Tuesday, May 5, 2020
Business IT Ethics Large Statistical Program
Question: Describe about the Business IT Ethics for Large Statistical Program. Answer: Case 1: Jean and the Large Statistical Program Based on the information on the case study, it is quite apparent that Jean is divided between taking time to complete her work on her own and publish the algorithms in the professional journals as required or use other peoples work without acknowledgement and submit it because of the strict deadline that has been set. The fact is that it is quite unethical for Jean to use other peoples work without acknowledgement even though she was stuck because that amounts to plagiarism which is a significant crime in the contemporary world. In essence, it was quite unprofessional and unethical for Jean to submit other peoples work with a view of cheating that it was her own. This will not only affect her, but also affect her organization because she risks losing her job when it is discovered that she submitted another persons work. The reputation of the organization will also become affected because of their employee using other peoples work without acknowledgement. Jean ought to have honestly e xpressed the situation she was in and sought for a time extension to work on the task. This is the best option because it will not only help her avoid the risk of losing her job, but it will also ensure that the reputation of the organization that she works for is safe and protected. Case 1: Andrew and the Health Project Based on the case study, it is quite apparent that Andrew took over the work that had been poorly done because of lack of experience by the former developer. It is quite unfortunate that the instability of the system will cause detrimental loss to the companys client and because of the pressure subjected to him by the Supervisor, Andrew decides to hand over the system knowing well that it has corruptions and may eventually lead to data loss. It was quite unethical for Andrew and the supervisors to agree to hand in the system to the client knowing well that the technologies used were incompatible with the infrastructure used by the department and that it may result in not only corruptions but also loss of organizational financial data on a daily basis. This decision will have a significant negative impact not only on the reputation of the company but also on its client who may suffer significant loss due to loss of financial data. Andrew should explain to the top management on the iss ue at hand and express the fear that the client may suffer irreparable damage should they submit the system with the technology as it is. Case 3: Jane and the Integrated Inventory Control System Based on the information on the case study, it is a legal requirement that all the software must be tested before being released to the final consumer. But however, the situation at hand depicts that some of the functions of the inventory system are not addressed sufficiently and thus may cause quality issues to arise in future. Signing off the software the way it is will have an impact on the software company, its clients, the clients of the company who will use the software and even the employees. Owing to the fact that inventory functions are vital to the effective functioning of the system, Jane should resist the pressure to sign off the software due to the risks involved. Signing off the software the way it is will be quite unethical for Jane and the company as well. Part 3: Essay (i) According to Sisela Bok (2003) whistle blowing concerns an individual who makes revelations meant to call to attention to negligence, abuses or dangers that threatens public interest. Essay topic: Whistle blowing is an unethical activity and employees undertaking such behaviour should lose their jobs. Whistle blowing is defined as being a person who makes revelations which are aimed at calling attention towards abuses, negligence, or dangers which can threaten the interest of the public. Whistle blowing can also be defined as giving information on unethical and illegal practices at the workplace. Whistle blowing has become a common phenomenon as employees speak out regarding their own ethical concerns at their workplace. Hot debate that has always emerged as to whether whistle blowing is an ethical or unethical issue in an organization. On one side, whistle blowing is deemed as being disastrous for the person concerned as well as the organization because it highly threatens the effective organization for a firm which is being complained about. On the other hand, Sissela Bok, a philosopher, affirmed that even though whistle blowing is usually justified, it actually comprises of accusations, dissent, and even a breach of loyalty and respect to employers. On the contrary, other criti cs have argued that attempts aimed at stopping unethical or illegal activities in a company may be termed as being the greatest form of company loyalty that workers can ever depict. According to some people, it has been argued that there is no way that whistle blowing can be justified since workers in an organization possess absolute obligations of loyalty and confidentiality to an organization that they really work for. Such individuals actually see no great difference between workers who openly reveal confidential trade secrets through selling them to third parties or competitors. This is attributed to the fact that whistle blowers similarly disclose harmful organizational activities to other people. Based on this fact, it can truly be asserted that whistle blowing is an illegal activity and thus this calls that employees who are involved in such deeds ought to be punished by losing their jobs. It is important to note regardless of a persons obligations, one should never be exempted from general obligations that they have to their fellow colleagues or human beings. One great fundamental of such obligations is never to harm or hurt other human beings. While some individuals argue that whistle blowing can be justified because of it being an exercise of the right to speech, it is important for all and sundry to note that such a right is not the perfect choice. In essence, it is important to note that even though individuals may have the right of speaking their minds regarding certain issues because they have no laid down contractual agreements that prevent them from doing so, it is morally wrong for them to do so because it may result in harm to other innocent individuals. Through the use of currently available online tools and search facilities, ordinary users can easily acquire personal information about others. In fact, anyone who has Internet access can, via a search engine such as Google, find information about us that we ourselves might have had no idea is publicly available there. Does this use of online tools threaten the privacy of ordinary people? It can truly be ascertained that the use of online tools highly threaten the privacy of ordinary individuals because the rise of the internet platform that is largely unsecured coupled with instantaneous mass communication and big data makes privacy of information held by corporations and governments to become at stake. For instance, some of the Western Activists have not only exposed but also denounced the use of online communications to invade the privacy of private citizens. Alternatively, activists from the developing world have similarly seized similar technologies and techniques and turned them on governments that have been deemed to be authoritarian as a tool of liberation. Unlike before when online communications and the use of technology was used in the achievement of a democratizing potential such as opening up governments, making it easier for social movements to become organized, freeing people from a media which is deemed to be monolithic, and providing chance for voices which had initially been marginalized to become heard, this is not the case in the contemporary world. This is because the broad use of online tools has greatly threatened the privacy of ordinary individuals in various ways. For instance, the use of online tools has endangered the privacy of ordinary individuals in that some of the spy agencies use peoples data to carry out mass surveillance on the majority if not all of the ordinary people. In addition to that, it is now a common fact that some of the organizations across the world now purchase vast tranches of ordinary peoples data and ultimately uses the same information in ways that are known to comprise privacy. The internet is now being used against ordinary individuals because some of the authoritarian regimes or governments use such information to not only censor and monitor ordinary individuals, but they also use the same information in order to persecute dissent. The fact that the use of the internet and more specifically the use of numerous internet tools are absolutely being used against individuals thus causing them more harm than good. Previously, governments across the world were indeed inept in comprehending the use of the internet to specifically further their own interests. As of now, most governments across the world have become well versed in the utilization of the internet in order to further their interests and meet their ends. This confirms the fact that the use of online tools highly threatens the privacy of ordinary individuals. iii. Professions Australia has recognised the members of the Australian Computer Society (ACS) as professionals. What special responsibilities does that imply for ACS members? In your answer you need to distinguish between someone who is a practitioner but not a professional. Members of the Australian Computer Society are termed as being professionals because the important value that is held by such members states that they must have the Primacy of the Public Interest that stipulates that they ought to put the public interests above those of their sectional, business, or personal interests. Unlike practitioners where cultural and legal obligations that the centre stage as opposed to any other professional obligations, this does not apply to professional members belonging to the Australian Computer Society (ACS). This is due to the fact that unlike practitioners who are not professionals, professionals who are also ACS members are mandated to comply with special responsibilities. For instance, they are supposed (ACS members) they can, at their own expense and voluntarily take numerous ACS education subjects such as on professional and ethical conduct and also undertake yearly professional development that is aimed at maintaining a Certified Professional St atus. Unlike practitioners in the computer field, members of the ACS will with time become subjected to an online ethics test that will be founded on the Code of Ethics towards real or actual case studies. This will be aimed at ensuring that such tests are added to the yearly certification requirements for the achievement of professional status. Unlike practitioners who are not subscribed to any ethical code of practice, members of the ACS are supposed to subscribe to the ACS Code of ethics and as a result, they can get disciplined whenever they break any rules in the ethical codes. In addition to that, when the crime is too extreme such members could be kicked out of this professional body or society thus making them become unable to practice. It can truly be asserted that unlike practitioners who are not mandated to subscribe to a given ethical standard, this is not the case for the professionals. This is because professionals are indeed required to adhere to the laid down ethical standards. Such a code of ethics governs the numerous activities of the ACS. As such, the code require practice and behaviour beyond the personal moral responsibilities or obligations of the people concerned. They not only demand, but also define high standards in behaviour especially with regard to services that are provided to the general public and whenever dealing with the general public.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.