Tuesday, December 10, 2019

Early Launch Ethical Issue Identification †Myassignmenthelp.Com

Question: Discuss About The Early Launch Ethical Issue Identification? Answer: Introducation The Early Launch interactive YouTube video highlights a situation in which a project manager is asked to compromise the security of a system for the firm to launch the product early and sign other deals (Al-Saggaf, 2016). There is a need to assess and understand the implication of this move and to develop a solution that a PM can adopt to prevent negative outcomes. According to Stahl, Timmermans, and Flick (2017), steering ICT into a desirable direction requires information and knowledge of the possible impacts. This understating should be gained early since innovations over time can become locked into society making it costly and hard to control. Evidence from the video shows that the Program Director is being weak-willed and not necessarily an immoral person. Apparently, the circumstance he is currently facing makes him fall into a temptation. From the development perspective, including encryption in the system will take time and delay the product delivery time. On the other hand, avoiding the security measure means that the system can be completed earlier and the team can sign up other clients contract. According to the Program Directory, such a move that requires the Project Manager to deliver a software that lacks encryption will lead to increased revenues for the company and bonuses for employees. Ethical issues in this video include moral choices made by the Program Director in relation to the rest of stakeholders, rules governing the profession, and the standards of acceptance. The broad issues revealed by the discussion between the two managers include security and control of information access and privacy of information. Greed is an ethical issue that will compromise the security of the new system. Implications of the Ethical Problem Today, privacy, security, and confidentiality terms have become trendy. However, many information privacy and security challenges are not yet solved. Unsecured systems will be found connected to the web despite the emphasis on the significance of security. In effect, various enterprises only admit after a security incident that they have not invested in proper information security mechanisms (Ozair, et al., 2010). Similarly, other firms still use amateurish and old security and privacy solutions that can easily be hacked. Unfortunately, global investigation indicate that crime is highly shifting to the Internet. Strong encryption is key to reliable data privacy and security. Missing encryption of critical information during storage and transmission is a threat to a software application. Clearly, the director pushes the PM to launch a product that lacks guarantees of integrity, accountability, and confidentiality implemented through system encryption. Lack of secure channel in the system means that data exchange can easily be accessed and modified by an attacker. The attack can be caused by unauthorized data access either at the user connection to the network or along the communication channel from the server to the client. Omitting encryption in this age of widespread system attacks and information collection sniffers may destroy the reputation of a firm leading to huge losses in revenues of even closure of the firm. In the same way, security should be part of the development processes and not a feature that can be added later using updates. The problem arises when the project team omits enc ryption from the system design and development phases. The PM maintains that the firm should develop a software product with end-to-end encryption where only the message sender and receiver can tell what is being shared. An intruder or even the services transmitting the information should not have the ability to access or modify the message. The Program Director should understand that the security landscape is more sophisticated that it was few years ago. In effect, lack of encryption is a failure to protect users civil liberties. As such, encryption is a valuable tool that should be implemented by individual and businesses to protect private and confidential data from unauthorized access. Solution to the Ethical Problem The video clearly shows that the firm has a problem of greed that requires a resolution of improving the corporate culture as highlighted by Al-Saggaf, Burmeister, and Weckert (2015) in their paper. Furthermore, ICT professionals should educate all project stakeholders in the values of ICT. From project planning to delivery, the team should only focus on delivering a secure system to prevent data loss through hacking and other security incidents (Al-Saggaf, Burmeister, and Weckert, 2015). The firm should deploy an integrity system designed to minimize inappropriate behavior and to promote an ethical climate. This solution is an assemblage of informal and formal processes and devices (Alexander and Miller, 2010). The integrity system solution features codes of conduct and ethics, training on ethical issues, unofficial sanctions, and accountability mechanisms. Every stakeholder will be required to follow the policies listed in the solution which ensures compliance with ethical standard s and promotion of ethical goals. Fortunately, the PM and the stakeholders can shorten the delivery time by identifying and specifying which resources and data are critical and should be protected. The firm should require that the storage or transmission of that information should deploy vetted encryption algorithms. The team should use techniques such as threat modeling to determine the effectiveness of the encryption. The solution should properly be integrated to the software design to protect the application from unauthorized access and tampering. The basis of ethical theory that should be applied in the case presented in this video should come from Kants imperative that individuals should act in a manner that if others acted in a similar way, the entire society would benefit (Guy, 1990). The approach should focus on the benefit of the whole population. The teleological or consequentialism can be applied. Under this ethical theory framework, the moral worth of actions should solely be determined by the results of those actions (Guy, 1990). In effect, the program director should act in a way that brings the greatest amount of satisfaction for all stakeholders in short and long term. Ethics are important in the field of information systems. They fill the gap since legal decisions and regulations lag behind in the field of technology. In effect, people can negotiate how the use of electronic information should proceed. In some cases, laws deciding certain aspects of ICT issues have been created. As such, such ethical notes should be implemented in conjunction with the legal framework in information systems. References Al-Saggaf, Y. (2016, October 31). Scenario 3: Early Launch [Video file]. Retrieved from https://www.youtube.com/watch?v=v5M7ohdZ6qA Al-Saggaf, Y., Burmeister, O., Weckert, J. (2015). Reasons behind unethical behavior in the Australian ICT workplace: An empirical investigation. Journal of Information, Communication and Ethics in Society, 13(3/4), 235-255. Alexander, A. Miller, S. (2010).Integrity Systems for Occupations, Ashgate, London. Guy, M. E. (1990). Ethical decision making in everyday work situations. New York: Quorum Books. Ozair, F. F., et al. (2015). Ethical issues in electronic health records: A general overview. Perspectives in Clinical Research, 6(2), 73-76. Stahl, B. C., Timmermans, J., Flick, C. (2017). Ethics of emerging information and communication technologies: On the implementation of responsible research and innovation. Science and Public, 44(3), 369-381.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.