Write about the Case Study for Diane Company.
Diane runs a consultancy firm. Diane’s Company has several employees as well as clients. They advise their clients for setting up corporate intranets and designing DBMS. They are also responsible for giving security related advises to their clients. Diane has taken up a project to design the DBMS of a company that is medium sized. Diane has allowed the participation of the client in the process of designing. The client opted for a less secured system as the cost of a highly secured system will be high. According to Diane, the system requires more security features as it contains sensitive information.
This report analyzes the entire case study from the ethical point of view. It analyzes the entire situation the is presented in the Diane’s Company case study by taking the help of Doing Ethics Technique or DET. This report answers eight main questions to evaluate the situation and determine whether it is ethical or not. This report also analyzes the Diane’s Company case study from the perspective of ICT Professionals by taking the help of ACS Code of Ethics. This report also combines the analysis based on DET and ACS and gives overall recommendations regarding the situation.
DET or Doing Ethics Techniques is used for the purpose of analyzing ethical issues in various situations (Wachs 2017). This technique helps the people to think in an ethical manner. It does not ensure best solutions but it helps in providing an ethical solution. Eight questions can be answered to get an accurate result. The Diane’s Company case study is analyzed by DET and by answering eight questions as follows:
The Diane’s Company was founded three years ago. It deals in consulting business. Diane is involved in giving several types of corporate advices to the clients. There are several employees and clients of this company. Recently this company has taken up a DBMS project of a company that is medium sized (Bernstein and Jain 2014). The client is also participating in the process of design of the DBMS. Diane has found out that this database will store sensitive and valuable information and therefore it requires advanced and strong security features. The cost of incorporating strong security features will become much more than they had planned and this made the client opt for less secured system. According to Diane, if the system does not have strong security features then it will become easy for any attacker to hack into the system and therefore she gives suggestion to use a strong security system. She tried to explain about the various risks of a less secure system but the computing director, personnel director as well as the CEO was in favor of a less secure system (Shapiro, Stefkovich and Gutierrez 2014). Diane is in a state of dilemma whether she should build a highly or less secure system.
Several facts have been observed in the case study.
There are several issues involved in this case. The case depicted a scenario where Diane can understand the importance of the security risks involved in the DBMS that they are designing for a medium sized company. The client as well as the computing director, personnel director and the CEO is in favor of a system with less security features. They are unable to understand the information security needs of the DBMS. This can lead to a conflict between Diane and directors of the company. This issue of conflict can disturb the harmony of the work environment leading to low productivity and low customer satisfaction (Shafer-Landau 2014). Another issue can be conflict between Diane and the client company. The client company might misunderstand Diane and think that she is suggesting in designing a high security system because of high price. The client company might not understand the real importance of the security needs (Ford and Richardson 2013). This situation can lead to low customer satisfaction. Another important issue that can occur is ethical in nature. Designing a less secured DBMS will harm the company later. It will not be ethical for a IT company to deliver a project with less secure features. Delivering a less secure project will not only affect the reputation of Diane’s Company but also affect the users as their sensitive data will be lost due to any security threat and attack.
The people who are affected in this case study are the CEO, computing director, personnel director, Diane and the client company. There can be conflict among the stakeholders due to the security decisions of the DBMS of the client company. This can lead to disharmony in the work environment leading to low productivity. Low productivity will dissatisfy the customers. On the other hand if the company decides to deliver a low secure DBMS then it will affect the entire reputation of the company (Durkheim 2013). If later on the system’s vulnerabilities are exploited by the attackers to access the sensitive information then it will harm the users of the DBMS. The financial data and other valuable data will be lost. The users will be affected in this case.
IT companies must look into the safety features of the projects that they deliver. They must deliver a safe project incorporating security features in the system. It will not be ethical for a company to deliver an unsafe project that can harm the client company in the future (Dewey 2016). If the company delivers an unsafe project and later on if any security breach occurs then it will harm the reputation of Diane’s company and will also affect the users whose valuable data will be lost.
A mutual decision can be taken in order to resolve this issue. Diane can compromise with her decision. She can compromise with the security features of the DBMS for the client company. This solution is unethical. Diane can explain the importance of information security and convince the client to opt for a highly secure database system.
There are several options that can be taken in order to resolve the issues:
The best option is to convince the client to take up a highly secured DBMS. The client should not compromise the security features because of the cost of the system. If Diane agrees to sell a less secure product to its client company then it will not be an ethical act. Loss of sensitive data will harm the users and it will also affect the reputation of Diane’s Company. According to Deontology theory it is morally correct if Diane carries out her responsibility and delivers a safe system to its client (Conway and Gawronski 2013). Selling a safe product will produce happiness among the users, stakeholders as their data will be secured and it will give happiness to the shareholders of the company as it will create a good reputation of the company (Albee 2014). Therefore according to Utilitarianism theory, this decision is the best decision (Mulgan 2014).
The contract theory can be divided into moral as well as legal contracts that promote ethical activity. In this case study, Diane has entered into a legal contract for developing DBMS for the client company. She knows that the database will contain sensitive data and loss of valuable data can harm the users of the system. Diane’s moral values stop her from developing an insecure or less secure database system as this can cause an adverse effect in the future (Levitt and Moorhead 2013). Therefore the best option according to Contract theory is not to develop an insecure system or convince the client to choose a secure database system.
ACS code deals with professional conducts. Its main focus is to guide the behavior in a professional society. This code of conduct encourages adherence to certain society values:
Conclusion
This report concluded that Diane should not agree to build a less secure database system for the client company. According to this report it is not ethically correct to build and design a less secure database system for the client. The ICT professionals must take care of the security features of the products and services that they deliver to the clients. This report analyzed the situation by using the Doing Ethics Techniques and suggested that the best option is to convince the client to opt for a highly secure database system. Loss of sensitive data will harm the users and it will also affect the reputation of Diane’s Company. The best option as suggested by the DET is supported by the ethical theories. The client should not compromise the security features because of the cost of the system. This report also analyzed the situation by using ACS code of ethics. ACS code deals with professional conducts. In this case study, Diane was morally correct because she looked into the interests and benefits of the client first. She thought about the negative effects of a less secure system and suggested the client to opt for a highly secured system. She discussed the negative effects of a less secure DBMS and aimed to preserve privacy and confidentiality of the data of the stakeholders. The ACS code of ethics does not support the idea of developing a less secure database system.
References
Albee, E., 2014. A history of English utilitarianism (Vol. 1). Routledge.
Bernstein, M. and Jain, V.K., 2014. Ethical decision-making. In Neurosurgical Ethics in Practice: Value-based Medicine (pp. 135-146). Springer Berlin Heidelberg.
Boughton, C., 2013. 5. What is an ICT professional anyway?. Professionalism in the Information and Communication Technology Industry, 3, p.77.
Conway, P. and Gawronski, B., 2013. Deontological and utilitarian inclinations in moral decision making: a process dissociation approach. Journal of personality and social psychology, 104(2), p.216.
Craft, J.L., 2013. A review of the empirical ethical decision-making literature: 2004–2011. Journal of Business Ethics, 117(2), pp.221-259.
Crane, A. and Matten, D., 2016. Business ethics: Managing corporate citizenship and sustainability in the age of globalization. Oxford University Press.
Dewey, J., 2016. Ethics. Read Books Ltd.
Durkheim, E., 2013. Professional ethics and civic morals. Routledge.
Ford, R.C. and Richardson, W.D., 2013. Ethical decision making: A review of the empirical literature. In Citation classics from the Journal of Business Ethics (pp. 19-44). Springer Netherlands.
Gotterbarn, D., 2013. 13. ICT governance and what to do about the toothless tiger (s): Professional organisations and codes of ethics1. Professionalism in the Information and Communication Technology Industry, 3, p.267.
Gray, K. and Schein, C., 2012. Two minds vs. two philosophies: Mind perception defines morality and dissolves the debate between deontology and utilitarianism. Review of Philosophy and Psychology, 3(3), pp.405-423.
Hart, R. and Graham, R., 2012. The ICT Profession Body of Knowledge.
Levitt, D.H. and Moorhead, H.J.H. eds., 2013. Values and ethics in counseling: Real-life ethical decision making. Routledge.
McDermid, D., 2015. Ethics in ICT: an Australian perspective. Pearson Higher Education AU.
Miller, T., Birch, M., Mauthner, M. and Jessop, J. eds., 2012. Ethics in qualitative research. Sage.
Mulgan, T., 2014. Understanding utilitarianism. Routledge.
Shafer-Landau, R., 2014. The fundamentals of ethics.
Shapiro, J.P., Stefkovich, J.A. and Gutierrez, K.J., 2014. Ethical decision making. Handbook of ethical educational leadership, pp.210-228.
Wachs, M. ed., 2017. Ethics in planning. Routledge.
Wright, D. and Mordini, E., 2012. Privacy and ethical impact assessment. Privacy impact assessment, pp.397-418.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download