Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
ethical or invasion of privacy?
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: ethical or invasion of privacy?
Introduction
This report consists of two major issues IRCL is currently facing, ethics and sustainability. With regards to both issues, explanations and solutions are discussed in depth as to how the company should proceed moving forward.
I – Ethics Report
Question1
Mason (1986) observed that two forces threaten our privacy: unprecedented advancement in information technology and its superior ability to capture, compute and communicate information & the value of information to the people who can use it for their own benefit. Jenny’s unprofessional conduct of hacking into sensitive and confidential information on the ERP system that not only will contain competitive business strategies, secret experimental formula and customers’ details is an invasion of privacy.
Mason (1986) suggested that with the growing collection of data, dependence on the accuracy of information is heavily relied upon. For information that is used by medical researchers, agriculture research, weather predictions, inaccuracies of information could cause devastating effects. As in Jenny’s case, secretly stealing the secret formula for a new cosmetic product that she has no knowledge or experience about could be hazardous to consumers if the product goes on the market. The secret experimental formula that has the potential to revolutionize acne and skin care treatment might not be finalized or stable enough for human usage. Her action of selling the formula to a competitor organization could jeopardize Bonson & Bonson’s business and reputation, legal lawsuit being the worst-case scenario. If the product does not prove popular to consumers, and Bonson & Bonson’s suffered financial losses; who is then to be held accountable; could Bonson & Bonson’s sue IRCL...
... middle of paper ...
...ent [ONLINE] Available at: http://www.strategicinventorymanagement.com/1/post/2011/11/pursuing-sustainability-in-retail-best-green-practices.html [Accessed 07 May 2014].
• Sustainable Packaging Coalition (2011) “Definition of Sustainable Packaging” A project of GreenBlue [ONLINE] Available at: http://sustainablepackaging.org/uploads/Documents/Definition%20of%20Sustainable%20Packaging.pdf [Accessed 07 May 2014].
• The Australian Computer Society (ACS), 2012, code of ethics and case studies
• Underwood, A. (2000, January). Professional Ethics in a Security and Privacy Context–the Perspective of a National Computing Society. In Information Security and Privacy (pp. 477-486). Springer Berlin Heidelberg.
• Woodward, Belle, Nancy L. Martin, and Thomas Imboden. "Expansion and Validation of the PAPA Framework." Information Systems Education Journal9.3 (2011): 28.
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
Making ethical decisions is a challenging task for managers. Managers are responsible for making ethical decisions as it helps a firm safeguard its reputation (Wadell, Jones and George, 2013; 135). In its simplest sense, the issue of ethics arises when one group of stakeholders benefits at the expense of others (Robertson, Blevins and Duffy, 2013; 85). Agalgatti and Krishna (2007,327) further states that it is a process of evaluating what is right or wrong in relation to a society’s moral standards. The main issue in the case study is the issue of privacy, which is the amount of personal information that is accessible to others (Moor, 1997). Society views invasion of privacy as unethical. In the digital world people has become so reliant on technology. There is no privacy in the digital world. Everything that goes online can be accessed by others, and this makes it difficult for managers to identify matters and practices they should be concerned with, including consumer’s privacy (Ccnmtl.columbia.edu, 2014). Failing to protect consumer’s privacy could lead to hacking and intrusion of an individual’s personal information (Khosrow-Pour, 2002; 2). For example, social applications such as WhatsApp and Viber are becoming increasingly popular. The instant message Viber has failed to protect the user’s privacy. It has been hacked recently by the Syrian Electronic Army (“Viber free download” 2014) despite the technical measures used to protect user’s data.
Ethical hacking supports efforts to have more information about the organization’s system security so this helps to better the organization’s efforts to strengthen security measures against malicious hackers.
Ever wonder how a person not known obtains critical information once unavailable to the public? Nowadays, the easy access of computers makes it almost impossible for citizens to completely be out of the risk of privacy invasion. Anything we do is being monitored discreetly or publicly by others. Yet, there are different ways in which this issue can be viewed. It is harmful in the way that we do not know exactly what is being monitored by others, nor the way it is being used. Privacy intrusion helps us by monitoring those who may be harmful to others. Privacy invasion can be viewed as both harmful, and yet helpful.
“Packaging is something physical that is produced from a wide range of raw materials, and so its production and disposal will have important environmental considerations, too” (Ambrose and Harris, 2011). The main idea is that the book looks at Environmental Consideration in packaging, but have gone through the thinking process of what is “wrong and right” in design. It also goes into Sustainable packaging and this section gives an answer to one of the questions I posed, whether it is important to consider ethics in design because it also considers the Ecology “The need to produce sustainable packaging has become more and more widespread as environmental awareness grows about the danger of excessive production, consumption and the generation of waste.” (Ambrose and Harris, 2011) It proves my statement that in this contemporary world we cannot any longer consider only aesthetics without incorporating ethical values in what we design and produce. The book also shows “Life-cycle assessment” and “Waste Hierarchy”. It mentions “Creating Packaging Statements” and “Reusing
[7] ¬Holdway, R., Walker, D. and Hilton, M. (2002) Eco-design and successful packaging, Design Management Journal. (pp. 45 – 53)
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
As society has progressed, there have been many new innovative and unbelievable developments in almost all aspects of life that have ultimately created an impact. More specifically, advancements in technology have rather had a much larger and intense impact on society as it continues to grow. Technology has allowed for many great and useful applications that has made life much easier and convenient. However, many aspects of technology have given a rise to a number of social and ethical issues, causing numerous debates and concerns. One of the more prominent concerns deals with the issue of privacy rights.
Reynolds, G. (2012). Ethics in information technology ( 4th ed.). Boston, MA: Course Technology, Cengage.
Computers can also tie information together in an impersonal and systematic way that can lead to invasions of privacy. Take for example the situation wh...
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
In the twenty first century, ‘Professionalism and Ethics’ has raised the standards of Information Technology and Engineering. William Wisely states that, “The engineer shall apply his specialized knowledge and skill at all times in the public interest, with honesty, integrity and honor.” While emphasizing the importance of ethics in the field of Information Technology and Engineering, Deborah G. Johnson affirms as follows:
Privacy is the condition where someone personal information can not be documented and be used by others (Parent, 1983). Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. The foll...