Tuesday, May 5, 2020

Business Ethics Ethical Decision Making Method

Question: Discuss about the Business Ethics for Ethical Decision Making Method. Answer: Introduction: The Doing ethics technique (DET), case scenario implies that before three years as an IT consultant Diana started working professionally by consulting her own business. In order to enrich her business she considered many business perspectives and ethical aspects at the same time. Currently, Dianas business has many employees, who are working to increase the business efficiency. They are working for the other clients of her business. After becoming a well known developer she got a contract for developing a database management system for a medium sized organization. While developing DBMS for the business organization she needs to consider different ethical aspects. Before building the DBMS for the medium scale organization, ICT security are also considered by Dina but the CEO refuses to agree that the security measures ar considered. After gaining measurable success in the competitive marketplace, Diana got contract from a medium sized organization, to build a database management system for their business organization. The database management system will be designed for their personnel office and thus she considered all the data that are going to be stored in the data storage as sensitive. In order to monitor or track the progress of the Database Management System appropriately, she consulted with the director of computing and also with the director of personnel. As after implementation of this project it has been found that the system is exceeding the estimated budget and thus the company is focusing on the security measures more than anything else. Diana was very much confidence about her development factors but the CEO was confused. Before making final decision for their developed database management system, the ethical and non-ethical issues associated to the system are needed to be considered by the management authority. She considered all the information as sensitive enough. According to the CEO of the organization, the database system lacks the in-build security measures while developing the system. If the system lacks security then after involvement of the system with the existing medium sized business the data stored in the database will be easily hijacked by those users who are working on the client machine. This is not at all safe for the organizational perspectives. If the personnel information including the performance evaluation, medical record, insurance details, salary or pay-scales are revealed in front of unauthorized clients then it will be termed as a non-ethical issue. After explaining the risks of the system that might occur after its real world application the CEO refuses to accept the system , this is an ethical issue. In this case scenario, neither the clients nor the service providers are directly affected with this ethical and non-ethical considered issues. However, according to the CEO of the computing company, if unauthorized clients get access of the data from the storage then they will misuse those data. Even they will also be able to figure out different ways through which the data could be accessed by the users effectively from the data storage. Though, Diana considered all the security measures of database management system but still the CEO rejected the system and pointed it out as risky system where one of the sensitive data stored are secured enough from the external attackers. It has been found that the system cost much, than the estimated budget or in other words the budget had been overflowed after its real world implementation. Thus the development team including Diana and other project team members were affected. At the same time the medium sized organization also affected because Diana fails to deliver the database management on the required time. The main ethical issue is that, after explain the risks to the CEO, he refuses to accept that system and pointed it as a less secured system and also considered that this system cannot not be used in the real application. The computing director and the personnel director both considered the database system as ales secured one. The CEO suggested to Diana to build a secured system for the medium sized organization. However, it was not possible that, after utilizing so much time over the development of the database, again to put the same concentration and money for redevelopment. In order to overcome this challenge, Diana should incorporate the risks management standard to her developed system. In order to mitigate these ethical issues, Diana should include certain security measures such as integrity, basic security, continuity, and proper utility of the ICT system (Prosek, Holm, 2014). As this is referred to as a much beneficial contract for Dianas business, thus, she must not disappoint them instead of that she must incorporate certain additional both ethical and non-ethical security measures. In order to resolve the security oriented issue, the system development team can involve training and development programs for their existing project team members. On the other hand, in order to mitigate the security risks those are thought to be occurred encryption technology with symmetric private key can also be included. In addition to this, authentication measures can also be implemented (Prinsloo Slade, 2013). If the database management system incorporates the authentication technique, then, only the authenticated users will be able to access the data and none of the external hackers or unauthenticated user will be able to access the data from the server. Among all these given options the best or most suitable option for the database management system is incorporation of encryption algorithm to the database server that has been developed for the medium sized organization. Encryption is referred to as the most effective security measures because after implementation of this system none of the external attacker will be able to access the sensitive and personnel data from the server (Slade Prinsloo, 2013). Not only this but also it will serve data backup, application resilience and disaster recovery at the same time. References Belfort, M. A., Shamshirsaz, A. A., Whitehead, W. E., Ball, R., Silver, R., Ruano, R., ... Chervenak, F. (2016). Unusual pleuroamniotic shunt complication managed using a two?port in?CO2 fetoscopic technique: technical and ethical considerations.Ultrasound in Obstetrics Gynecology,47(1), 123-124. Ferrell, O. C., Fraedrich, J. (2015).Business ethics: Ethical decision making cases. Nelson Education. Galliers, R. D., Leidner, D. E. (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Moreno, M., Goniu, N., Moreno, P., Diekema, D. (2016). 10 Ethical and Regulatory Considerations For Social Media Research.THE PSYCHOLOGY OF SOCIAL NETWORKING, 116. Prinsloo, P., Slade, S. (2013, April). An evaluation of policy frameworks for addressing ethical considerations in learning analytics. InProceedings of the Third International Conference on Learning Analytics and Knowledge(pp. 240-244). ACM. Prosek, E. A., Holm, J. M. (2014). Counselors and the military: When protocol and ethics conflict.The Professional Counselor,4(2), 93-102. Slade, S., Prinsloo, P. (2013). Learning analytics: Ethical issues and dilemmas.American Behavioral Scientist,57(10), 1510-1529. Watt-Watson, J., Peter, E., Clark, A. J., Dewar, A., Hadjistavropoulos, T., Morley-Forster, P., ... Campbell-Yeo, M. (2013). The ethics of Canadian entry-to-practice pain competencies: How are we doing?.Pain Research and Management,18(1), 25-32.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.