Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Facts of the Case

Question:

Case Study: Software operations are harming common peoples.
 

In this case study, the fixed rules or software operations are harming common people. Moreover, due to incompetency of the company employees as well as out-of-date softwares, the records of the clients are getting mismatched or misplaced. In other cases, the system generates false information regarding the client’s annual income or property values. Another main thing in this context is that the company does not take suitable steps to mitigate the issues arising and update their system according to requirements. The result is that the common users and clients get cheated or even robbed of their deserved resources.

In this case, the facts are as follows:

Incompetent Company – The records of the clients are getting mismatched or misplaced. In other cases, the system generates false information regarding the client’s annual income or property values. The company is getting away with all mismatched records and other issues, justifying them as fixed system issues for which, records cannot be changed.

Insufficient Use of Technology – Due to out-of-date softwares, the records of the clients are getting mismatched or misplaced. In other cases, the system generates false information regarding the client’s annual income or property values.

Incompetent Employees of the Company - The employees of the company are not being able to deal with the advanced recording system. As a result, there are a lot of manual errors occurring that is resulting in the errors in client records.

Cheated Clients – The clients are getting cheated and are unable to do anything about the situation. Moreover, they cannot even sue the company, as the records show otherwise and there no proofs of company’s faults.

There are several issues in this story. The issues are as follows:

  • The company’s systems are outdated and are unable to keep up with the amount of records stored within the hardwares.
  • The employees of the company are not being able to deal with the advanced recording system. As a result, there are a lot of manual errors occurring that is resulting in the errors in client records.
  • The company has not taken any initiative to upgrade its systems or train its employees.
  • The company has not taken any steps to rectify the records and return values to the users.

In this case, only the clients are affected. The company is getting away with all mismatched records and other issues, justifying them as fixed system issues for which, records cannot be changed. Due to inefficiency of the systems and incompetency of the employees, errors are inserted and recorded in the system for which, the properties or monetary values of a client are getting misplaced. For this reason, the clients are getting cheated and are unable to do anything about the situation. Moreover, they cannot even sue the company as the records show otherwise and there no proofs of company’s faults.

There are several ethical issues related to this case. These are follows:

  • The company is not following moral values regarding the handling of their clients. For the errors generated from the systems, the company just blames the system and gets away with it. There are no direct proofs of company mismanagement and hence, the clients cannot do anything regarding the matter.
  • The employees of the company are incompetent. However, there are no direct reasons to blame them as the company has given all the blame on the computer systems.

Several steps can be taken regarding this case. Firstly, although there are no direct proofs of company’s mishandling, they can still be sued for mismanagement of the client’s resources. The company is advised to upgrade the computer systems so that these type of cases do not happen in the future. Moreover, the employees should be trained more to make them competent with the latest technology so that handle client’s information more efficiently and manage to identify errors anytime.

There are two options in this case. The first option is that, the affected clients can use legal help to retrieve their resources and rectify their records in the company’s system. This will also discourage the company to get away with these errors in the future. The second option is that the company should immediately change its computer systems and rectify all existing errors regarding the clients’ information. This will ensure the errors will not happen in the future.

Issues Presented in the Case

The best option is the complete overhaul of the company’s computer systems. This will be long term solution that will not only ensure these cases will not happen in future but will also help the company to increase its reliability within the customers.

In this case, there are two different scenarios. In the first scenario, the manager of the company does not know anything about the programming operations and hence, he orders his employee to complete the task within a limited time. In the second scenario, the employee, unable to complete the task in time, steals the work of some other employee, incorporates it into her own work, and submitted it in time. Now, the issue in this case is that, the employee, whose work is stolen, does not even know about it and as Jean submitted her work already, the employee who actually did the work will get caught due to theft of work when he submits his program.

The facts in this case are as follows:

  • The manager of the company does not know anything about the programming operations. He does not understand the complexity of the programs and moreover, he does not care how the work will be done.
  • The employee, unable to complete the task in time, steals the work of some other employee, incorporates it into her own work, and submitted it in time. Here, in order to complete her job, she steals someone else’s work without acknowledgement or even documentation.
  • The main fact here is that, the company will benefit from the works but if the theft is caught, the responsible person will be the employee that will result in severe punishment. On the other hand, if the employee could not submit the work in time, then also he / she would get punished.

There are several issues in this case. The first and the most major issue is lack of professionalism within the employer as well as employee. The employer has no knowledge regarding the complexity of works or the programs and orders one employee to complete it in time. On the other hand, in order to complete the task in time, the employee steals someone else’s work and incorporates within her work without acknowledgement. Another issue is that, the employee will be affected and face punishment in any case if the task is not completed or the theft is caught.

The only one to be affected in this case will be one of the two employees. The first employee, Jean, would have been punished if she could not submit the work in time. Again, if the act of stealing is caught, she would be punished severely. On the other hand, if Jean is not identified to be the stealer, the other employee, whose work was stolen will be caught and punished. However, the company is not affected by any of these and will only reap benefits from the work, whether it is stolen or original.

The main ethical issue that arises from this case is that only the employees are negatively affected one way or another. The employee is not given sufficient time to complete a particular task and if he steals someone’s work to complete the task in time, again he is prosecuted for stealing. However, the problem stills persists. As long as changes are brought in the company’s operations, these ethical issues will continue to happen and more and more employees will be made scapegoats.

The only thing that can be done in this case is complete overhaul of the company’s operational structure. This should include better handling of the operations and management of duties. For this, the task should be allocated among employees by better allocation of time. This will help the employees to work on their own without stealing other’s works. Moreover, if such cases happen again, the manager should also face penalty. This way, the manager would not exert so much pressure on the employee in the near future.

Ethical Issues

There is only one option for the mitigation of the issues – a complete overhaul in the company’s management system with better handling of managers and employees. There should be proper guidelines on the employee management as well as work ethics of the employees. Without these steps, the same issues will continue to go on. Again, a number of experts are to be employed who will be able to estimate some timeline needed for a particular programming task so that the employees are provided with sufficient time for doing a task.

The option is selected for two main reasons – to introduce better management of tasks and employees and maintain work ethics of the employees. This is also ensure fair handling of operations and employees and none of the employees will be punished without right reasons and proofs. 

In this story, the dilemma of the new expert related to the changes in the technical system is highlighted. Here, the new expert has found that there too many bugs and technical glitches that cannot be solved completely and ultimately, the whole system will crash causing loss of huge amount of data. However, the company has rejected the demands of overhauling the complete system to bring in new technology and ordered the expert to work on the existing system.

The facts are as follows:

  • The previous expert could do not complete the work and due to inexperience, he has created a lot of permanent bugs and technical glitches.
  • After that expert left, the new expert analyzed the system and found that the bugs cannot be deleted permanently and ultimately, these will cause the whole system to shut down completely with loss of all the data within the system.
  • After analyzing the report, the company has decided to reject the expert’s advice to change the technology and the system completely. The company wants to stick to the current system and orders the expert to continue working on the system and remove the errors anyhow.

The issues are as follows:

  1. The new expert has detected the bugs and glitches in the system and understood how harmful these are to the system. He has also found that these bugs cannot be deleted and in near future, these bugs will completely destroy the whole system.
  2. The immense experience of the expert drives him to the conclusion that the framework is unstable to the point that it will in the end degenerate beyond recovery and that every one of its information will get to be unrecoverable. He along these lines advises the chief with respect to his discoveries and suggests that the framework be redeveloped utilizing fitting advancements and quality control measures. He demonstrates that the whole redevelopment exertion will take around 6 weeks.
  • The administrator rejects the expert’s suggestion, expressing that their IT Department will not consent to an adjustment in innovation, and guides him to finish the undertaking utilizing the current technologies.

In this case, the expert will be affected for short term and the company itself in the long term.

The only thing that can be done here is changing the company’s policy in the handling of the technological aspects. The company officials must understand the long term effects of the issues mentioned by the expert. In addition, they should understand that although changing existing frameworks will involve large expenses; this will settle the issues that will damage the company in the long run. Moreover, the company should change its policy of sticking to its fixed guidelines and should consider experts’ feedbacks more carefully.

There are two options available here.

  1. The expert should continue to work on the existing system with his own techniques. However, he should note down every aspects, bugs and other errors in the system everyday and should also notify the company that he will not be responsible for the system corruption and loss of documents in the future, as the system bugs have been created by the previous expert.
  2. The company must change its policy in the handling of the technological aspects. The company officials must understand the long term effects of the issues mentioned by the expert. In addition, they ought to comprehend that albeit changing existing systems will include huge costs; this will settle the issues that will harm the organization over the long haul. In addition, the organization ought to change its approach of adhering to its settled rules and ought to consider specialists' reports more carefully.

The second option is best for this case. For the first option, the expert may avoid penalty, but the company will lose huge amounts of data as well as the system and ultimately, the system will need an overhaul and that will involve more expenses. For the second option, the company has to bear the expenses of the new technologies and systems, but this will ultimately benefit the company in the long run. The issues of bugs and technical glitches will not occur and the expert will be able to work on the system effectively and efficiently. The management system of the company needs overhaul as need for analytic power to understand the long term harmful effects of buggy systems. 

The classical ethical theories are as follows (Australian Computer Society, 2012).

Consequentialist Theory - This theory analyses “the consequences of an issue and classify them as good or bad. Some of the effects are intrinsically good or intrinsically bad. This theory is used to analyze these intrinsically bad effects of the story consequences to understand the amount of ethical issue associated with the story.” (Saha, 2015)

Suggested Solutions

Deontological Theory - This theory deals with “the consequences of some ethical issues that cannot be explained by general use of words. This theory is used to analyze the consequences on a larger scale. To be precise, this theory is used to understand the extent of violation of basic rights and privacy of an individual.” (Slade & Prinsloo, 2013)

Virtue Theory - This theory deals with “the moral values associated with the particular story. The theory describes about the preservation or destruction of honesty in a selected story.” (Sosa, 2015)

The first case is described properly by the deontological theory (Goodman & Meslin, 2014). This theory deals with the ethical issues that violate basic rights of an individual. In the first case, the clients’ basic rights are violated by the company. Although the company is not involved in direct violation, the errors in the existing systems and incompetency of the employees are the driving forces behind the issue.

The second case is dealt by virtue theory (Nathan, 2015). This theory is based on ethical issues that are associated with destruction of honesty of an individual. In this case, the employee, unable to complete the task in time, steals other employee’s work and uses it in her own task. Hence, the basic virtue (or moral value) of the employee is not maintained, regardless of consequences.

The third case is described by consequentialist theory (Stahl, Flick & Hall, 2013). This theory deals with the intrinsically bad effects of the story consequences to understand the amount of ethical issue associated with the story. In this story, the bad effects of the issues are inevitable unless the systems are not replaced by the company. However, the company does not understand the intrinsically bad effects and does not take necessary steps.

Introduction

Whistle blowing is the act, for an employee (or former employee), of disclosing what he believes to be unethical or illegal behavior to higher management (internal whistle-blowing) or to an external authority or the public (external whistle-blowing) (Ahmad, Maynard & Park, 2014). The actual nature is debated; as noted by several authors, “some see [whistle blowers] as individuals who violate organizational loyalty norms; others see them as truthful follower of values. They consider company loyalty to be more important than colleague relation or friendship (e.g., the public health, truth-in-advertising, environmental respect)”. Some authors said that whistle blowers are “those who raise ethical issues are treated as disturbed or morally suspect” (Albugarni & Ahmed, 2015). Some authors asked whether whistle blowers really crackpots.

In this essay, the immoral effects of whistle blowing have been discussed.

Whistle blowers are the individuals who sound the caution on misuse of devices, crimes, misbehavior or acting against company policy. There are unmistakably illegal activities, for instance, pay off , burglary, and extortion. They also include offenses like isolation in work, negligence in manner and work, resource wastage, trickery, and security violation (Anderson, 2015). In a couple of implications of whistle blowing the whistle is simply held to have been blown if the carelessness is made known in an open assembling or put on open record. That understanding of whistle blowing is in no short of what one sense conflicting with its inspiration, which is to put right a found off course (Baskerville, Spagnoletti and Kim, 2014). In case a wrong can be remedied inside a relationship by strategy for inside disturbing work power to its occasion, then there may be no prerequisite for the whistle blower to air a protesting in an open social affair. The writing on whistle blowing is partitioned on this point (Cezar, Cavusoglu & Raghunathan, 2013).

A late article in the Journal of Business Ethics looked to build up a prohibitive meaning of whistle blowing that would limit its intending to the individuals who go to an outside element or to an open discussion with data of negligence. Then again, the term is often utilized as a part of the writing to incorporate any divulgence of negligence whether interior or outer (Chen & Zhao, 2012). While outer whistle blowing is generally done to the outer world from the inner part of the organization, it constantly comes about because of a mix of the disappointment of the informant with a disappointment of interior divulgence to address the issue, or a recognition that inward exposure will be pointless, combined with the as a matter of fact subjective judgment of a person with regards to the outcomes of not blowing the whistle (Crossler et al., 2013).

In all cases concentrated on, and in the most part of cases considered, informants blew inside information through internal channels before going outside their association. In every situation where they did as such, they trusted that their association would bolster their endeavor to wipe out or counteract negligence (Albugarni & Ahmed, 2015). American research recommends that workers go to outer powers 'just once they come to trust that interior channels are shut to them, that the association is not moral, and that senior administration is dormant or complicit in the wrongdoing' (Stack, Watson & Abbott-Chapman, 2013). It is the disappointment of the association, or of a senior individual or persons inside it, to make a move that prompts the choice to reveal outside the association, whether to an administrative power, to the media, or somewhere else. Few whistle blowers appear to have profoundly considered or were even mindful of the presumable individual results of outer divulgence. Inside divulgence was at first accepted by most by far of whistle blowers to be the time when the reported negligence would be redressed (Tamjidyamcholo, Baba, Tamjid & Gholipour, 2013). Overall, inner revelation has as much claim to be viewed as whistle blowing as does the choice of going outside the association.

Authors therefore define whistle blowing as follows: ‘Whistle blowing is the deliberate, voluntary disclosure of individual or organizational malpractice by a person who has or had privileged access to data, events or information about an actual, suspected or anticipated wrongdoing within or by an organization that is within its ability to control (Taylor, Fritsch & Liederbach, 2014). The disclosure may be internal or external and may or may not enter the public record’. The primary intention of whistleblower protection legislation is to discourage workplace reprisals against whistleblowers. According to the ICAC study, “71 percent of those surveyed expected that people who reported corruption would suffer for reporting it. Those who had been in the public service for more than a year were much more likely to hold this view that those who had been employed for less than a year (73 percent vs. 55 percent) (Vacca, 2012). One third of those surveyed were not confident that their organization would handle reports of corruption appropriately, with markedly less confidence in rural areas. While 84 percent believed that something could be done about corruption, only 26 percent believed that something would be done about it”.

Work environment retaliations happened against some 66% of the individuals who formally reported negligence. Both official and informal retaliations were analyzed (Vaughn, 2015). These generally happen in the private area. Official responses rebuff the informant for standing up. They are hidden behind approach and methodology, generally to maintain a strategic distance from cases of exploitation, and incorporate formal censure, corrective exchange, referral to a specialist or instructor, and poor execution audits (Von Solms & Van Niekerk, 2013). An extensive variety of lesser strategies incorporate block of the examination, withdrawal of key assets, being kept oblivious, being antagonistically reported over different matters, and the connection of unfriendly staff record notes. 

Conclusion

From the essay, it is clear there are deep lying effects of whistle blowing in offices that may affect the careers of both the informant as well as the wrong doer. Hence, whistle blowing should be banned in order to maintain integrity and an ethical environment within the office premises. Another issue is that, some whistle blowers complain about someone ever they he has not done anything wrong. To catch and punish the wrong doers, the higher officials should use computerized monitoring techniques and permanently ban whistle blowing system.

Introduction

ACS has some fixed guidelines regarding the professionalism policies and responsibilities. Following these guidelines, there are some specific responsibilities of the professionals (ACS Code of Professional Conduct Professional Standards Board Australian Computer Society, 2016). In this essay, the implications of special responsibilities of professional members of ACS from the practitioner point of view have been discussed.

ACS's objective of the proposed system is to encourage the configuration of degree projects that deliver graduates with the aptitudes required for characterized ICT parts. The level of self-governance and obligation at which the ability is honed ought to likewise be set up. On a very basic level, these aptitudes require the utilization of hidden learning that is both wide and profound, and must incorporate both specialized and expert information regions. The guidelines for the professionalism in ACS are as follows:

  • Recognize potential ICT parts that could be embraced by alumni of a given system of study. These parts may be bland, such that all alumni from a specific degree system would be qualified to attempt a scope of graduate parts inside a given ICT discipline (Yang, Shieh & Tzeng, 2013). Notwithstanding, a project may to place more accentuation on specific parts inside that teach. This may be on account of an organization has perceived skill in a given territory or in light of the fact that there are local business open doors for graduates with a specific core interest.
  • Distinguish the aptitudes required by experts in a given ICT profession part. Recognize the kind of assignments that an expert working in given ICT profession role(s) would typically be equipped for performing (Yusri & Goodwin, 2013). These might be the kind of errands that are regularly required to work in industry, or they might be the sort of assignments all the more every now and again connected with an exploration centered vocation way.
  • Recognize the level of self-sufficiency and obligation created. It ought to be conceivable to show that alumni of a system work at sensible levels of self-rule and obligation as characterized by SFIA (Broadbent & Papadopoulos, 2013).
  • Distinguish the ICT Role‐Specific Knowledge required to rehearse the aptitudes. Where conceivable, globally perceived educational module and collections of learning ought to be utilized to help with distinguishing Role‐Specific Knowledge (Burmeister et al., 2014). For ICT zones that do not have a formal educational program or group of learning, supporting information ought to be recognized utilizing other fitting sources as a part of counsel with the system's Industry Advisory Board (Van den Hoven, Van de Poel & Vermaas, 2014). It ought to be conceivable to show that understudies gain learning to an appropriate profundity and broadness.
  • Recognize Complementary Knowledge that backings the aptitude set or that expands understudy employability. As software‐based items or administrations are normally offered in conjunction with a business, numerous ICT profession parts will require information of business capacities and procedures (Ahmad, Maynard & Park, 2014). Moreover, vocation prospects may be upgraded from locally critical correlative controls. For instance, learning of flying may be valuable in locales where aviation associations are pervasive.
  • Plan a course structure that joins ICT Role Specific Knowledge with the Core Body of Knowledge and other Complementary Knowledge as a feature of an all encompassing project of study (Broadbent & Papadopoulos, 2013). For instance, a course structure ought to framework propelled learning on top of programming basics and task administration themes from the ICT Knowledge Area of the CBOK.
  • Gather relics to show that abilities have been produced by understudies to a fitting level. This for the most part requires that a delegate test of understudy work be gathered to show that abilities have been produced to a fitting level (Yang, Shieh & Tzeng, 2013). Tests will be made accessible to accreditation boards for review. Ancient rarities delivered by understudies in conjunction with a capstone task are a decent wellspring of material for showing the aptitudes accomplished by understudies.

The issue of "professionalism" is vital and wide‐ranging. Different bodies have given in‐ profundity treatment of the issue and this report ought to be perused against that foundation. For instance, CC2001 has a section on "Expert Practice" (Ch 10, pp. 55‐61), which is valuable (Yusri & Goodwin, 2013). The IP3 Taskforce is as of now concentrating on the issue with regards to proficient accreditation. The past ACS CBOK determined the necessities for Ethics/Social Implications/Professional Practice and Interpersonal Communications (Yang, Shieh & Tzeng, 2013). The SFIA in its Levels of Autonomy and Responsibility Axis notice degrees of self-sufficiency, impact and multifaceted nature, and "Business Skills" including information of measures, critical thinking, correspondence, arranging and booking, quality, wellbeing and security, obtaining new learning, and energy about industry exercises and authoritative connections (Slade & Prinsloo, 2013). It is comprehended that Professional Knowledge themes should be tended to at numerous levels in various phases of expert advancement. The very way of expert work implies that some learning and abilities are best created through experience and that comprehension of complex issues, for example, morals develops with development. In this manner, the objectives for creating proficient information/aptitudes will be diverse at entry‐level (graduate) than at full proficient level (a confirmation program) (Skues & Cunningham, 2013). The themes for the Professional Knowledge Areas were created by mapping shared characteristics over the diverse disciplinary educational programs determinations. Experts ought to have some information of where and when their order started and how it has advanced, notwithstanding comprehension of continuous issues in the control. A comprehension is required of how to create or get programming (data) frameworks that fulfill the prerequisites of clients and clients (Siponen, Mahmood & Pahnila, 2014). All periods of the lifecycle of a data framework ought to be comprehended including: prerequisite examination (frameworks investigation) and determination, outline, development, testing and operation and support. There ought to likewise be learning of procedures and procedures for creating frameworks. Wording for this region fluctuates from 'frameworks advancement' in Information Systems to 'programming designing' in Software Engineering and Computer Science, to 'frameworks obtaining and reconciliation' in Information Technology (Siponen & Vance, 2014). The component that recognizes this range from "writing computer programs" is that frameworks advancement/programming building learning is connected to bigger programming frameworks, where nobody individual has complete information of the entire framework. Obviously, a significant number of the standards required in creating bigger programming frameworks likewise apply to littler bits of programming (projects). 

Conclusion

From the essay, the responsibilities of ACS professionals are clear. ACS has designed a number of criteria to appoint their professionals. The level of self-governance and obligation at which the ability is honed ought to likewise be set up. On a very basic level, these aptitudes require the utilization of hidden learning that is both wide and profound, and must incorporate both specialized and expert information regions (Prestridge, 2012). The themes for the Professional Knowledge Areas were created by mapping shared characteristics over the diverse disciplinary educational programs determinations. Experts ought to have some information of where and when their order started and how it has advanced, notwithstanding comprehension of continuous issues in the control. A comprehension is required of how to create or get programming (data) frameworks that fulfill the prerequisites of clients and clients.

Introduction

Information and Communication Technology is widely used in business and commercial organizations for enhancing the services as well as organizational structure (Disterer, 2013). Information and Communication Technology (ICT in short) involves increased use of computer systems and other related technologies in the business procedures like accounting, finances, maintenance of financial and operational reports and others. Moreover, ICT technology is also used for the storage of company’s files and business strategies in a virtual storage interface. However, there are threats to ICT systems (Hansson, 2013). The main threats are breach of privacy of the confidential documents and unethical cyber attacks. Hence, maintenance of privacy is needed in any organization that has implemented ICT.

Reasons of facing privacy issues

Since ICT involves enhanced use of the computer systems as well as internet networks, threats regarding maintenance of privacy arise frequently. The main issues regarding privacy of the companies that have implemented ICT are as follows:

Internal System Malwares – In spite of the fact that this is not a part of the major threats expected by the organizations, despite everything it represents a threat to the organizations’ document storage framework operations (Hu et al., 2012). Internal system malwares are produced from corrupt files or programming projects and they may totally close down the tainted framework . In the event that the frameworks of the organization close down because of malwares, the organization would lose huge amount of data and basic documents.

External Malwares - However, the malware talked about above is just a simple kind of malware. There are much more unsafe malwares like virus attacks, Trojan horses, spywares and others. These malwares mostly go into the system from outside sources (Ifinedo, 2012). Case in point, some messages go to the system inbox with data about some crazy offers and a link for a website. The minute the client taps on the connection, the malignant infection associated with the connection goes into the framework taints it. Capable virus attacks like Trojan horse can totally obliterate a framework alongside every other framework associated with the same network. Now and again, there are virus attacks that are made by some unknown identities (Kolkowska & Dhillon, 2013). They utilize the virus attacks for hacking into different frameworks for the sole reason for pulverization. Again, there are spywares that are utilized to screen the exercises done inside a framework.

Packet Sniffers – These are programming tools that are for the most part utilized by associations to screen the internal operations in their own particular systems and monitor malware operations (Laszka, Felegyhazi & Buttyan, 2015). Be that as it may, there are some outsider associations that misuse these tools for checking framework exercises of other organizations. This is a sort of breach of security that debilitates to release secret data of the business associations.

Unauthorized Access – This is done by unethical hackers or third party members keeping in mind the end goal to get to data of an organization without the knowledge of the organization authority (Lee, Geng & Raghunathan, 2013). This should likewise be possible by the internal representatives of the organization. This episode happens when an ordinary worker gets to data of the organization that is limited and not took into consideration representative access. The programmers and outsider staff however utilize spywares to screen the utilization of the id and pass code designs in the framework and afterward they utilize them for unauthorized access (Lowry, Posey, Bennett & Roberts, 2015). There have been numerous situations where these unauthorized personnel gets to went unnoticed that eventually brought about loss of numerous documents and records of the organization. Nevertheless, because of use of framework alarms, numerous instances of unapproved access have been gotten before any loss of reports or data.

Loss of Device – To explain this case, an example is to be taken. Let an employee of a company takes his working computer for working at home. Now, on his way back home, he leaves the system in the cab or the system is stolen (Pegrum, Oakley & Faulkner, 2013). After this, the system reaches the hands of a hacker and he uses every information stored in it to access the company’s systems and extracts important documents. This will cause big losses for the company if suitable steps are not taken immediately.

No Knowledge of Network Security among the Company Employees – Sometimes, the employees of the company do not have sufficient knowledge regarding network security applications or what to do in case of a breach of security attack (Peltier, 2013). Due to this, the suitable actions are not taken in time, helping the attackers access critical information easily.

Objections related to the positions

There are several objections related to this situation. Authors have argued that these situations would not have been raised if the organizations increased or sufficiently implemented network securities in their systems. Most of the privacy threats in ICT systems occur due to insufficient or poor security measures (Posey, Roberts, Lowry & Hightower, 2014). Moreover, some are even caused by internal employees of the company who access confidential files of the company without authorization. Hence, the companies must reinforce privacy security as well as monitoring systems in order to catch wrong doers easily.

Conclusion

From the essay, it is clear that maintenance of privacy is important for maintaining business of an ICT implemented organization. . Information and Communication Technology (ICT in short) involves increased use of computer systems and other related technologies in the business procedures like accounting, finances, maintenance of financial and operational reports and others. Since ICT involves enhanced use of the computer systems as well as internet networks, threats regarding maintenance of privacy arise frequently. 

References

ACS Code of Professional Conduct Professional Standards Board Australian Computer Society. 

Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), 357-370.

Albugarni, S. and Ahmed, V., 2015. Success factors for ICT implementation in Saudi secondary schools: From the perspective of ICT directors, head teachers, teachers and students. International Journal of Education and Development using Information and Communication Technology, 11(1), p.36.

Ancker, J. S., Silver, M., Miller, M. C., & Kaushal, R. (2013). Consumer experience with and attitudes toward health information technology: a nationwide survey. Journal of the American Medical Informatics Association,20(1), 152-156.

Anderson, N., 2015. Digital technologies and equity: gender, digital divide and rurality. Teaching and Digital Technologies: Big Issues and Critical Questions, p.46.

Australian Computer Society (2012).

Bagshaw, E. (2015). Tech crisis: Only half of Australia's students IT savvy.

Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managing a strategic balance between prevention and response. Information & management, 51(1), 138-151.

Bilbao-Osorio, B., Dutta, S., & Lanvin, B. (2013). The global information technology report 2013.

Broadbent, R., & Papadopoulos, T. (2013). Bridging the digital divide–An Australian story. Behaviour & Information Technology, 32(1), 4-13.

Burmeister, O., Al-Saggaf, Y., Schwartz, M., & Johnson, L. (2014). Internet resources to help Australian ICT professionals identify and solve ethical challenges. ACIS.

Cezar, A., Cavusoglu, H., & Raghunathan, S. (2013). Outsourcing information security: Contracting issues and security implications.Management Science, 60(3), 638-657.

Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. computers & security, 32, 90-101.

Davison, R. M., Ou, C. X., & Martinsons, M. G. (2013). Information technology to support informal knowledge sharing. Information Systems Journal, 23(1), 89-109.

Disterer, G., 2013. ISO/IEC 27000, 27001 and 27002 for information security management.

Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare(Vol. 14). Springer Science & Business Media.

Friedman, B., Kahn Jr, P. H., Borning, A., & Huldtgren, A. (2013). Value sensitive design and information systems. In Early engagement and new technologies: Opening up the laboratory (pp. 55-95). Springer Netherlands.

Goodman, K. W., & Meslin, E. M. (2014). Ethics, information technology, and public health: duties and challenges in computational epidemiology (pp. 191-209). Springer London.

Hansson, S. O. (2013). Difficulties for Moral Theories. In The Ethics of Risk(pp. 21-43). Palgrave Macmillan UK.

Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing employee compliance with information security policies: the critical role of top management and organizational culture*. Decision Sciences, 43(4), 615-660.

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95.

Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology. Canadian Public Administration, 57(2), 295-317.

Kerven, D., & Meso, P. (2016). Adding a Student Research Component to an Information Technology Ethics Course.

Kolkowska, E., & Dhillon, G. (2013). Organizational power and information security rule compliance. Computers & Security, 33, 3-11.

Kowal, J., & Roztocki, N. (2013). Organizational Ethics and Job Satisfaction of Information Technology Professionals in Poland.

Laszka, A., Felegyhazi, M., & Buttyan, L. (2015). A survey of interdependent information security games. ACM Computing Surveys (CSUR), 47(2), 23.

Lee, C. H., Geng, X., & Raghunathan, S. (2013). Contracting information security in the presence of double moral hazard. Information Systems Research, 24(2), 295-311.

Lind, T. and Stjernström, O., 2015. Organizational Challenges for Schools in Rural Municipalities: Cross-National Comparisons in a Nordic Context.Journal of Research in Rural Education (Online), 30(6), p.1.

Lowry, P. B., Posey, C., Bennett, R. B. J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust.Information Systems Journal, 25(3), 193-273.

Luftman, J., Zadeh, H. S., Derksen, B., Santana, M., Rigoni, E. H., & Huang, Z. D. (2013). Key information technology and management issues 2012–2013: an international study. Journal of Information Technology, 28(4), 354-366.

Luftman, J., Zadeh, H. S., Derksen, B., Santana, M., Rigoni, E. H., & Huang, Z. D. (2012). Key information technology and management issues 2011–2012: an international study. Journal of Information Technology, 27(3), 198-212.

Marchewka, J. T. (2014). Information technology project management. John Wiley & Sons.

Nathan, G. (2015). Innovation process and ethics in technology: an approach to ethical (responsible) innovation governance. Journal on Chain and Network Science, 15(2), 119-134.

Pegrum, M., Oakley, G. and Faulkner, R., 2013. Schools going mobile: A study of the adoption of mobile handheld technologies in Western Australian independent schools. Australasian Journal of Educational Technology, 29(1), pp.66-81.

Peltier, T. R. (2013). Information security fundamentals. CRC Press.

Poole, B. J., & Sky-McIlvain, E. (2014). Education for an information age.

Posey, C., Roberts, T. L., Lowry, P. B., & Hightower, R. T. (2014). Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Information & management, 51(5), 551-567.

Prestridge, S., 2012. The beliefs behind the teacher that influences their ICT practices. Computers & education, 58(1), pp.449-458.

Quinn, M. J. (2014). Ethics for the information age. Pearson.

Raggatt, M. (2016). Digital technologies value to boom but women and mature aged missing out. The Sydney Morning Herald. Retrieved 21 April 2016, from https://www.smh.com.au/technology/sci-tech/digital-technologies-value-to-boom-but-women-and-mature-aged-missing-out-20160317-gnlg1w.html

Robey, D., Anderson, C., & Raymond, B. (2013). Information technology, materiality, and organizational change: A professional odyssey. Journal of the Association for Information Systems, 14(7), 379.

Rothlin, S., & McCann, D. (2016). The Social Environment: Ethics and Information Technology. In International Business Ethics (pp. 341-363). Springer Berlin Heidelberg.

Saha, B. (2015). The analytical study of the application of the ethical theories in the business governance. Scholedge International Journal of Business Policy & Governance ISSN 2394-3351,1(3), 28-31.

Siponen, M., & Vance, A. (2014). Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems, 23(3), 289-305.

Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.

Skues, J.L. and Cunningham, E.G., 2013. The role of e‐learning coaches in Australian secondary schools. Journal of Computer Assisted Learning, 29(2), pp.179-187.

Slade, S., & Prinsloo, P. (2013). Learning analytics ethical issues and dilemmas. American Behavioral Scientist, 57(10), 1510-1529.

Sosa, D. (2015). 6 The Vice of Virtue Theory. Moral and Intellectual Virtues in Western and Chinese Philosophy: The Turn Toward Virtue, 77.

Stack, S., Watson, J. and Abbott-Chapman, J., 2013. The national broadband network and the challenges of creating connectivity in education: The case of Tasmania. Australasian Journal of Educational Technology,29(2), pp.283-302.

Stahl, B. C., Eden, G., Jirotka, M., & Coeckelbergh, M. (2014). From Computer Ethics to Responsible Research and Innovation in ICT: The transition of reference discourses informing ethics-related research in information systems. Information & Management, 51(6), 810-818.

Stahl, B. C., Flick, C., & Hall, R. (2013). Evaluating research quality in technology ethics. The possibilities of ethical ICT, 435.

Stahl, B. C., Flick, C., & Hall, R. (2013). Evaluating research quality in technology ethics. The possibilities of ethical ICT, 435.

Tamjidyamcholo, A., Baba, M. S. B., Tamjid, H., & Gholipour, R. (2013). Information security–Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language. Computers & Education, 68, 223-232.

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.

Tran, S. T., Le Ngoc Thanh, N. Q. B., & Phuong, D. B. (2013). Introduction to information technology. In Proc. of the 9th inter. CDIO conf.(CDIO).

Vacca, J. R. (2012). Computer and information security handbook. Newnes.

Van den Hoven, J., Van de Poel, I., & Vermaas, P. E. (2014). Handbook of ethics, values and technological design. Dordrecht: Springer.

Vaughn, L. (2015). Doing ethics: Moral reasoning and contemporary issues. WW Norton & Company.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.

Warren, M., & Lucas, R. (2016). Ethics and ICT: Why all the fuss?. Journal of Information, Communication and Ethics in Society, 14(2).

Yang, Y. P. O., Shieh, H. M., & Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Information Sciences, 232, 482-500.

Yusri, I.K. and Goodwin, R., 2013. Mobile learning for ICT training: Enhancing ICT skill of teachers in Indonesia. International Journal of e-Education, e-Business, e-Management and e-Learning, 3(4), p.293.

References

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Case Study On Inefficient Operations And Incompetent Employees. Retrieved from https://myassignmenthelp.com/free-samples/case-study-software-operations-are-harming-common-peoples.

"Case Study On Inefficient Operations And Incompetent Employees." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/case-study-software-operations-are-harming-common-peoples.

My Assignment Help (2017) Case Study On Inefficient Operations And Incompetent Employees [Online]. Available from: https://myassignmenthelp.com/free-samples/case-study-software-operations-are-harming-common-peoples
[Accessed 19 April 2024].

My Assignment Help. 'Case Study On Inefficient Operations And Incompetent Employees' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/case-study-software-operations-are-harming-common-peoples> accessed 19 April 2024.

My Assignment Help. Case Study On Inefficient Operations And Incompetent Employees [Internet]. My Assignment Help. 2017 [cited 19 April 2024]. Available from: https://myassignmenthelp.com/free-samples/case-study-software-operations-are-harming-common-peoples.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close