Discuss about the Occupational Deviance and Neutralization Techniques.
Businesses have transformed into information technology applications to keep up with the digital era revolution. This is evident to Telstra a conservative engineering business that transformed its operations to digital. This transformation was to give Telstra a competitive advantage in the market. The advantage would be derived from analyzing data using different analytical tools and systems for decision making. Some of these decisions would be in product development and marketing strategies.
These transformations lead to questionable ethical and professional challenges. Issues were raised by customers and stakeholders regarding information technology governance and information technology standards (Jordan and Meara, 2010). Some of the issues concerned were the disruptions that digital transformation caused to the business. Although Telstra had very positive results in its decision making as outlined in this report, they also faced very many challenges some being ethical in using business analytical tools.
Data analysis greatly helps in decision making and leveraging customer trends, behaviors and preferences. For instance, Telstra identified which demographic populations’ trends for certain machines (Irvine, et. al., 2012). Data analysis also helped in identifying how best to capitalize on customers loyalty and resolve customers issues promptly.
Telstra just like any other modern progressive business transitioned its operations from conservative to digital. Realized strict measures had to be put in place in data management. This mainly originated with issues of confidentiality and customers privacy. Telstra had to employ IT Governance and Standards to safeguard its business.
A case in point a customer complained that some of their confidential information was leaked to the public and media without their consent. One of the customers’ was Hopkins Hospital which complained that health engineering machines procured through the Telstra App were made public (Higgins, 2011). Although Telstra disputed these allegations, investigations revealed both ethical and professional issues that we are going to address in this report.
Telstra shifted the blame to IBM, who had developed and provided the data analysis tool that was used. Despite IBM having trained Telstra staff on the measures to be put in place to ensure the privacy of clients’ data, Telstra failed.
The government department for ICT was also enjoined in this dispute. Following the government laws on data privacy, both Telstra and IBM were found guilty of not putting in place measures to ensure the privacy of their clients (Goldman, 2010). This was a class action case but for the sake of this report, we will focus on Telstra, IBM, Hopkins Hospital, The Government, and Patients.
Hopkins Hospital one of the customers to Telstra, an engineering company has discovered that there was a breach in its private data. This occurred when they used the Telstra App to procure hospital machines and equipment for their operations (Parsons, 2010). Although Telstra didn’t intentionally leak Hopkins Hospital confidential data, the business analytics tools they used in data analysis were not very safe.
Telstra intentions were good at using its customer’s data; the only professional and ethical challenges were in data security. Hopkins Hospital has sued Telstra for a breach of data privacy. The data analysis tool used by Telstra was provided by IBM. IBM was sued by both Hopkins Hospital and Telstra for providing a business intelligence application that wasn’t data proof.
Most jurisdictions have very strict privacy and confidentiality rules regarding data. This relates to organizations that deal with sensitive customers’ data like in the health sector, security, financial and other industries (Tavani, 2013). The laws governing IT data rules are very clear. In this particular case, the facts proved that Telstra breached in how they handled Hopkins Hospital data.
The penalties are also clearly stipulated if an organization exposes clients’ data. The responsibility of protecting this data touches on the professionalism of the employees. The facts are also very clear for organizations not to use clients’ data for unethical ventures. Telstra used Hopkins data to promote political and religious propaganda without the clients’ consent. This was evident in maternal health in issues relating to abortion which had political and religious perspectives.
Telstra shifted the blame to IBM which provided the data analysis tool used in business intelligence assessment. Although the blame was on IBM, they claimed that Telstra failed in ensuring professionalism and proper IT governance measures were in place.
The following were affected by the breach of clients’ data privacy in business analysis.
In conclusion about the ethical issues, Hopkins Hospital was ethical, unlike Telstra and IBM who need to employ more governance and stringent measures in protecting client’s sensitive and confidential information.
Hopkins Hospital should first apologize to its patients and the public for breach of confidence. In the apology, the hospital should explain what happened and futures measures it has put in place to ensure a repeat of data hitch breach doesn’t happen (Grodzinsky, 2010). Hopkins hospital should also review its business engagement with Telstra and be very strict on the applications that third-party companies provide like IBM. Telstra and IBM should be charged in the court of law and made to pay penalties. The government should put in place very strict rules and monitor business intelligence tools provided by ICT companies.
Out of the options listed above the first option is the best. IBM and Telstra should accept liability and take full responsibility. Business intelligence I very important in all aspects of the economy and the government withdrawing their licenses wouldn’t be advisable (Kasoma, 2016). Also Hopkins Hospital should accept the apology and assure its patients that more stringent measures have been put in place.
Information Technology Governance refers to set rules and guidelines by businesses and companies in the management of their IT system and process. These rules create a system that ensures effective and efficient operation procedures aligning IT to the business vision and purpose (Gauthier, 2001). IT Governance is usually implemented with the IT department and professional while ensuring legal, professional and ethical considerations are in place.
Published in 2005, Australian Standard for Corporate Governance of Information and Communications Technology act stipulates how business should operate in relation to data privacy (Banks, 2014). This can also be linked to the following breaches that Telstra had in relation to Hopkins Hospital and IBM.
Responsibility: Professional competency and ethics are required for all employees in an organization who are handling IT data. Telstra failed to ensure personal responsibility by not keenly scrutinizing IBM data analytics tools for any loopholes (Irvine, et. al., 2012). Personal responsibility demands diligent analysis of all ICT applications and software.
Strategy: Businesses should have a clear IT governance strategy for its operations. Telstra failed to follow through in this aspect. If they had a strategy, the challenges posed by IBM data analytical tool could not have emerged.
Acquisition: Organizations are expected to invest and empower its ICT operations. IT is evolving at a very fast pace and business are expected to be on par with changes. It’s evident that Telstra wasn’t prepared for data breach challenges mainly due to not having invested adequately in its tools and employees.
Performance: Telstra was expected to have transformed its operations to be in sync with its clients and suppliers needs and tools (Nordkvelle and Olson, 2015). If Telstra performance was in line with Hopkins Hospital and IBM, these challenges wouldn’t have come up.
Conformance: Policies and standard operation procedures should be clearly explained and internalized by all employees in the ICT department. Unlike in Telstra, it would have been easy to raise red flags if conformance was in place.
When a business transforms from being conservative to digital, there are many technologies both in software and hardware that will be used. In this particular case Telstra used the following technologies.
Hardware: This refers to computers, laptops, phones and servers that are used to set up an IT system in an organization (Van den Hoven, 2017). Telstra transformation required all this equipment and more including internet connection.
Software: This refers to the applications that are used to run the hardware. When Telstra digitalized its operations, it required software called ERP-Enterprise Resource Management. This is used to manage all the operations in an organization.
Business Intelligence Tools: This refers to the data analysis applications that were provided by IBM (Campbell, E., 2010). They include software like SPSS; this is used in analyzing customer’s data and trends.
Telstra App: This is the application that Telstra used in communicating with customers including Hopkins Hospital. Customers’ queries and complains were addressed via this application.
Increased Productivity: Digital transformation increases productivity of a given business. This is evident in the growth experienced by Telstra. Their customers increased to 1.5 million who were served on the Telstra App. This also helps in effective and efficient engagement with customers’ real time. Digitization also has a wide reach in advertisement unlike the traditional conservative media.
Cost Efficient: Digitization ensures business is run profitably as most of the operations are automated hence reducing manpower.
Ease of Accessibility: Information and data is centralized in one place hence, saves time and resources in storing and retrieving information. This saves time and productivity is increased.
Enhanced Security: Chances of information stored digitally being stolen is very rare because of IT security measures (West and Heath, 2011). This involves passwords and bio identifications like fingerprints lazier. Unlike tradition safes and boxes, documents are also protected from weather-related threats like water or heat.
Enhanced information Preservation: Information stored digitally can last for very many years with being distorted or defaced due to weather or aging (Bowern, et. al., 2016). This is contrary to documents stored physically that may be affected with weather conditions or natural calamities.
Data protection is very important to any business using digital communication and storage. There are different features of data protection but the most effective one is the use of passwords (West and Heath 2011). This can be verified at different levels by different authorized stakeholders. In more advanced cases biosecurity identifies like fingerprints and contact lenses can be used.
Digital transformation is the next level for business growth and development. Transforming business operations to digital platforms not only enhances the business but also reduces operations costs. Using applications like Telstra App businesses are able to make informed decisions based on facts. This decisions help in marketing, advertising and product development. The ultimate result will be both in employee’s satisfaction, customer growth in loyalty and growth in profits.
Conclusion
Technological advancement has disrupted the way business used to be done in the old days. This is evident by the big number of conservative businesses transforming to digital. To sum it up, this report assignment has analyzed the positive and negative issues involved in ICT transformation of organizations. Using Telstra as our case study we have seen how its digital transformation has helped in its growth. This growth comes along with advantages and disadvantages. In scaling up its operations from the big data it is generating from the Telstra App, they source for business analytics tool from IBM-LSPSS. This IBM software leaks some of its client’s, Hopkins Hospital confidential information. Hopkins hospital sues Telstra and IBM for breach of data privacy contract. We have also analyzed be lack of data management framework and proper professional ethics that lead to data leakage.
In this report, it is explained how all the stakeholders involved were affected and the measures to be taken. It has also espoused how professionalism is very important in ensuring proper business ethics are followed. Although challenges may occur like in the Telstra case, opportunities are very many. For instance, there is a lot of data that is generated by companies that have digitized their operations. If this data is analyzed properly it can be used to make informed business decisions to scale up the organization. This report assignment has concluded that the future prosperity of any business is based on how best they execute their ICT strategy.
References list
Banks, S., 2014. Ethics, accountability, and the social professions.
Bowern, M., Burmeister, O., Gotterbarn, D. and Weckert, J., 2016. ICT Integrity: Bringing the ACS Code of Ethics up to date. Australasian Journal of Information Systems, 13(2).
Campbell, E., 2010. Professional ethics in teaching: Towards the development of a code of practice. Cambridge Journal of Education, 30(2), pp.203-221.
Goldman, A.H., 2010. The moral foundations of professional ethics (pp. 156-229). Totowa, NJ: Rowman and Littlefield.
Gauthier, D.K., 2001. Professional lapses: Occupational deviance and neutralization techniques in veterinary medical practice. Deviant Behavior, 22(6), pp.467-490.
Grodzinsky, F.S., 2010. The development of the’ethical’ICT professional: and the vision of an ethical on-line society: how far have we come and where are we going?. ACM SIGCAS Computers and Society, 30(1), pp.3-7.
Higgins, C., 2011. The good life of teaching: An ethics of professional practice (Vol. 22). John Wiley & Sons.
Irvine, R., Kerridge, I., McPhee, J. and Freeman, S., 2012. Interprofessionalism and ethics: consensus or clash of cultures?. Journal of Interprofessional Care, 16(3), pp.199-210.
Jordan, A.E. and Meara, N.M., 2010. Ethics and the professional practice of psychologists: The role of virtues and principles. Professional Psychology: Research and Practice, 21(2), p.107.
Kasoma, F.P., 2016. The foundations of African ethics (Afriethics) and the professional practice of journalism: The case for society-centred media morality. Africa Media Review, 10, pp.93-116.
Keefer, M. and Ashley, K.D., 2011. Case-based Approaches to Professional Ethics: A systematic comparison of students’ and ethicists’ moral reasoning. Journal of Moral Education, 30(4), pp.377-398.
McMinn, M.R., Buchanan, T., Ellens, B.M. and Ryan, M.K., 2018. Technology, professional practice, and ethics: Survey findings and implications. Professional Psychology: Research and Practice, 30(2), p.165.
Nordkvelle, Y.T. and Olson, J., 2015. Visions for ICT, ethics and the practice of teachers. Education and Information Technologies, 10(1-2), pp.21-32.
Parton, N., 2003. Rethinking professional practice: The contributions of social constructionism and the feminist ‘ethics of care’. British Journal of Social Work, 33(1), pp.1-16.
Parsons, R.D., 2010. The ethics of professional practice. Pearson Higher Education.
Stahl, B.C., Eden, G., Jirotka, M. and Coeckelbergh, M., 2014. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems. Information & Management, 51(6), pp.810-818.
Tavani, H.T., 2013. Ethics and technology: Ethical issues in an age of information and communication technology.
Van den Hoven, J., 2017. ICT and value sensitive design. In The information society: Innovation, legitimacy, ethics and democracy in honor of Professor Jacques Berleur SJ (pp. 67-72). Springer, Boston, MA.
West, D. and Heath, D., 2011. Theoretical pathways to the future: Globalization, ICT and social work theory and practice. Journal of Social Work, 11(2), pp.209-221.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download