Case Study: Ethical Dilemma in ICT and ACS Code of Ethics
VerifiedAdded on 2021/02/19
|7
|1773
|61
Report
AI Summary
This report presents a case study of an IT professional facing an ethical dilemma, focusing on the conflict between going live with untested systems and the potential breach of client privacy. The analysis examines the situation through the lens of the ACS Code of Ethics, highlighting the importance of professional conduct, competence, and adherence to ethical values. The report discusses the implications of the dilemma, considering the potential risks of security breaches and client dissatisfaction. It provides recommendations for navigating such ethical challenges, emphasizing the need for system testing, compliance with ethical guidelines, and the consideration of public interest. The conclusion reinforces the significance of ethical decision-making in the ICT field and its impact on professional practice.

Ethics and
IT Security
IT Security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Introduction......................................................................................................................................1
Ethical dilemma..........................................................................................................................1
Analysis of ethical dilemma from perspective of ACS Code of professional conduct...............2
Recommendation.........................................................................................................................3
Conclusion.......................................................................................................................................3
References........................................................................................................................................5
Introduction......................................................................................................................................1
Ethical dilemma..........................................................................................................................1
Analysis of ethical dilemma from perspective of ACS Code of professional conduct...............2
Recommendation.........................................................................................................................3
Conclusion.......................................................................................................................................3
References........................................................................................................................................5

Introduction (1500)
Ethical dilemma refers to decision-making problem which arises in between probable two
moral imperatives neither of which is unambiguously preferable or acceptable. The complexity
takes place due to situational conflicts in those situation that results within breaching another
(Nyman and Burke, 2016). This report is based Ken an ICT Professional (Information and
Communications Technology) faced an ethical dilemma. As per this case, due to certain reasons
Ken cannot go online on certain day as it will lead to breach but they went online. This document
includes certain ethical dilemma's with respect to Ken and also perspectives from ACS
(Australian Computer Society) code of ethics are taken into consideration.
Ethical dilemma
With respect to this case, Ken was a Information and Communications Technology
Professional, due to some reasons they were not able to be 'live' on coming “Monday” as it will
lead to breach. But they went live which lead to ethical dilemma. A condition or a problem in
which decision-making process in between two assert-able options and neither of them is
appropriate with respect to ethical orientation is referred to ethical dilemma or paradox. In this
case the two conditions were either they go online or not. But both of these conditions were not
accountable in ethics. The major cause for this has been illustrated below with respect to both the
situations.
I. The first condition is that, they can go live but systems were not tested.
II. The other situation was they cannot go live as privacy of their clients will get vulnerable
Neither of conditions are apt as in both the ethics are breached. Suppose if first condition
is taken into consideration then it means there can be any kind interruption in the session like a
third person can get into a network and interrupt entire session (Browning, 2016). There is also a
possibility that an intruder may replace the voice of Ken with their to misguide the people. On
the other hand, if they do not go live then it will lead their clients to dissatisfied with Ken and
may not opt for services that are provided by them in future. Both of these conditions will not
give appropriate results. But still then Ken decides to go live and address their clients.
In such kind of situations, ethics have to be considered. Generally, ethics denotes
difference among what is right to do and what is not. It is a thin line which guides individual to
analyse their steps with respect to deontologism, consequentialism and virtuousness. Ethics of
1
Ethical dilemma refers to decision-making problem which arises in between probable two
moral imperatives neither of which is unambiguously preferable or acceptable. The complexity
takes place due to situational conflicts in those situation that results within breaching another
(Nyman and Burke, 2016). This report is based Ken an ICT Professional (Information and
Communications Technology) faced an ethical dilemma. As per this case, due to certain reasons
Ken cannot go online on certain day as it will lead to breach but they went online. This document
includes certain ethical dilemma's with respect to Ken and also perspectives from ACS
(Australian Computer Society) code of ethics are taken into consideration.
Ethical dilemma
With respect to this case, Ken was a Information and Communications Technology
Professional, due to some reasons they were not able to be 'live' on coming “Monday” as it will
lead to breach. But they went live which lead to ethical dilemma. A condition or a problem in
which decision-making process in between two assert-able options and neither of them is
appropriate with respect to ethical orientation is referred to ethical dilemma or paradox. In this
case the two conditions were either they go online or not. But both of these conditions were not
accountable in ethics. The major cause for this has been illustrated below with respect to both the
situations.
I. The first condition is that, they can go live but systems were not tested.
II. The other situation was they cannot go live as privacy of their clients will get vulnerable
Neither of conditions are apt as in both the ethics are breached. Suppose if first condition
is taken into consideration then it means there can be any kind interruption in the session like a
third person can get into a network and interrupt entire session (Browning, 2016). There is also a
possibility that an intruder may replace the voice of Ken with their to misguide the people. On
the other hand, if they do not go live then it will lead their clients to dissatisfied with Ken and
may not opt for services that are provided by them in future. Both of these conditions will not
give appropriate results. But still then Ken decides to go live and address their clients.
In such kind of situations, ethics have to be considered. Generally, ethics denotes
difference among what is right to do and what is not. It is a thin line which guides individual to
analyse their steps with respect to deontologism, consequentialism and virtuousness. Ethics of
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Ken made them to go live for dealing with queries or provide them with new sessions in this
context to their clients. But as per their seniors Ken have to face certain repercussions due to this.
Analysis of ethical dilemma from perspective of ACS Code of professional conduct.
ICT Professional, Ken was live even after having discussions with their seniors. The
reason behind of not going live is that it will lead to breach in policies of their firm as the
systems were not tested accordingly. To understand this an instance can be taken into
consideration like Ken has gone online as systems are untested it can have various issues. Like if
they were having confidential meeting with their clients then suppose third person gets into a
network then there security will be breached, the purpose of meeting will not be met (Balch and
Balabanova, 2016). If this was not the condition, lets says a general session was to be carried out
like giving training to their employees with respect to certain issues such as security is discussed
then when third person have access to this then they will have an insight into these issues which
denotes that the same information can be used for some illegal purpose.
Another example can be taken, Ken is teaching new employees about security and
understanding of how to recognise if third person is having access to your system. Then intruder
can make use of this information and can opt for alternative method for entering into a device by
which they cannot be caught. These examples denote that opting for going live was not an ethical
method. On the other hand, if Ken do not go online then people who were waiting for this
session will have certain issues. For an instance, if someone has postponed their schedule for this
session and it do not happened then it will lead them to waste their time & also through this, they
will not opt for having sessions with them in future.
As per ACS Code of Ethics, there is need to honour as well as uphold dignity and
effectualness related with being professional. According to this, there is need for members to
stay on by code of ethics (Pope, 2016). It is the responsibility of Ken to follow this being a
member of Information and Communication Technology. This comprises of basically six core
ethical values that are associated with professional conduct. The ACS society needs to comply to
these values as an act of responsibility as well as integrity within entire professional dealings.
Ken belongs to ICT industry that is rapidly growing and is vulnerable to various attacks as well
as breach within security policies. It is mandatory that employees needs to abide to professional
standards for improvisation as well as enhancements within image of industry. As per
professionalism perspective Ken was supposed to following steps:
2
context to their clients. But as per their seniors Ken have to face certain repercussions due to this.
Analysis of ethical dilemma from perspective of ACS Code of professional conduct.
ICT Professional, Ken was live even after having discussions with their seniors. The
reason behind of not going live is that it will lead to breach in policies of their firm as the
systems were not tested accordingly. To understand this an instance can be taken into
consideration like Ken has gone online as systems are untested it can have various issues. Like if
they were having confidential meeting with their clients then suppose third person gets into a
network then there security will be breached, the purpose of meeting will not be met (Balch and
Balabanova, 2016). If this was not the condition, lets says a general session was to be carried out
like giving training to their employees with respect to certain issues such as security is discussed
then when third person have access to this then they will have an insight into these issues which
denotes that the same information can be used for some illegal purpose.
Another example can be taken, Ken is teaching new employees about security and
understanding of how to recognise if third person is having access to your system. Then intruder
can make use of this information and can opt for alternative method for entering into a device by
which they cannot be caught. These examples denote that opting for going live was not an ethical
method. On the other hand, if Ken do not go online then people who were waiting for this
session will have certain issues. For an instance, if someone has postponed their schedule for this
session and it do not happened then it will lead them to waste their time & also through this, they
will not opt for having sessions with them in future.
As per ACS Code of Ethics, there is need to honour as well as uphold dignity and
effectualness related with being professional. According to this, there is need for members to
stay on by code of ethics (Pope, 2016). It is the responsibility of Ken to follow this being a
member of Information and Communication Technology. This comprises of basically six core
ethical values that are associated with professional conduct. The ACS society needs to comply to
these values as an act of responsibility as well as integrity within entire professional dealings.
Ken belongs to ICT industry that is rapidly growing and is vulnerable to various attacks as well
as breach within security policies. It is mandatory that employees needs to abide to professional
standards for improvisation as well as enhancements within image of industry. As per
professionalism perspective Ken was supposed to following steps:
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Remain knowledgeable, informed engaged with respect to professional work and take
respective actions with respect to those who do not comply to them.
Cooperate within advancement in ICT through communication with other professionals
or public rather than leading to breach within security.
With respect to professional development, Ken was supposed to remain updated with
respect to certain standards, practices as well as technologies with respect to field in which they
are carrying out their operations. For an instance, if Ken possess knowledge with respect to
technology and breach which are possible with respect to live session then they would not have
taken such steps which can lead them to leak of information which is furnished by clients on the
other side as well as given by Ken. In addition to this awareness must be provided with respect to
issues that leads to creation of adverse impact on organisation on the whole (Robinson, 2016). In
context of competence, Ken should not have undertaken the responsibility of this live session if
they are not competent to perform and also if they have undertaken this then they (Ken) needs to
have an appropriate guidance by their seniors or expertise with respect to what can be done. It is
not possible to acknowledge all the aspects of ICT but as an professional it is necessary to
possess additional information as well as expertise. Along with this, Ken needs to attempt to
render services as well as products that will be able to match financial as well as operational
needs of their clients or stakeholders. Along with this, they need to be aware with significant
legislations as well as standards and have to carry out their operations accordingly.
Australian Computer Security (ACS), individuals are not supposed to breach public trust
or of stakeholders. Ken needs to have utmost integrity as well as honesty with respect to
decisions and actions that are undertaken by them. In addition to this, Ken have to be realistic
with respect to project which is be carried out through them. It also includes enhancement within
quality of life to understand perceptions with respect to work and enhance competence. Along
with this, public interest must also be considered with respect to what is the influence of any
specific step.
Recommendation
From above it has been very evident that Ken has followed code of conduct as per ACS. They
were supposed to follow those regulations to have better results. Suppose, in this case Ken needs
to abide to regulations but due to ethical dilemma it lead to consequences like their was breach
within security. It is recommended that all the aspects must be taken into consideration with
3
respective actions with respect to those who do not comply to them.
Cooperate within advancement in ICT through communication with other professionals
or public rather than leading to breach within security.
With respect to professional development, Ken was supposed to remain updated with
respect to certain standards, practices as well as technologies with respect to field in which they
are carrying out their operations. For an instance, if Ken possess knowledge with respect to
technology and breach which are possible with respect to live session then they would not have
taken such steps which can lead them to leak of information which is furnished by clients on the
other side as well as given by Ken. In addition to this awareness must be provided with respect to
issues that leads to creation of adverse impact on organisation on the whole (Robinson, 2016). In
context of competence, Ken should not have undertaken the responsibility of this live session if
they are not competent to perform and also if they have undertaken this then they (Ken) needs to
have an appropriate guidance by their seniors or expertise with respect to what can be done. It is
not possible to acknowledge all the aspects of ICT but as an professional it is necessary to
possess additional information as well as expertise. Along with this, Ken needs to attempt to
render services as well as products that will be able to match financial as well as operational
needs of their clients or stakeholders. Along with this, they need to be aware with significant
legislations as well as standards and have to carry out their operations accordingly.
Australian Computer Security (ACS), individuals are not supposed to breach public trust
or of stakeholders. Ken needs to have utmost integrity as well as honesty with respect to
decisions and actions that are undertaken by them. In addition to this, Ken have to be realistic
with respect to project which is be carried out through them. It also includes enhancement within
quality of life to understand perceptions with respect to work and enhance competence. Along
with this, public interest must also be considered with respect to what is the influence of any
specific step.
Recommendation
From above it has been very evident that Ken has followed code of conduct as per ACS. They
were supposed to follow those regulations to have better results. Suppose, in this case Ken needs
to abide to regulations but due to ethical dilemma it lead to consequences like their was breach
within security. It is recommended that all the aspects must be taken into consideration with
3

respect to code of conduct. With respect to this, security of systems as well as entire network
must be taken into consideration before going online. It is essential to test the systems before any
step is being taken by them.
Conclusion
It is observed that ethical paradox refers to condition in between two situations which
will lead to decision-making with respect to ethical consideration. In addition to this, individuals
must comply to code of conduct while furnishing their services as it will assist them to carry out
their roles in an appropriate manner and without any harm to any individuals who are involved in
project.
4
must be taken into consideration before going online. It is essential to test the systems before any
step is being taken by them.
Conclusion
It is observed that ethical paradox refers to condition in between two situations which
will lead to decision-making with respect to ethical consideration. In addition to this, individuals
must comply to code of conduct while furnishing their services as it will assist them to carry out
their roles in an appropriate manner and without any harm to any individuals who are involved in
project.
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Books and journals
Balch, A., & Balabanova, E. (2016). Ethics, politics and migration: Public debates on the free
movement of Romanians and Bulgarians in the UK, 2006–2013. Politics, 36(1), 19-35.
Browning, C. S. (2016). Ethics and ontological security. Ethical security studies: A new research
agenda, 160-73.
Nyman, J., & Burke, A. (Eds.). (2016). Ethical security studies: A new research agenda.
Routledge.
Pope, K. S. (2016). The code not taken: The path from guild ethics to torture and our continuing
choices. Canadian Psychology/Psychologie canadienne, 57(1), 51.
Robinson, F. (2016). Feminist care ethics and everyday insecurities. In Ethical Security
Studies (pp. 116-130). Routledge.
5
Books and journals
Balch, A., & Balabanova, E. (2016). Ethics, politics and migration: Public debates on the free
movement of Romanians and Bulgarians in the UK, 2006–2013. Politics, 36(1), 19-35.
Browning, C. S. (2016). Ethics and ontological security. Ethical security studies: A new research
agenda, 160-73.
Nyman, J., & Burke, A. (Eds.). (2016). Ethical security studies: A new research agenda.
Routledge.
Pope, K. S. (2016). The code not taken: The path from guild ethics to torture and our continuing
choices. Canadian Psychology/Psychologie canadienne, 57(1), 51.
Robinson, F. (2016). Feminist care ethics and everyday insecurities. In Ethical Security
Studies (pp. 116-130). Routledge.
5
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.