Charles Sturt University: IT Ethics Scenario 3 Report on Early Launch

Verified

Added on  2023/04/08

|8
|1182
|254
Report
AI Summary
This report analyzes the "Scenario 3: Early Launch" video, focusing on an ethical dilemma where a project director pressures a project manager to release software early without encryption. The report applies the ACS Code of Ethics to evaluate the situation, highlighting violations of principles like prioritizing public interest and honesty. The core ethical issue revolves around the compromise of software security for personal and professional gain, potentially exposing users to cyber-attacks. The report recommends adhering to the ACS Code by prioritizing software security through encryption and being transparent with the client. The conclusion emphasizes the importance of ethical conduct in IT, particularly the need to prioritize public interest and professionalism to maintain integrity and respect within the field. The provided solution is a report on the ethical issues in the scenario, the application of the ACS code of ethics and a recommendation on how to handle the situation.
Document Page
0
Topics in IT Ethics
Scenario 3: Early Launch
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction...............................................................................................................................2
Background................................................................................................................................3
ACS Code of Ethics......................................................................................................................3
Ethical Dilemma.........................................................................................................................4
Recommendation.......................................................................................................................5
Conclusion..................................................................................................................................6
References..................................................................................................................................7
1
Document Page
Introduction
The importance of business ethics has increased substantially on a global stage as
the number of cases relating to illegal practices by companies and professionals increased
(Floyd, Xu, Atkins & Caldwell, 2013). The Australian Computer Society (ACS) has provided
Code of Ethics which ICT professional have to comply to act with integrity and responsibility
in professional dealing (ACS, 2014). In this report, “Scenario 3: Early Launch” video will be
analysed to understand the key ethical dilemma which is raised in this video. ACS code of
ethics will be applied in the scenario to understand the ethical issue and find a potential
solution to the problem.
2
Document Page
Background
In this video, the project director suggests to the project manager that the CIO
wanted to deliver the software one month early before the deadline in order to make sure
that the client is happy (Al-Saggaf, 2016). The project director suggested that they should
save time on the delivery of the software by delivering it without encryption. Based on this
suggestion, the project manager provides that according to the team, without encryption
the software will be vulnerable towards cyber-attacks. The project director also provides
that the project manager along with all his team members will earn bonuses if they agree to
deliver the software without encryption (Al-Saggaf, 2016).
ACS Code of Ethics
ACS code of ethics provides various guidelines which professionals have to follow to
ensure that they maintain integrity and respect towards their profession. Following are the
key principles of the ACS code of ethics (ACS, 2014).
The primacy of the public interest
It is a duty of ICT professionals that they must give primacy to the public above their
personal or business interests.
The enhancement of quality of life
ICT professionals have to strive in order to improve the quality of life of those who are
affected by their work.
Honesty
It is a key trait of professionals which they must demonstrate through their skills,
knowledge, products and services (Reynolds, 2018).
Competence
ICT professionals must act competently and diligently to protect the interest of their
stakeholders.
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Professional development
ICT professionals must develop themselves and their staff on a professional level (ACS,
2014).
Professionalism
ICT professionals must act in a specific way to enhance integrity and respect of ACS and
its members.
Ethical Dilemma
Based on the evaluation of the ACS code of ethics, the key ethical dilemma which is
raised in the video can be evaluated. The ethical issue is that the CIO and project director of
the company is deliberately trying to sacrifice the security of the software in order to
receive a personal and professional advantage. They failed to comply with the first principle
of ACS code of ethics which require them to give primacy to the public interest. Encryption
enables companies to convert their information into a secret code which is only accessible
through a specific key which protects their data from unauthorised access (Arora, Parashar
& Transforming, 2013). Since the CIO and project director wanted to avoid encryption, it will
increase the vulnerability of data of people who use the software. The CIO and the project
director are giving more priority to their personal and business interest rather than ensuring
that they do everything which they can to protect the interest of the public (Al-Saggaf,
Burmeister & Weckert, 2015).
Moreover, they are not honest while dealing with the client because they promised
them to deliver secured software which they are not doing by sending it without encryption.
For personal gains, they are willing to risk the business and market reputation of the client
that could face substantial loss if the data of their users is compromised. This decision also
shows the failure of the parties to act in a professional manner since their actions will not
enhance integrity and respect of ACS and its members (Bernoth, Dietsch, Burmeister &
Schwartz, 2014). People are less likely to believe in the integrity of ICT professionals if their
data is violated due to lack of security infrastructure. Therefore, the third ending of the
video is the best ethical option in this scenario in which the project director should listen to
the team to ensure that the software is secured from cyber-attacks.
4
Document Page
Recommendation
As per the facts of this case, it is recommended that the management of the
company should comply with the ACS code of ethics by delivering the software with
encryption. They should give primacy to the public interest by ensuring that the software is
secured to use and its users' data will not be vulnerable towards cyber-attacks. This will
ensure that the data is protected from hacking and unauthorised access which will protect
the interest of the client and the public. The project director and the project manager
should be honest with the client, and they should clearly tell them that they might need
more time to ensure the security of the software. Therefore, the third video ending is the
right choice in this scenario which will ensure that parties act in a professional manner by
ensuring that they did not adversely affect the integrity and respect of ACS and its members.
5
Document Page
Conclusion
To conclude, it is important that professionals must comply with the code of ethics
to ensure that they discharge their duties in an ethical manner. In this video, the ethical
dilemma which is raised is that the CIO and the project director wanted to deliver the
software to the client one month earlier without encryption which will increase the risk of
cyber-attack and data breach. This decision will violate provisions of ACS code of ethics since
the company did not give primacy to the public interest, be honest and maintain
professionalism in their work. Therefore, it is recommended that they should avoid risking
the security of the software by avoiding encryption. They should ensure that the software is
secured to protect the data of its users while complying with the provisions of the ACS code
of ethics.
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
ACS. (2014). ACS Code of Professional Conduct Professional Standards Board Australian
Computer Society. Retrieved from https://www.acs.org.au/content/dam/acs/rules-
and-regulations/Code-of-Professional-Conduct_v2.1.pdf
Al-Saggaf, Y. (2016, October 31). Scenario 3: Early Launch. [Video File]. Retrieved from
https://www.youtube.com/watch?v=v5M7ohdZ6qA
Al-Saggaf, Y., Burmeister, O., & Weckert, J. (2015). Reasons behind unethical behaviour in
the Australian ICT workplace: An empirical investigation. Journal of Information,
Communication and Ethics in Society, 13(3/4), 235-255.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Bernoth, M., Dietsch, E., Burmeister, O. K., & Schwartz, M. (2014). Information management
in aged care: cases of confidentiality and elder abuse. Journal of Business
Ethics, 122(3), 453-460.
Floyd, L. A., Xu, F., Atkins, R., & Caldwell, C. (2013). Ethical outcomes and business ethics:
Toward improving business ethics education. Journal of business ethics, 117(4), 753-
776.
Reynolds, G. (2018). Ethics in Information Technology. Boston: Cengage Learning.
7
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]