Introduction
This report consists of two major issues IRCL is currently facing, ethics and sustainability. With regards to both issues, explanations and solutions are discussed in depth as to how the company should proceed moving forward.
I – Ethics Report
Question1
Mason (1986) observed that two forces threaten our privacy: unprecedented advancement in information technology and its superior ability to capture, compute and communicate information & the value of information to the people who can use it for their own benefit. Jenny’s unprofessional conduct of hacking into sensitive and confidential information on the ERP system that not only will contain competitive business strategies, secret experimental formula and customers’ details is an invasion of privacy.
Mason (1986) suggested that with the growing collection of data, dependence on the accuracy of information is heavily relied upon. For information that is used by medical researchers, agriculture research, weather predictions, inaccuracies of information could cause devastating effects. As in Jenny’s case, secretly stealing the secret formula for a new cosmetic product that she has no knowledge or experience about could be hazardous to consumers if the product goes on the market. The secret experimental formula that has the potential to revolutionize acne and skin care treatment might not be finalized or stable enough for human usage. Her action of selling the formula to a competitor organization could jeopardize Bonson & Bonson’s business and reputation, legal lawsuit being the worst-case scenario. If the product does not prove popular to consumers, and Bonson & Bonson’s suffered financial losses; who is then to be held accountable; could Bonson & Bonson’s sue IRCL...
... middle of paper ...
...ent [ONLINE] Available at: http://www.strategicinventorymanagement.com/1/post/2011/11/pursuing-sustainability-in-retail-best-green-practices.html [Accessed 07 May 2014].
• Sustainable Packaging Coalition (2011) “Definition of Sustainable Packaging” A project of GreenBlue [ONLINE] Available at: http://sustainablepackaging.org/uploads/Documents/Definition%20of%20Sustainable%20Packaging.pdf [Accessed 07 May 2014].
• The Australian Computer Society (ACS), 2012, code of ethics and case studies
• Underwood, A. (2000, January). Professional Ethics in a Security and Privacy Context–the Perspective of a National Computing Society. In Information Security and Privacy (pp. 477-486). Springer Berlin Heidelberg.
• Woodward, Belle, Nancy L. Martin, and Thomas Imboden. "Expansion and Validation of the PAPA Framework." Information Systems Education Journal9.3 (2011): 28.
The purpose of this posting is to explain what privacy and confidentiality mean and then review the case study about the options of reporting abuse in a child and what principles of ethics are involved with it.
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone. But because of how often technology changes, how can it be known that the laws made so long ago can still uphold proper justice? With the laws that are in place now, it’s a constant struggle to balance security with privacy. Privacy laws should be revised completely in order to create a better happy medium between security and privacy. A common misconception of most is that a happy medium of privacy and security is impossible to achieve. However, as well-said by Daniel Solove, “Protecting privacy doesn’t need to mean scuttling a security measure. Most people concerned about the privacy implications of government surveillance aren’t arguing for no[sic] surveillance and absolute privacy. They’d be fine giving up some privacy as long as appropriate controls, limitations, oversight and accountability mechanisms were in place.”(“5 Myths about Privacy”)
Personal data is quickly becoming a commodity in today's high technology world. This information is used by banks, investment and brokerage companies, credit card merchants, government agencies (local, state and federal), and consumer product-based companies. Most people probably don't realize the amount of information that's shared between companies, or how often it's done. Many companies sell and share customer data to help sell products and find out what new products they should produce. Other uses include gathering information about inventory levels to help better determine what types of products are bought at which store, when and how often. This can be used for inventory and production, to make sure that the store (or stores for chains, like Safeway and Long's Drugs) can have the products available when they're needed.
Ethical hacking supports efforts to have more information about the organization’s system security so this helps to better the organization’s efforts to strengthen security measures against malicious hackers.
ates another's privacy. Violation of ones personal privacy, via computers, may in part be due to the incomplete understanding of responsibility on the part of those involved. Is it a management or a technical concern?
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
[4] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology. Ethics & Behavior, 7(3): 207-220, 1997.
As society has progressed, there have been many new innovative and unbelievable developments in almost all aspects of life that have ultimately created an impact. More specifically, advancements in technology have rather had a much larger and intense impact on society as it continues to grow. Technology has allowed for many great and useful applications that has made life much easier and convenient. However, many aspects of technology have given a rise to a number of social and ethical issues, causing numerous debates and concerns. One of the more prominent concerns deals with the issue of privacy rights.
2) It is getting ever easier to record anything, or everything, that you see. This opens fascinating possibilities-and alarming ones.”
Computers can also tie information together in an impersonal and systematic way that can lead to invasions of privacy. Take for example the situation wh...
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
As Evgeny Morozov would contend the problem of privacy with regards to technology is not a new dilemma. Commenting on Paul Baran’s essay The Future Computer Utility, Morozov came to the conclusion “our contemporary privacy problem is not contemporary.” (Morozov 2013) Though we do have newer considerations because of social networking, piracy, identity theft, and transparency, we are not suffering from an unforeseen nor unfamiliar idea. Upon further analysis of the technology issues there are many ways technology is changing the fabric of society. From children not having the physical dexterity to play with wooden blocks (Ratcliffe 2014) to private information getting hacked. There are a number of concerns regarding privacy and technology.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
... middle of paper ... ... Chicago, IL: Illinois Institute Of Technology's Center For The Study Of Ethics In The Professions, 1980. 158 Pp. -.