know about their level of responsibility and accountability accordant with the job role so that
they may take effective decision. With the help of undertaking this recommendation it would
make sure that individual has engage in performing proper activities without indulging in
inappropriate or misuse of the activities.
Moreover, it has been also recommended that the ICT organization would have embraced the
Australian Computer Society (ACS) Code of Ethics in their practices so that they may indulge in
performing ethical activities. ACS codes are as follows-
Primacy of Public Interest
The key value of is associated with keeping public interest on the priority level with
safeguarding their interest level. Through providing the interested product i.e. IT system
professional would showcase their duty and loyalty towards the public.
Enhancement of Quality
Another code of ethic emphasis on enhancement of quality of the ICT system so that data may be
accessible by the members or staffs of the client organization.
Honesty
Another code of ethics in ACS is associated with honesty that includes ICT professionals are
required to maintain the level of honesty by not breaching the public trust and provide them
6
There are certain recommendations that must be implemented by the ICT organization for
overcoming the ethical problems that often arises within the setting. The main problem that was
elevated in the case was that the project of developing system was completed on time but there
were some complications that have not resulted in testing the system. Thus, in this case there was
stress on Ken to unveil the project to the client or public without testing the quality and
performance of system. Hence, client or public faces the problem associated with the privacy and
security of the data and information.
In regard with overcoming the above problem it has been recommended that organization should
ask the client or purchaser to more time so that appropriate testing of the IT system can be done
with overcoming the existing gap and loop holes in the system. Along with this, it also
recommended that the organization should also include the discount rate to their client in place
of presenting the late project.
Another solution to the ethical dilemma would be that each and every employee should come to
know about their level of responsibility and accountability accordant with the job role so that
they may take effective decision. With the help of undertaking this recommendation it would
make sure that individual has engage in performing proper activities without indulging in
inappropriate or misuse of the activities.
Moreover, it has been also recommended that the ICT organization would have embraced the
Australian Computer Society (ACS) Code of Ethics in their practices so that they may indulge in
performing ethical activities. ACS codes are as follows-
Primacy of Public Interest
The key value of is associated with keeping public interest on the priority level with
safeguarding their interest level. Through providing the interested product i.e. IT system
professional would showcase their duty and loyalty towards the public.
Enhancement of Quality
Another code of ethic emphasis on enhancement of quality of the ICT system so that data may be
accessible by the members or staffs of the client organization.
Honesty
Another code of ethics in ACS is associated with honesty that includes ICT professionals are
required to maintain the level of honesty by not breaching the public trust and provide them
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

adequate IT system. Through reviewing the case, honesty was not maintained by the
management. Thus, it is required that manager of Ken should have told the client regarding the
system that it is not testified by professional to overcome the serious problem that should result
in postponed of the released date.
Competence
Competence is another ethical code that ensures proper completion of work accordant with the
requirement of stakeholder. However, this value will focuses on endeavoring towards providing
the products and services that matches the operational and financial requirements of the
stakeholders and clients.
Professional Development
In order to maintain the computer security another code of ethic is associated with professional
development that ensure amending or enhancing the hard-won knowledge and experience in their
present work activities (Australian Computer Society, 2014). The successful implementation of
this value will encourage and boost the employees’ morale to continue their own professional
development to attain the career goal.
Professionalism
The last code of ethics of ACS ensures that endeavor towards improving the public assurance in
the ICT industry. It is authoritative for the organization to maintain professional standards in
their workplace so that they can easily manage the business activities. In accordant with this
value management would ensure taking appropriate action contrary to the activities of members
those who engage in performing unethical or improper behaviors within the setting.
7
management. Thus, it is required that manager of Ken should have told the client regarding the
system that it is not testified by professional to overcome the serious problem that should result
in postponed of the released date.
Competence
Competence is another ethical code that ensures proper completion of work accordant with the
requirement of stakeholder. However, this value will focuses on endeavoring towards providing
the products and services that matches the operational and financial requirements of the
stakeholders and clients.
Professional Development
In order to maintain the computer security another code of ethic is associated with professional
development that ensure amending or enhancing the hard-won knowledge and experience in their
present work activities (Australian Computer Society, 2014). The successful implementation of
this value will encourage and boost the employees’ morale to continue their own professional
development to attain the career goal.
Professionalism
The last code of ethics of ACS ensures that endeavor towards improving the public assurance in
the ICT industry. It is authoritative for the organization to maintain professional standards in
their workplace so that they can easily manage the business activities. In accordant with this
value management would ensure taking appropriate action contrary to the activities of members
those who engage in performing unethical or improper behaviors within the setting.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Conclusion
From the above report it has been concluded that for maintaining the level of computer security it
is required by organization to emphasis on implementing the code of practices of Australian
Computer Society. With the implementation of code of practices it would allow the organization
to overcome the ethical issues and problems faced by the ICT professional. However, it has been
further stated that ethical issues are regarded as crucial problems that befall in the organization
and required to be solved quickly to overcome the situation of threat.
8
From the above report it has been concluded that for maintaining the level of computer security it
is required by organization to emphasis on implementing the code of practices of Australian
Computer Society. With the implementation of code of practices it would allow the organization
to overcome the ethical issues and problems faced by the ICT professional. However, it has been
further stated that ethical issues are regarded as crucial problems that befall in the organization
and required to be solved quickly to overcome the situation of threat.
8

Reference
Australian Computer Society, (2014). ACS Code of Professional Conduct Professional
Standards Board Australian Computer Society. [Online]. Available through: <
https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-
Conduct_v2.1.pdf >. [Accessed 14th August 2019].
Bustard, J. D. (2018). Improving Student Engagement in the Study of Professional Ethics:
Concepts and an Example in Cyber Security. Science and engineering ethics, 24(2), 683-
698.
Huda, M. (2019). Empowering application strategy in the technology adoption: insights from
professional and ethical engagement. Journal of Science and Technology Policy
Management, 10(1), 172-192.
Lang, C., Macfadyen, L. P., Slade, S., Prinsloo, P., & Sclater, N. (2018, March). The
complexities of developing a personal code of ethics for learning analytics practitioners:
Implications for institutions and the field. In Proceedings of the 8th international
conference on learning analytics and knowledge(pp. 436-440). ACM.
Ludi, S., Huenerfauth, M., Hanson, V., Rajendra Palan, N., & Garcia, P. (2018, February).
Teaching inclusive thinking to undergraduate students in computing programs.
In Proceedings of the 49th ACM Technical Symposium on Computer Science
Education (pp. 717-722). ACM.
Poulsen, A. (2018). A post publication review of “Threats to autonomy from emerging
ICTs. Australasian Journal of Information Systems, 22.
Richardson, L. J. (2018). Ethical challenges in digital public archaeology. Journal of Computer
Applications in Archaeology, 1(1), 64-73.
Rogerson, S., Miller, K. W., Winter, J. S., & Larson, D. (2019). Information systems ethics–
challenges and opportunities. Journal of Information, Communication and Ethics in
Society, 17(1), 87-97.
Scalabrino, S., Bavota, G., Vendome, C., Poshyvanyk, D., & Oliveto, R. (2019). Automatically
assessing code understandability. IEEE Transactions on Software Engineering.
Thomas, G., Burmeister, O., & Low, G. (2018). Issues of Implied Trust in Ethical
Hacking. ORBIT Journal, 2(1).
9
Australian Computer Society, (2014). ACS Code of Professional Conduct Professional
Standards Board Australian Computer Society. [Online]. Available through: <
https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-
Conduct_v2.1.pdf >. [Accessed 14th August 2019].
Bustard, J. D. (2018). Improving Student Engagement in the Study of Professional Ethics:
Concepts and an Example in Cyber Security. Science and engineering ethics, 24(2), 683-
698.
Huda, M. (2019). Empowering application strategy in the technology adoption: insights from
professional and ethical engagement. Journal of Science and Technology Policy
Management, 10(1), 172-192.
Lang, C., Macfadyen, L. P., Slade, S., Prinsloo, P., & Sclater, N. (2018, March). The
complexities of developing a personal code of ethics for learning analytics practitioners:
Implications for institutions and the field. In Proceedings of the 8th international
conference on learning analytics and knowledge(pp. 436-440). ACM.
Ludi, S., Huenerfauth, M., Hanson, V., Rajendra Palan, N., & Garcia, P. (2018, February).
Teaching inclusive thinking to undergraduate students in computing programs.
In Proceedings of the 49th ACM Technical Symposium on Computer Science
Education (pp. 717-722). ACM.
Poulsen, A. (2018). A post publication review of “Threats to autonomy from emerging
ICTs. Australasian Journal of Information Systems, 22.
Richardson, L. J. (2018). Ethical challenges in digital public archaeology. Journal of Computer
Applications in Archaeology, 1(1), 64-73.
Rogerson, S., Miller, K. W., Winter, J. S., & Larson, D. (2019). Information systems ethics–
challenges and opportunities. Journal of Information, Communication and Ethics in
Society, 17(1), 87-97.
Scalabrino, S., Bavota, G., Vendome, C., Poshyvanyk, D., & Oliveto, R. (2019). Automatically
assessing code understandability. IEEE Transactions on Software Engineering.
Thomas, G., Burmeister, O., & Low, G. (2018). Issues of Implied Trust in Ethical
Hacking. ORBIT Journal, 2(1).
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




