CSU Computing: Analyzing Ethical Implications of Early Software Launch

Verified

Added on  2023/06/15

|6
|1546
|413
Homework Assignment
AI Summary
This assignment from Charles Sturt University delves into the ethical problems associated with launching a software product early without proper encryption. It identifies the lack of security as the primary ethical issue, potentially exposing client data to vulnerabilities. The project manager is held responsible for prioritizing speed over security, and the client is identified as the most affected stakeholder. The assignment suggests using project management strategies like the waterfall model to prevent such issues. It argues that delaying the launch to ensure proper encryption is the best course of action, despite potential impacts on project timelines and costs. The document concludes by examining the consequences of this decision on project stakeholders, emphasizing the importance of delivering a secure, high-quality product. Desklib provides access to this and other solved assignments for students.
Document Page
SCHOOL OF COMPUTING AND MATHS, Charles Sturt University
Early Launch
Assignment 1: Problem-Action-Consequence Technique
Your Name
Student Number
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Early Launch
Introduction
In the selected YouTube video, it is being seen that a software product would be
launched early without any proper encryption added to it. A software without proper
encryption involved can create problem in the near future relating to the security in the
software. This can make the software vulnerable to hackers who can easily hack the system.
Q1. What are the ethical problems you identified in your chosen YouTube video?
The main ethical problem, which is being identified in the video, is that a software
without any proper encryption is being delivered to the client. The aspect would directly
reduce the security, which is related to the organization when they use the software in the live
environment.
Q2. Why are these ethical problems?
The problem can be termed as ethical problem due to the factor that if the software is
implemented into the live environment without proper encryption it could be vulnerable. The
vulnerable concept would be implemented in the sector of the security of the data. The data
when relating to any organization is very much on the part of private data. If this data is not
secured then it could produce problem and later the working of the overall organization
(Sadeghi et al., 2017).
Q3. Who is responsible for these problems?
The person who is responsible for this issue is the project manager. The project
manager mainly decides what has to be in the software and what should not be incorporated
into the software. In this problem, it was the call of the project manager to deliver the
software early without proper encryption being involved into the process. He had suggested
Your Name
Document Page
Early Launch
the project director to initiate a patch of the encryption few days after the launch of the
software (Kumar, Khan & Khan, 2015).
Q4. Who is affected by these problems?
The affected sector is the client who would be using the software in the live
environment. The data, which is stored in the software, is liable to be vulnerable for hackers
to indulge into it. This can be stated as a problem as the data can be important and if it goes
into the hand of others, it can affect the working of the organization (Sadeghi et al., 2017).
Q5. What project management strategies could have prevented these problems from
arising in the first place?
There are different project management strategies that can be incorporated into any
project initiation. The different phases, which are involved into the concept, is the initiation,
planning and execution (Pires et al., 2016). Taking into consideration a software development
scheme the best project management scheme that can be implemented is the waterfall model.
This can be considered as a very basic model for the for software model which incorporates
the entire requirement needed in the different phases in development of a software (Scott-
Hayward, Natarajan & Sezer, 2016).
Q6. Which of the three actions in your chosen YouTube video is better? Why?
Among the different options available, which are stated in the YouTube video the best
option that can be used is that the project director ignores the recommendation of the project
manager. This is selected due to the factor that a software without proper encryption involved
into it can be a big problem when the software is presented into a live environment. If any
other person accesses the data in the software, expect the authorized user it could lead to a big
Your Name
Document Page
Early Launch
problem (Sadeghi et al., 2017). This problem can be resolved by the implementation of the
encryption into the software.
Q7. What action, other than the three in your chosen YouTube video, can best resolve
the problems?
The best option other than the three stated in the YouTube video is to delay the
delivery of the software. This could reinforce problem in the sector of time framework but on
the other hand, it would be beneficial because the after sales service would not be required.
As stated in the video a patch would be generated after the launch this could be a problem.
Sometimes the compactible issue plays a role, which could create problem in the sector of
development and the implementation of the software (Pires et al., 2016).
Q8. Who should take the best action? Why?
The person who would be taking the best action should know all the details of the
software. In this case, the project director would take the best action. This is due to the factor
that the project director knows the overall working of the software. He can make the best call
regarding the implementations that are required into the software (Scott-Hayward, Natarajan
& Sezer, 2016). It should be taken into consideration that the project director always wants to
dispatch a software with all the implementations that are required so that in the future there
are no problem faced with the security issue of the software.
Q9. What are the implications of the best action on the project’s time, cost and quality?
Projects time: The implementation of the best action would eventually affect the factor of
the time, which is involved into the delivery of the software. It would result in delay in the
delivery but on the other hand, it can incorporate all the necessary details and the security
aspects, which should be involved into a software (Chen et al., 2016).
Your Name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Early Launch
Cost: As the delivery of the project would be delayed by the implementation of the best
action. The utilization of the resources, which would be along the process of development,
could involve cost aspect in it. The cost would be directed affected in this scenario.
Quality: The quality of the product or the software would not be neglected in this scenario. It
can be seen that there would be delay in the delivery of the software but on the other hand,
the encryption would be involved into the software because of which the security factors
would be obliged with (Kumar, Khan & Khan, 2015). A software should always be delivered
to the client with the best quality so that in the near future security issues are not encountered.
Q10.What are the consequences of the best action on the project stakeholders.
The project manager and the project director would be answerable to the stakeholders
about the reason of the delay of the delivery from the pre estimated time framework. The
stakeholders would be concerned about the cost related factor, which would be faced due to
the delivery of the software exceeding the delivery date (Ding et al., 2014). There are more
concern sector relating to the stakeholders for example if one projects deadline is extended it
would affect the other projects, which are in the queue.
Your Name
Document Page
Early Launch
References
Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-defined mobile
networks security. Mobile Networks and Applications, 21(5), 729-743.
Ding, A. Y., Crowcroft, J., Tarkoma, S., & Flinck, H. (2014). Software defined networking
for security enhancement in wireless mobile networks. Computer Networks, 66, 94-101.
Kumar, R., Khan, S. A., & Khan, R. A. (2015). Revisiting software security: durability
perspective. International Journal of Hybrid Information Technology (SERSC), 8(2), 311-
322.
Pires, R., Pasin, M., Felber, P., & Fetzer, C. (2016, November). Secure content-based routing
using intel software guard extensions. In Proceedings of the 17th International Middleware
Conference (p. 10). ACM.
Sadeghi, A., Bagheri, H., Garcia, J., & Malek, S. (2017). A taxonomy and qualitative
comparison of program analysis techniques for security assessment of android
software. IEEE Transactions on Software Engineering, 43(6), 492-530.
Scott-Hayward, S., Natarajan, S., & Sezer, S. (2016). A survey of security in software
defined networks. IEEE Communications Surveys & Tutorials, 18(1), 623-654.
Your Name
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]