Discuss about Ethics in the Information Technology.
The by-gone century had limited use of computing technology. This meant that most of the processes were slow. Information and details were well handled per se. with the advent of computer, information and almost entirely every sphere of life changed with integration of the ICT gimmicks. Longer processes were turned to be seamless and storage of information became an easy task. However, this has not been without challenges as well. It has put to surmountable risk the participants and the owners of the data stored. This has in the resent past shown volatility in terms of the magnitude of the consequences that result from breaching of privacy and confidentiality of such information (Relkin, 2006). However, this can be mitigated through by each party meeting its obligations as well as setting up of code of ethics. This paper will in verbose, seek to explore and bring to application of the ethical concerns of information technology with reference to the infamous Ashley Madison case.
Ashley Madison is an online dating cite that was established in 2002 with a primary goal of helping, married couples date. That is, it’s for married people who are seeking affairs. It acts as a platform of connecting different parties with their “fit” partner. This makes the website sensitive as it involves secret affairs about the participants (Boyle, 2015). The website subscription is free and they only charge sending of messages or other virtue oriented packages. On 15 July 2015, the organization data base faced a crime know as cyber vigilantism. The vandalized information included email, names and residential details, and credit card payment details, a more sensitive details were sexual relation details. Where information of about 37 million people was released. The hackers realized the emails of participants online which not only included individuals but also Ministry of Defense emails, email from universities, government based emails, police emails as well as political elites’ emails (Krebs, 2015). The resultant of this was a great defamation of the organizations and the individuals who were implicated in the report. An example of such is the SNP MP Michael Thompson whose email was in the dumped list (Boyle, 2015)
The hacked data had diverse implications as viewed by the parties involved, companies and families as well as other icons who were implicated in the hacking release. The company’s image would be extremely tainted resulting to major changed in bid to recover the loss. The company’s Chief Executive Officer resigned and the company as well changed it original name.
With the unprecedented breach of privacy, the data had a very high potential of ruining marriages. In additional, the release of explicit sex video also caused public embarrassment and emotional breakdown of the implicated victims. Sadly, the effect of such a cyber-crime over spilled to innocent individual whose emails were used without their knowledge-the website allowed a user mail without confirmation (Krebs, 2015).
The effect of the release would be also felt by the service members. As the reported showed that more than 15000 mails belonged to government and military, these would result to punishments by the respective authorities as it is against their code of ethics as well as misuses of government assets and resources. The consequences of this can be much grander as it would results to discharge or facing court charges (Mason and Sharp, 2015). Among the reported effects of the hack were 3 suicides, two divorces of evangelists and an ousted town mayor and disgraced prosecutors.
To the company, the event was a hazardous to the business, the Avid Life Media- the owner of the hacked website- faced a tempestuous blow from the hackers. The company lost public trust as pertaining security and privacy. This meant a financial implication as a profit seeking entity. In addition, the company’s lie was revealed pertaining deleting clients information. The Chief Operating Officer (CEO) resigned due to the Scandal. The Company assured its clients that their data was deleted. However, despite charging their clients, the data was intact during the infamous hack. In due regard to this case, the company may be subject to be prosecuted I the court of law by the agitated customers/ clients for defamation (Mason and Sharp, 2015). In addition to the consequences, the hackers posed strict threat-driven requests such as closing of the entire dating domain. Which if the victim company would not comply would lead to further destruction by release of more sensitive data of their customers. Today the firm faces serious court changes against bleaching of confidentiality both in Canada and in US. Multiple class-action suits have been registered against the com [any which could cost the company fines worth billions of US dollars (Holler). Among the plaintiffs is the U.S federal Trade Commission
Avid Life Media in their response to the major crime, they insinuated that there was a high probability that the team behind the act was once either an employee of the company or had come across the companies technical networks. In addition to this, the revealed internal survey details elucidated that the company was aware that their security was at stake and subject to exposure.
The dispute should be settled out the legal precincts. As much the government and IT specialist tried to put down and reveal the hacker, the hacker had left no any lead that could lead to his arrest. Thus this left all the effort to settle the dispute in court almost impossible. Therefore the only option that would have been adopted by the two parties- the company and its clients together with the secondary victims -would to settle for more secure ethical methods of securing data. The privacy had already been breached and can’t be reversed, therefore the parties should resolve this dispute in basis of ethical considerations This case presents an ethical case where by privacy agreement has been defaulted. The Ashley Madison Company failed to adhere to its agreement with its customer pertaining deleting of information as well as maintaining discrete privacy.
In all the spheres of information, there is always obligations by either parties that should be maintained that no bleach of information considered private that is bleached or leaked to third parties. Furthermore, the two parties have an obligation to protect the public from such instances that bring public shame and disgrace. Additionally the company has a legal obligation to observe privacy, this means that the company can be charged in court of law for defamation that can result from releasing of destructive information. Another obligation pertains moral responsibility. The stake holders should possess the virtue of being careful, considerate and trustworthy. This simply means that there is collective efforts by the concerned teams. In addition, all the stake holders has an obligation of giving reports and inform all the parties of any changes as well as mistakes and corrections (Loui and Miller, 2016). Any company holding a client’s information should ensure it explicitly respects the privacy of the second party, this should not be matter of legal requirement but to ensure that the welfare of the concerned parties is upheld with honor and respect. On the other hand, the client has an obligation to ensure that he understands and complies with the processing methods and procedure of information. This pertains keeping having a personal level of confidentiality and ensuring that his/her action do not put the contractual privacy in any way. To the public, all the stakeholders have an obligation to the general population. They must avoid endangering others. This obligates the e stakeholders to ensure safety and to improve the quality of life for the entire public. In addition to this, the computing professionals should educate the public on computing. This would raise awareness about safety and risks that is found in computing (Loui and Miller, 2016). The computing professionals should provide technical facts. However when the public’s interest conflicts with employers’ interest, the professional employees should alert the people and the clients for any threat that may arise from such. Some of the data if released to the public, it ay results to harm and insecurity in general. For example: the release of the “infidelity information for the Ashley Madison website caused suicides to the spouses of the victims. It also resulted to release of explicit videos that damaged the reputation of individuals. According to Weckert and Lucas (2009), business should be carried on without harming anyone. Therefore this necessitates proper handling of sensitive data by all the parties. In conclusion, the IT professionals must take lead when it comes to the issue of ethical consideration (Aynsley, 2015)
Australian code of Ethics is a set of principles and rules that guide the computer users in Australia, however some of the ethics are applicable to the victim company pertaining privacy and information ethics.
The Primacy of the Public Interest.
The company should have invested in the provision of discrete privacy to its clients. The company placed its interests ahead of the clients’. Theses is evidenced by the company charging of information deleting whereas as exposed, this was not performed. The company did not consider the effect the exposure of the information would cause to the clients (Graham and Low, 2014). Therefore the company is to blame and be held responsible for the event.
Competence
The competence of the company ability to hold information with privacy is doubtable. Having been in the industry that handled sensitive information the company failed to meet minimum standards as pertaining securing the information. Professional excellence should be based on laid down standards for appropriate level of competence. The company should strive to maintain such standards. With information technology being dynamic, the professionals should upgrade their technical skills and technology. All the stake holders should adhere to the contracts all the times. Honoring and remaining committed to the contract shows integrity and honesty. Moreover, all the parties should support policies that protect the dignity of the users and third parties that can be affected by such information ((Graham and Low, 2014))
In conclusion, drawing from Australian computer agency code of ethics, the company failed to honor the privacy of its consumers there by resulting to breach.
References
Aynsley, B. (2015). The importance of ethical conduct. [online] Theaustralian.com.au. Available at: https://www.theaustralian.com.au/business/technology/opinion/ethics-essential-for-ict-professionals/news-story/78307af0586683a61e7a0d537c5f6cf8 [Accessed 8 Sep. 2016].
Boyle, D. (2015). Ashley Madison hack: Live updates as ‘UK Government email addresses’ in data of 32 million dumped online. [online] Telegraph.co.uk. Available at: https://www.telegraph.co.uk/news/11811356/Ashley-Madison-hack-live.html [Accessed 8 Sep. 2016].
Graham, R. and Low, G. (2014). 2nd ed. [ebook] Australian Computer Agency. Available at: https://www.acs.org.au/__data/assets/pdf_file/0014/4901/Code-of-Professional-Conduct_v2.1.pdf [Accessed 8 Sep. 2016].
Krebs, B. (2015). Online Cheating Site AshleyMadison Hacked — Krebs on Security. [online] Krebsonsecurity.com. Available at: https://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/ [Accessed 8 Sep. 2016].
Loui, M. And Miller, K. (2016). Ethics And Professional Responsibility In Computing. [Online] Available At: https://www.ideals.illinois.edu/bitstream/handle/2142/12247/ecse909.pdf?sequence=2 [Accessed 8 Sep. 2016].
Mason, J. and Sharp, A. (2015). Hacker’s Ashley Madison data dump threatens marriages, reputations| Canada| Reuters. [online] Ca.reuters.com. Available at: https://ca.reuters.com/article/domesticNews/idCAKCN0QN2BN20150819 [Accessed 8 Sep. 2016].
Relkin, J. (2006). 10 ethical issues confronting IT managers – TechRepublic. [online] TechRepublic. Available at: https://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/ [Accessed 8 Sep. 2016].
Weckert, J. and Lucas, R. (2009). The Governance of Information and Communication Technology. AJIS, 16(1).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download