University IT Ethics: ACS Code of Conduct Analysis Essay

Verified

Added on  2021/12/16

|6
|1486
|73
Essay
AI Summary
This essay critically analyzes a video scenario set in a company, focusing on potential breaches of the Australian Computer Society (ACS) Code of Professional Conduct. The scenario involves a project manager being pressured to deliver software early, potentially compromising security through lack of encryption to secure a contract. The essay highlights violations of the code's emphasis on public interest and the protection of client information, contrasting this with the company's focus on profitability. It references studies on unethical behavior in the IT workplace and the need for ethical frameworks, recommending improved communication with clients and prioritization of security. The conclusion underscores the importance of ethical standards in the rapidly evolving IT landscape and the need for industry-wide codes of ethics.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ACS CODE OF CONDUCT ANALYSIS
ACS CODE OF CONDUCT ANALYSIS
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ACS CODE OF CONDUCT ANALYSIS
The essay analyses a video set in a company environment depicting certain probable
practices related to IT oriented work scenarios. A scenario is being considered concerning the
professional code of conduct that has been formed by the Australian Computer Society. In the
video scenario the program manager of a project is being asked by his superior to deliver the
project to the client much earlier than the deadline for enhancing the prospects of better
future profitability. However, the director is not sure as the project is difficult to complete
with all the necessary modifications like encryptions in the stipulated time let alone the
earlier date. He says further that some dangerous risk might have to be taken of the software
is to be delivered early.
The most important issue that has been noticed through the video is the concern that
has been raised in regards to the software being safely delivered to the client. The ethical
dilemma in this case is that delivering the software to the client without encryption a month
early will boost the chance for a new 3 million dollar contract being signed between the client
and the company. However, at the same time if the software is passed one month early to the
client it would have to be given without encryption which will make it much vulnerable for
hackers to intercept.
Taking into consideration the Australian Computer Society code of professional
conduct this scenario is apparently breaching the code for The Primacy of Public Interest.
According to this the public interest takes predominance over personal, business or private
interests of the people connected with the particular organization taking part in a project.
According to a point of this code the organization doing business with its client should strive
towards maintaining the confidentiality and privacy of the client’s information (ACS.org,
2018). The scenario being depicted in the video, compromises the privacy and security of the
product being delivered to the client. Due to no encryption the product delivered will not be
secure. This is being done mainly to boost the business interests of the company which is a
Document Page
2ACS CODE OF CONDUCT ANALYSIS
breach of the code. According to Leicester (2016) memberships of professional bodies are
required in many professions and adherences to certain codes that are formed by those bodies
are much important in order to continue business effectively by being a part of the
membership bodies. However, IT professions are much younger professions that are not yet
regulated by any such associations that can provide ethical guidance to professionals. The IT
profession can be affected by ever increasing threats at any given time despite the problem
areas with regards to industry specific codes of conduct. IT organizations sometimes
overlook security and safety of confidential information in view of profitable business. This
case severely breaches the code of conduct laid by the Australian computer society.
Corporate organizations working in the IT sector can get affected by larger problems if the
codes of conducts are breached often for gaining crucial business mileage. The IT firms
generally work with data that is predominantly confidential. However, certain businesses are
of the opinion that small scale risks can be taken when bigger margins of profits can be
realized as a result. The practices are not very much encouraged but are prevalent none the
less at organizational levels. However, these practices create large gaps in regards to the
formation and implementation of codes that can effectively govern IT related conducts.
It can be said that the practices across various organizations can later on be
detrimental to the IT industry of the country and the world. According to Al-Saggaf,
Burmeister & Weckert (2015) it was found that 30 % of 43 interview respondents pointed
towards some significant IT ethical issues that were prevalent in office environments of IT
firms. The major identified issues that were found from the interview are immense pressure,
greed, bad management, communicational issues and lack of respect towards ICT protocols.
The reasons that were found to be behind the unethical behaviours of employees across the
corporate sectors were very much prevalent across all the corporate IT environments (Al-
Saggaf, Burmeister & Weckert 2015). The scenario that has been depicted provide a picture
Document Page
3ACS CODE OF CONDUCT ANALYSIS
of considering profitability or apparently long term profitable relationship with the client.
However, the same is being considered through great disregard for the ethical aspects that
have been clearly defined in the ACS code of ethics. The safety of the IT product that is
being provided to the customer is being greatly disregarded. Sending the software without
encryption will definitely mean that the security of the customer will be compromised to a
great extent (Al-Saggaf, Burmeister & Weckert, 2015). Sending the encryption through a
separate update will mean a great delay in providing a truly secure product to the customer.
The ACS values concerning honesty, public interest and professionalism are being hampered.
The products that is being provided is not provided in an honest manner. In order to provide
the product early, the manager and his boss are looking towards overlooking the safety and
security of the product and service. The interest of the public, which in this case can be said
to be the client are not being considered on a priority basis and their security is being
overlooked to a great extent. Professionalism is definitely not being maintained as very
dangerous short-cuts are being considered for future profitability (ACS.org, 2018). It
becomes important that the integrity of the organization is not compromised as any untoward
incident that might occur as result can hamper the organization’s essential goals for a long
time.
Some essential recommendations can be made in this process that can help to tackle
the ethical issues in a better way. It can be said that the company is taking a great risk with
the software that they are potentially providing to the customers without encryption. If even
the chances of the software getting hacked is low, it cannot be considered as altogether
improbable. Hence, it would be better if better communication is established with the client
stating the amount of effort that the company is putting towards securing the software that
will be provided to them (Leicester, 2016). Since, the matter is being considered in
consideration of the possible future profitability of the organization, a priority list need to be
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ACS CODE OF CONDUCT ANALYSIS
set. Risks that might even have the slightest chance of resulting in greater loss for the
company in the future need to be scrapped. Hence, as a long time might be required to
encrypt the software that is being provided to the customers, it is more important that proper
communication is maintained between the organization and the client. This can also ensure
that the contract is signed in favour of the company as communications foster better
relationships (Leicester, 2016). The implications of security and safety of the software should
also be communicated to the client effectively.
In conclusion, it can be said that the video depicted issues that can be considered
serious breach of the code of ethics formed by the ACS. The proper evaluation of the issue
pointed towards the fact that IT organizations are susceptible to use unethical practices at
times of great dilemmas arising from opportunities of profitability. It was found that the IT
industry does not have a universally accepted framework to establish standard ethical codes.
This affects the ethical standards that are considered in the industry. It has become much
important at this day and age of rapid technological progress that IT organizations come
together to form effective and practically applicable IT code of ethics.
Document Page
5ACS CODE OF CONDUCT ANALYSIS
References
ACS.org (2018). Retrieved from https://www.acs.org.au/content/dam/acs/rules-and-
regulations/Code-of-Professional-Conduct_v2.1.pdf
Al-Saggaf, Y., Burmeister, O., & Weckert, J. (2015). Reasons behind unethical behaviour in
the Australian ICT workplace: An empirical investigation. Journal of Information,
Communication and Ethics in Society, 13(3/4), 235-255.
Leicester, N. (2016). Ethics in the IT Profession: Does a Code of Ethics have an Effect on
Professional Behaviour?.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]