Task Solutions Of Aspect Of Applied Professional Ethics:3410ICT

Student Name
Student No.
3410ICT
Trimester n, 202n
Professional Issues Assignment 2
Due Date: time, dd/mm/yy
Lecturer: David Tuffley
Campus (NA, …

Preview text

Student Name
Student No.
3410ICT
Trimester n, 202n
Professional Issues Assignment 2
Due Date: time, dd/mm/yy
Lecturer: David Tuffley
Campus (NA, OL, GC):
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 1
Contents
1. Introduction 2
2. Analysis 3
2.1. Legal factors …………………………………………………………………………… 3
2.1.1. Non-Disclosure Agreement ………………………………………………. 3
2.1.2. Informed Consent …………………………………………………………….. 3
2.2. Professional factors ………………………………………………………………… 4
2.2.1. Professional Contract ……………………………………………………….. 4
2.2.2. Changing job and starting own agency …………………………….. 4
2.3. Employment and Social factors ………………………………………………. 4
2.3.1. Lack of security in the marketing database ………………………. 4
2.3.2. Customer ’sdata getting impacted …………………………………….. 5
2.4. Personal factors ……………………………………………………………………… 5
2.4.1. Competence ……………………………………………………………………… 5
2.4.2. Breach of rules and regulations ………………………………………… 5
2.5. Intrinsic factors ……………………………………………………………………….. 5
2.5.1. Moral Approach of Mary Astor ………………………………………….. 5
2.5.2. Lack of professionalism of Ward ………………………………………. 5
2.6. Prioritisation ……………………………………………………………………………. 6
2.7. Decision ………………………………………………………………………………….. 7
3. Discussion 8
4. Conclusion 10
5. References 10
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 2
1. Introduction
Business ethics refers to as the distinct aspect of applied
ethics or professional ethics that is responsible for
examining ethical principles and even the moral issues,
which could arise in a business environment (Hansson,
2017 ). This type of ethics is applicable to every attribute of
business conduct and is also relevant to the subsequent
conduct of individuals and the entire business. Every
professional issue in computing
Mary Astor is aself-employed IT consultant, who has been
recruited by apopular advertising agency, called
Greenstreet Associates for providing technical consultancy
over the overall development of amarketing database.
This particular database is an integrated demographic
database with aweb front end that gathers information
from people, entering online competitions with incentives.
The database is amethod of leveraging web technology for
enhancing the existing database of 750000 people. Mary
had known that the cofounder, Barton has plans to become
amajor list broker. However, afew issues were highlighted,
for example, the development of a detailed list of user
requirements has brought the issue of informed consent of
all people. Moreover, there is also a high chance of the
issue of data loss for weak security system.
The main purpose of this report is to understand and
analyze the case scenario for Mary Astor with different
legal, professional, employment and social, personal and
intrinsic values. A prioritization of these factors is also
provided in the report with proper discussion.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 3
2. Analysis
An ethical analysis is asystematic approach to figure out
the appropriate moral decision within a specified situation.
With the analysis of the situation logically, the individual
could easily identify all the alternatives that are moral and
effective (Vallor et al., 2018 ). Five vital steps in ethical
analyses are identification of different issues, outlining the
alternatives, construction of the ethical argument, and
assessment of the argument and finally making adistinct
decision (Himmelreich, 2019 ).
2.1. Legal factors
Legal factors are external factors that refer to the process
of the law impacting the method of businesses operating
and customers behaving appropriately (Kirchschlaeger,
2020 ). The organizational management requires to ensure
that they are following every legal factor for their business.
2.1.1. Non-Disclosure Agreement
Mary Astor was being hired by the professionals of
Greenstreet Associates to ensure that she would be
providing technical consultancy to the business on the
development of a marketing database. She had to sign an
NDA or non-disclosure agreement, through which she had
agreed not to reveal any confidential information about the
database or Greenstreet to a3rd party, without taking
permission from the senior authorities. Moreover, as per
her agreement, she has also agreed to the payment terms.
2.1.2. Informed Consent
When an organization is using the confidential information
of their customers for any personal or professional work
activities, itis extremely vital and significant to take proper
consent from the people. However, the organizational
management and senior authority of Greenstreet
Associates had not taken any consent from the people and
as aresult, itcan be referred to as alegal aspect; since the
senior management has not asked for any such consent
from the customers.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 4
2.2. Professional factors
Professional factors refer to as those factors that involve
knowledge, skills and core abilities that are needed to be
acquired for improving professionalism and professional
activities accordingly (Fiore, 2020 ).
2.2.1. Professional Contract
A professional contract is needed to be maintained in
Greenstreet with all the employees, including Mary Astor.
This particular contract states that the employee cannot be
involved with any other organization and for accessing the
confidential information to the third parties; the employee
would require written permission from the senior
management.
2.2.2. Changing job and starting own agency
Ward has been associated with Greenstreet for almost 10
years and at present, he has decided to change his
company and start his own agency. For this purpose, itis
needed to ensure that Ward has full data of the
organization. This particular aspect has highlighted the
professional issue of loyalty and work preferences in
Greenstreet.
2.3. Employment and Social factors
The employment and social factors are responsible for
impacting the overall employment and social attributes of
the employees (Taebi et al., 2019 ).
2.3.1. Lack of security in the marketing database
Mary Astor has hired Erin Lockhart for building an access
control function for the marketing database. Although Mary
wants astrong and secured database, Barton does not
want to invest much on the security factor of the database.
Hence, itshows an unethical employment attitude of
Barton and there is ahigher chance that the sensitive data
of the customers would be affected. As aresult, the
customers ’reputation would be negatively affected.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 5
2.3.2. Customer ’s data getting impacted
One of the most distinct and noteworthy aspects that is
needed to be considered in the case study is that
customers ’data would get impacted and the hackers can
use the data for their personal usage (Langarizadeh et al.,
2017 ). Hence, Mary Astor and Erin would be accused of
such hacking attributes in their business processes and
operations.
2.4. Personal factors
The personal factors refer to as those factors that would be
impacting on the personal requirements and needs of a
specific individual (Peterson, 2017 ).
2.4.1. Competence
Both Ward and Mary Astor had to show their competence
in getting a new job or starting his own agency and getting
better results from the business respectively. As aresult,
they have undertaken new or innovative methodologies to
gain success.
2.4.2. Breach of rules and regulations
Ward has been responsible for breaching the rules and
regulations related to data security, without informing the
individuals. The main reason of making asecond copy of
the data was for using for his personal reasons.
2.5. Intrinsic factors
The intrinsic factors are required for identifying the unique
spectrum of the attributes of an individual (Peterson,
2018 ).
2.5.1. Moral Approach of Mary Astor
Mary Astor has considered the moral approach for
securing the confidential data and information, under every
circumstance. However, she was stopped by Barton as he
did not agree on investing adequately on the security
aspect of the marketing database.
2.5.2. Lack of professionalism of Ward
Ward, being apart of Greenstreet for alonger period of
time, has the responsibility to follow ethical and
professional standards eventually. However, he had been
considering his own professional choices and as aresult,
lack of professionalism has been observed accordingly.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 6
2.6. Prioritisation
The above mentioned factors can be prioritized in the
following table:
Factor Related Issue
1 Informed consent (Legal) The individuals were
not informed, before
taking their data.
2 Lack of security in the marketing database
(Employment and social)
The security aspect of
the database was not
strong.
3 Customers ’data getting impacted
(Employment and social)
Due to lack of security,
customers ’data can be
hacked.
4 Professional Contract (Professional) The employees had
signed a professional
contract with
Greenstreet
5 Breach of rules and regulations (Personal) Ward had breached the
rules of data security.
6 Lack of professionalism of Ward (Intrinsic) Ward did not follow
professionalism by
using the backup copy
of the data.
7 Competence (Personal) Mary wanted to
maintain ethics and
Ward showed his
competence for leaving
the job.
8 Changing job and starting own agency
(Professional)
Ward decided to
change his job and start
his own agency with the
data of Greenstreet ’s
customers.
9 Moral approach of Mary Astor (Intrinsic) Mary has showed the
moral approach for
securing the sensitive
information with Erin.
10 Non-Disclosure Agreement (Legal) Mary has signed a NDA
for ensuring that she
would not share the
data of the marketing
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 7
database with any third
party.
Table 1: Priority List
2.7. Decision
As per my analysis, Mary should convince Barton to invest
additionally on the security factors of the marketing
database (Tarrant & Hughes, 2020 ). Security of the system
is termed as one of the most vital and significant aspects of
asystem and with such high security factors; itwould be
easier for the organization of Greenstreet to get more
customers and better brand reputation. Moreover, any kind
of legal or professional issue, identified in the organization
should be reported and strict action should be undertaken
(Wagner, 2018 ). System security eventually encompasses
every vital facet of accessing the information related
assets.
Different aspects like authentication, software up
gradations, antivirus protection and even modification of
the methodologies should be involved in the marketing
database for getting an optimum result (Kirkpatrick, 2019 ).
Furthermore, the measurement of an EDM or ethical
decision making should be considered for measuring the
core capability of Barton and Mary as well as Ward to make
various ethical decisions that comprise of the core potential
for impacting others and applying proper standards for the
system. Regarding the backup copy of the data, Mary
should inform Barton for avoiding these aspects (Tuffley,
2011). The ethical and legal attributes are required to be
considered for taking the potential decisions as well as
their consequences to determine a defensible action ’s
course.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 8
3. Discussion
The involvement of an EDM or ethical decision making is
extremely vital and significant for aligning business ethics
in an organization (Bietti, 2020 ). EDM model can
eventually provide aframework, in which a specific
individual is being instructed for considering the distinct
context and also taking potential decisions successfully
(Tuffley, 2011). Mary Astor has been facing different
unethical and unprofessional activities in her business
processes and operations and hence the decision making
can be completed with proper efficiency and effectiveness.
There are a few distinctive and noteworthy principles of
ethics that are needed to be considered and these are
honesty, integrity, trustworthiness, loyalty, fairness,
concerns for others and respect for others and even law
enduring (De Cremer & Kasparov, 2021 ). As a result, the
organizational management of Greenstreet would be
benefitted with the inclusion of the system of different
ethical and moral beliefs, which direct the behaviours as
well as operations of the business and even the personnel.
An ethical technologist is needed to be considered and the
EDM should be aligned properly (Tuffley, 2011). Such
ethics is the overall involvement of this ethical thinking into
various practical technological concerns. The main reason
for which technology based ethics is their developing in
prominence is that various innovative technologies would
be responsible for providing additional security and safety
factors in the respective system (Vargas-Elizondo, 2020 ).
Mary Astor has been concerned regarding the security
factor of the Marketing Database in Greenstreet and hence,
the application and involvement of an ethical technologist
would be responsible for making different aspects and
getting major acceptance of responsibility (Bassey, 2020 ).
The organizational management of Greenstreet like Barton
has not considered additional investment for the security
factors of the database and hence, there is a high chance
that the hackers would be hacking into the system and get
the confidential information of the customers easily.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 9
Ihave selected 10 distinctive factors, under the categories
of legal, professional factors, employment as well as social
factors, personalized and finally intrinsic factors. The most
vital and significant factors as per my analysis in the list are
legal factors, employment as well as social factors and
intrinsic factors (Mitcham, 2020 ). The legal factors are
needed for understanding the legal or law related attributes
that should be aligned in the processes, under every
circumstance. Mary and other employees of Greenstreet
should ensure that they are following every legal factor, so
that the law related factors are prioritized.
The second vital factors are the employment and social
factors that prove that the organizational management and
the employees or staff should follow the ethical principles
and values, under every circumstance. All of these
employment and social factors are needed to be followed
successfully for getting a responsible adoption of the
disruptive technology (Brusoni & Vaccaro, 2017 ). The lack
of security in the marketing database is extremely vital to
be analysed to build an access control accordingly.
However, an unethical employment attitude of Barton has
been identified in the factor.
The third factor is the intrinsic factor as the intrinsic values
of the employees and management have been identified
(Bombaerts et al., 2021 ). The lack of professionalism in
Ward has been identified in the fact for ensuring that he is
only concerned about his own job and personal growth and
development.
Ihave provided the decision of considering an EDM model
or framework for the work processes and activities of
Greenstreet to ensure that better results are gained for
ethical analysis. Moreover, the inclusion of the ethical
technologist would also be recommended by the
management (Tuffley, 2011). Furthermore, proper security
should be involved in the system to gain success and
efficiency, under every circumstance.
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 10
4. Conclusion
Hence, aconclusion could be drawn that the involvement
of an ethical principle and approach is needed for ensuring
that Greenstreet would be conducting ethical activities and
actions in their business processes and operations. The
organizational management would be able to establish
business ethics for the core purpose of promoting integrity
amongst the employees and even gaining trust from key
stakeholders like customers and employees. A proper
management of the aspects and attributes would be
considered for better analysis and results.
The management of the organization should follow seven
vital principles of an ethical decision making model and
these include modifying human practices whenever
needed, justifying the requirement of control, having a
clear and achievable result based goal, causing the lowest
harm to the individuals, considering maximum community
values and scientific information, including long termed
systematic management and finally considering base
control for the procedure. The above provided report has
outlined adetailed analysis of the case study of Mary Astor
with the involvement of an ethical decision making model
and various factors and identified and prioritized.
5. References
Bassey, S. A. (2020). Technology, environmental
sustainability and the ethics of
anthropoholism1. socialspacejournal. eu ,85.
https://www.researchgate.net/profile/Emmanuel-Du
ke/publication/348431950_The_culture_of_slavery
_in_traditional_context_and_globalised_society/link
s/5ffecc1545851553a03dc876/The-culture-of-slave
ry-in-traditional-context-and-globalised-society.pdf#
page=85
Bietti, E. (2020, January). From ethics washing to ethics
bashing: A view on tech ethics from within moral
philosophy. In Proceedings of the 2020 conference
on fairness, accountability, and transparency (pp.
210-219).
https://dl.acm.org/doi/abs/10.1145/3351095.33728
60?casa_token=TeotVTcHKgUAAAAA:uhB9HuWN
Ef_W3HuyoYBihIVp5BLNtY3lZrkjoIRu0oKEcIJLj4c
KGnGi4XNqSrstmlszSZG6WUbg_A
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 11
Bombaerts, G., Doulougeri, K., Tsui, S., Laes, E., Spahn,
A., & Martin, D. A. (2021). Engineering students as
co-creators in an ethics of technology
course. Science and engineering ethics ,27 (4), 1-26.
https://link.springer.com/article/10.1007/s11948-02
1-00326-5
Brusoni, S., & Vaccaro, A. (2017). Ethics, technology and
organizational innovation. Journal of Business
Ethics ,143 (2), 223-226.
https://link.springer.com/article/10.1007/s10551-01
6-3061-6
De Cremer, D., & Kasparov, G. (2021). The ethics of
technology innovation: adouble-edged sword?. AI
and Ethics ,1-5.
https://link.springer.com/article/10.1007/s43681-02
1-00103-x
Fiore, E. (2020). Ethics of technology and design ethics in
socio-technical systems: Investigating the role of
the designer. FormAkademisk-forskningstidsskrift
for design og designdidaktikk ,13 (1).
https://journals.oslomet.no/index.php/formakademi
sk/article/view/2201
Hansson, S. O. (Ed.). (2017). The ethics of technology:
methods and approaches .Rowman & Littlefield.
https://books.google.com/books?hl=en&lr=&id=YeL
aDwAAQBAJ&oi=fnd&pg=PR7&dq=ethics+in+tech
nology&ots=MZOzJl4L7x&sig=UCKBDQPZgmL7B
Z0-7MiHFDn0oF8
Himmelreich, J. (2019). Ethics of technology needs more
political philosophy. Communications of the
ACM ,63 (1), 33-35.
https://dl.acm.org/doi/fullHtml/10.1145/3339905?ca
sa_token=6IUlCeqwEu8AAAAA:UJ4ES2RtExpoLy
z-Y49xy7dEGyTPlyG2L7mmz3u7GbnGROXSbtO6
IJW8xQuQ3mM5vNuLU5S8ilCRxg
Kirchschlaeger, P. G. (2020). The correlation between
ethics and technology. In Religion in the Age of
Digitalization (pp. 165-180). Routledge.
https://www.taylorfrancis.com/chapters/edit/10.432
4/9780367809225-17/correlation-ethics-technology
-peter-kirchschlaeger
Kirkpatrick, K. (2019). Ethics in technology
jobs. Communications of the ACM ,62 (6), 19-20.
https://dl.acm.org/doi/fullHtml/10.1145/3323702?ca
sa_token=Gj7MCLEdG40AAAAA:TR3LEMh2xGR6
IaSamZ0D0AFP7WMnY63WYXNe_xQ4f5_ZfWRo
_3XSixj3gwzU1rUA__0MFg1k_S7gSg
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 12
Langarizadeh, M., Moghbeli, F. & Aliabadi, A. (2017).
Application of ethics for providing telemedicine
services and information technology. Medical
Archives ,71 (5), p.351.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC572
3167/
Mitcham, C. (2020). The Ethics of Technology: From
Thinking Big to Small — and Big
Again. Axiomathes ,30 (6), 589-596.
https://link.springer.com/article/10.1007/s10516-02
0-09505-8
Peterson, M. (2017). The ethics of technology: A geometric
analysis of five moral principles .Oxford University
Press.
https://books.google.com/books?hl=en&lr=&id=vT
UlDwAAQBAJ&oi=fnd&pg=PT5&dq=ethics+in+tec
hnology&ots=fbroYcmzNL&sig=nZrap6NJpFwY35L
fFE9-Vdm_9xQ
Peterson, M. (2018). The ethics of technology: Response
to critics. Science and Engineering Ethics ,24 (5),
1645-1652.
https://link.springer.com/article/10.1007/s11948-01
8-0062-0
Taebi, B., van den Hoven, J., & Bird, S. J. (2019). The
importance of ethics in modern universities of
technology. Science and Engineering Ethics ,25 (6),
1625-1632.
https://link.springer.com/article/10.1007/s11948-01
9-00164-6
Tarrant, A., & Hughes, K. (2020). The ethics of technology
choice: Photovoice methodology with men living in
low-income contexts. Sociological Research
Online ,25 (2), 289-306.
https://journals.sagepub.com/doi/abs/10.1177/1360
780419878714
Tuffley, D. (2011). The Ethical Technologist. [online].
Accessed from
https://books.google.com/books/about/The_Ethical
_Technologist.html?id=qRyWpwAACAAJ
[Accessed on 6thMay 2022].
Vallor, S., Green, B., & Raicu, I.(2018). Ethics in
technology practice. The Markkula Center for
Applied Ethics, Santa Clara University .
https://www.scu.edu/media/ethics-center/technolog
y-ethics/Tech_and_Engineering_Practice-Ethical_L
enses-2020.pdf
Professional Issues Assignment Error! The style isnot specified.
(Student Name, Course, Semester, Year)0 Page 13
Vargas-Elizondo, C. (2020). On the role of ethics in
shaping technology development. HighTech and
Innovation Journal ,1(2), 86-100.
https://www.hightechjournal.org/index.php/HIJ/articl
e/view/43
Wagner, B. (2018). Ethics as an escape from regulation.
From “ethics-washing ”to ethics-shopping?.
https://www.jstor.org/stable/pdf/j.ctvhrd092.18.pdf

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published.