While training ICT professionals a lot of emphases is given to the technical skills with little regards to their misuse in a workplace environment. This report highlights common ethical issues and challenges faced by ICT professionals while conducting their workplace duties (Shinder 2005). Moreover, the report highlights this issue while referencing a case study seen in the past where the ethical standards of IT expert were called into question. Now, the report will follow a simple structure where a description of the problem will be given including the people involved. Thereafter an outline of the possible consequences and actions will be given which will then be followed by the foreseeable solutions.
The case study
(For privacy reasons the names of the stakeholders are changed)
John was a system administrator in Company X and held his position for over five years. Throughout this time he executed his duties as required and was set for a promotion as the IT manager. However, the company decided to go with a fresh individual which later on affected John’s performance. John continuously failed to meet the responsibilities given to him as a system admin including coming late to work. In response to his action, the company decided to let him go but with a two weeks’ notice. During this time, John compromised the systems owned by the organisation by leaking sensitive information owned by the employees. Data such as emails, documents and pictures were exposed to the masses in the company’s open network which was integrated to the internet.
As in many ethical cases related to information technology, the case at hand presents serious privacy issues where sensitive data owned by innocent individuals (employees) were leaked by John. As an administrator, John was responsible for the data held by the employees of the organisation and despite his access privileges was supposed to protect the rights of the users (Aynsley 2015). Moreover, confidentiality was lost in the process where an individual given the obligation to store and protect sensitive data failed to live up to his mandate (PRE 2017). In his moment of rage, (despite the prevailing conditions) John exposed data and systems that were entrusted to him by the organisation. Yes, he could plead innocent and cover his tracks to avoid prosecution but his moral code should have prevented him from conducting the said actions.
Finally, the security of both the organisation and employees was compromised as the leaked information may end up in the wrong hands and could be used to conduct malicious activities e.g. extortion. As an ethical issue, security will house all elements that pertain to the safety of information. These elements include administrative structures, physical systems and technical components. In this case, the administrative structures are compromised due to the actions of the administrator who uses his technical skills to conduct the heinous act. (Patrignani 2009).
First on the list is John, the perpetrator of the incidence and the focus of the case study. His deliberate actions to leak confidential information exposes not only the people involved but also the entire organisation as a whole as it falls within legal liabilities. Moreover, John breaches all ethical standards that an IT professional should have by allowing his emotions get better of him. Furthermore, even though the direct consequences may fail to affect him, he loses credibility in the field as an ICT expert which may affect his career options in the future. In addition to this, if verified, he is also liable to legal prosecution based on his actions (Mason 1986).
Secondly, we have the employees whose data is leaked by John as a retaliation to the actions conducted by the company. As a consequence to these actions, the employees may be subject to extortion schemes by malicious individuals who may access the information. Moreover, their psychological state may be affected when they discover that their confidential data including files such as pictures were leaked to the masses. Finally, the organisation is also another stakeholder in the case study. Company X can also be liable to legal suits as it failed to protect the data entrusted to it by the employees. Furthermore, it risks losing business if the customers become aware of the proceedings. In essence, the customers, as well as other business partners, may lose trust in the organisation, therefore, choose to go elsewhere to conduct business (Schreiner 2017).
While borrowing from the ACS code of ethics, there is a serious breach of the ethical standards outlined. For one, the interests of the public are completely ignored where the expert does not consider the consequences of his actions. In fact, when critically analysed the public represented by the employees stand to lose the most as compared to other stakeholders, this because they fall victim to a situation they had no control over. Secondly, the competence of the expert falls short in two incidences; one, when he loses the position he desires (IT managers) and two when he fails to conduct his duties diligently despite the prevailing conditions (ACS 2017).
Furthermore, there is a lack of professionalism where the perpetrator fails to uphold his integrity more so to the society by exposing the data owned by his fellow colleagues. Therefore, he breaches his professionalism standards which are also attributed to his failed professional development standards, another ethical code of conduct (Caramela 2016). In light of these actions, he risks losing his career and exposes the company to serious security and privacy problems. Moreover, he aggravates the growing concerns on technological systems supported by IT experts such as system admins.
As a company, the first and most important action, when faced with a data breach, is to manage the communication response. In essence, Company X should establish a strategic plan on the method it will use to communicate the incidence to the affected parties. This cause of action is particularly crucial today where social media and other communication mediums can be used to panic the parties involved. Secondly, the company should accept full responsibility for the situation and execute steps that will contain the breach. For instance, if the existing systems are compromised and still leaking information, they should be disabled while a new structure is formulated.
After managing the events i.e. stopping the breach, a thorough analysis of the situation should be conducted to establish a baseline for the lost data. This baseline is then used to retrieve and compensate the affected parties. Finally, the organisation should highlight the mistakes made before and outline solutions that will prevent the same incidences from occurring in the future. Therefore, preventing similar incidences in the future should be the last step taken after a data breach. For instance, Company X could lower the privileges owned by a system admin by sharing the authority with another member of the organisation such as the IT manager. This outlook would share the responsibilities of the IT infrastructure between several competent individuals which would promote accountability. In the end, the actions conducted by John would act a valuable lesson for the organisation and its system security.
ACS, 2017, ACS code of ethics. Available at: https://www.acs.org.au/content/dam/acs/acs-documents/Code-of-Ethics.pdf [Accessed 11 May, 2017]
Aynsley. B, 2015, Ethics essential for ICT professionals. Business review. Available at: https://www.theaustralian.com.au/business/technology/opinion/ethics-essential-for-ict-professionals/news-story/78307af0586683a61e7a0d537c5f6cf8 [Accessed 11 May, 2017]
Caramela. S, 2016, Have You Been Hacked? How to Recover from a Data Breach. Business news daily. Available at: https://www.businessnewsdaily.com/8001-have-you-been-hacked-how-to-recover-from-a-data-breach.html [Accessed 11 May, 2017]
Mason. R, 1986, Four Ethical Issues of the Information Age. Management Information Systems Quarterly. Available at: https://www.gdrc.org/info-design/4-ethics.html [Accessed 11 May, 2017]
Patrignani. N, 2009, Teaching Computer Ethics: Challenges and Methodologies. The case of Italian Universities. Available at: https://www.it.uu.se/edu/course/homepage/itetikorg/vt09/Norberto-Patrignani-Uppsala050509.pdf [Accessed 11 May, 2017]
PTR, 2017, TCPS 2 - Chapter 5: Privacy and Confidentiality. Government of Canada. Available at: https://www.pre.ethics.gc.ca/eng/policy-politique/initiatives/tcps2-eptc2/chapter5-chapitre5/
Schreiner. E, 2017, How Is Trust Lost in a Business Relationship? Chron. Available at: https://smallbusiness.chron.com/trust-lost-business-relationship-19338.html [Accessed 11 May, 2017]
Shinder. D, 2015, Ethical issues for IT security professionals. Computer world. Available at: https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-professionals.html [Accessed 11 May, 2017]
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Ethical Issues In The Ict Profession. Retrieved from https://myassignmenthelp.com/free-samples/ethical-issues-in-the-ict-profession.
"Ethical Issues In The Ict Profession." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/ethical-issues-in-the-ict-profession.
My Assignment Help (2018) Ethical Issues In The Ict Profession [Online]. Available from: https://myassignmenthelp.com/free-samples/ethical-issues-in-the-ict-profession
[Accessed 04 April 2020].
My Assignment Help. 'Ethical Issues In The Ict Profession' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/ethical-issues-in-the-ict-profession> accessed 04 April 2020.
My Assignment Help. Ethical Issues In The Ict Profession [Internet]. My Assignment Help. 2018 [cited 04 April 2020]. Available from: https://myassignmenthelp.com/free-samples/ethical-issues-in-the-ict-profession.
For years, MyAssignmenthelp.com has been operating as one of the cheap assignment help providers in the USA. We are one of the best college paper writing services that keep service price minimal. We do not let the affordability of our service to hamper the standard of our work. We have separate teams of experts to provide report writing help . At MyAssigenmnthelp.com, we believe in earning credibility, so students can pay for assignments only after getting satisfied solutions. Tough assignments bother you? Trust us with your project. You will not regret paying us to write assignments for you.
Answer: Introduction: ERP or the Enterprise Resource Planning generally refers to the system which acts as a silver bullet for each and every problem that are faced by various organizations. the implementation of the ERP system is generally associated with providing the organizations with offers related to the chances of re-engineering the business process along with helping in coordination of the systems that are located in different geographi...Read More
Answer: Security Risk Assessment Security Risks, Threats and Vulnerabilities The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment . This form of risk assessment would be able to supp...Read More
Answer: Introduction: Australian Plastic Fabricators is one of the dynamic plastic fabrication company which is located in Sydney’s city fringe and is one of the Greater West supplying acrylic shop fittings to Sydney retail and shop fitting businesses. The organization is also considered to be the one stop shop for meeting all the needs related to Acrylic. Without any kind of doubt this organization can be considered to be the market le...Read More
Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...Read More
Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Thank you so much for your efforts the solution was perfect and submitted on time.
every thing good and Very classy treatment. thank you very much i hope do my thesis with this web
The work was well present, details and met all expectations. This is a prove that I will always use this platform and recommend this site to friends at schools and family. Keep using great people to keep having users. Just after receiving this assign...
good transcript that it make feel good because i don\'t need to worry about no ideas to write this transcript