Monday, December 9, 2019

Ethics in the Information Technology

Question: Discuss about Ethics in the Information Technology. Answer: The by-gone century had limited use of computing technology. This meant that most of the processes were slow. Information and details were well handled per se. with the advent of computer, information and almost entirely every sphere of life changed with integration of the ICT gimmicks. Longer processes were turned to be seamless and storage of information became an easy task. However, this has not been without challenges as well. It has put to surmountable risk the participants and the owners of the data stored. This has in the resent past shown volatility in terms of the magnitude of the consequences that result from breaching of privacy and confidentiality of such information (Relkin, 2006). However, this can be mitigated through by each party meeting its obligations as well as setting up of code of ethics. This paper will in verbose, seek to explore and bring to application of the ethical concerns of information technology with reference to the infamous Ashley Madison case. Ashley Madison case Ashley Madison is an online dating cite that was established in 2002 with a primary goal of helping, married couples date. That is, its for married people who are seeking affairs. It acts as a platform of connecting different parties with their fit partner. This makes the website sensitive as it involves secret affairs about the participants (Boyle, 2015). The website subscription is free and they only charge sending of messages or other virtue oriented packages. On 15 July 2015, the organization data base faced a crime know as cyber vigilantism. The vandalized information included email, names and residential details, and credit card payment details, a more sensitive details were sexual relation details. Where information of about 37 million people was released. The hackers realized the emails of participants online which not only included individuals but also Ministry of Defense emails, email from universities, government based emails, police emails as well as political elites emai ls (Krebs, 2015). The resultant of this was a great defamation of the organizations and the individuals who were implicated in the report. An example of such is the SNP MP Michael Thompson whose email was in the dumped list (Boyle, 2015) Implications of the data released The hacked data had diverse implications as viewed by the parties involved, companies and families as well as other icons who were implicated in the hacking release. The companys image would be extremely tainted resulting to major changed in bid to recover the loss. The companys Chief Executive Officer resigned and the company as well changed it original name. With the unprecedented breach of privacy, the data had a very high potential of ruining marriages. In additional, the release of explicit sex video also caused public embarrassment and emotional breakdown of the implicated victims. Sadly, the effect of such a cyber-crime over spilled to innocent individual whose emails were used without their knowledge-the website allowed a user mail without confirmation (Krebs, 2015). The effect of the release would be also felt by the service members. As the reported showed that more than 15000 mails belonged to government and military, these would result to punishments by the respective authorities as it is against their code of ethics as well as misuses of government assets and resources. The consequences of this can be much grander as it would results to discharge or facing court charges (Mason and Sharp, 2015). Among the reported effects of the hack were 3 suicides, two divorces of evangelists and an ousted town mayor and disgraced prosecutors. To the company, the event was a hazardous to the business, the Avid Life Media- the owner of the hacked website- faced a tempestuous blow from the hackers. The company lost public trust as pertaining security and privacy. This meant a financial implication as a profit seeking entity. In addition, the companys lie was revealed pertaining deleting clients information. The Chief Operating Officer (CEO) resigned due to the Scandal. The Company assured its clients that their data was deleted. However, despite charging their clients, the data was intact during the infamous hack. In due regard to this case, the company may be subject to be prosecuted I the court of law by the agitated customers/ clients for defamation (Mason and Sharp, 2015). In addition to the consequences, the hackers posed strict threat-driven requests such as closing of the entire dating domain. Which if the victim company would not comply would lead to further destruction by release of more sensitive data of their cust omers. Today the firm faces serious court changes against bleaching of confidentiality both in Canada and in US. Multiple class-action suits have been registered against the com [any which could cost the company fines worth billions of US dollars (Holler). Among the plaintiffs is the U.S federal Trade Commission Avid Life Media in their response to the major crime, they insinuated that there was a high probability that the team behind the act was once either an employee of the company or had come across the companies technical networks. In addition to this, the revealed internal survey details elucidated that the company was aware that their security was at stake and subject to exposure. The dispute should be settled out the legal precincts. As much the government and IT specialist tried to put down and reveal the hacker, the hacker had left no any lead that could lead to his arrest. Thus this left all the effort to settle the dispute in court almost impossible. Therefore the only option that would have been adopted by the two parties- the company and its clients together with the secondary victims -would to settle for more secure ethical methods of securing data. The privacy had already been breached and cant be reversed, therefore the parties should resolve this dispute in basis of ethical considerations This case presents an ethical case where by privacy agreement has been defaulted. The Ashley Madison Company failed to adhere to its agreement with its customer pertaining deleting of information as well as maintaining discrete privacy. Ethical Obligations of All the Stakeholders In all the spheres of information, there is always obligations by either parties that should be maintained that no bleach of information considered private that is bleached or leaked to third parties. Furthermore, the two parties have an obligation to protect the public from such instances that bring public shame and disgrace. Additionally the company has a legal obligation to observe privacy, this means that the company can be charged in court of law for defamation that can result from releasing of destructive information. Another obligation pertains moral responsibility. The stake holders should possess the virtue of being careful, considerate and trustworthy. This simply means that there is collective efforts by the concerned teams. In addition, all the stake holders has an obligation of giving reports and inform all the parties of any changes as well as mistakes and corrections (Loui and Miller, 2016). Any company holding a clients information should ensure it explicitly respects the privacy of the second party, this should not be matter of legal requirement but to ensure that the welfare of the concerned parties is upheld with honor and respect. On the other hand, the client has an obligation to ensure that he understands and complies with the processing methods and procedure of information. This pertains keeping having a personal level of confidentiality and ensuring that his/her action do not put the contractual privacy in any way. To the public, all the stakeholders have an obligation to the general population. They must avoid endangering others. This obligates the e stakeholders to ensure safety and to improve the quality of life for the entire public. In addition to this, the computing professionals should educate the public on computing. This would raise awareness about safety and risks that is found in computing (Loui and Miller, 2016). The computing professionals should provide technical facts. However when the publics interest conflicts with emplo yers interest, the professional employees should alert the people and the clients for any threat that may arise from such. Some of the data if released to the public, it ay results to harm and insecurity in general. For example: the release of the infidelity information for the Ashley Madison website caused suicides to the spouses of the victims. It also resulted to release of explicit videos that damaged the reputation of individuals. According to Weckert and Lucas (2009), business should be carried on without harming anyone. Therefore this necessitates proper handling of sensitive data by all the parties. In conclusion, the IT professionals must take lead when it comes to the issue of ethical consideration (Aynsley, 2015) Guidance from the Australian Computer Societys Code of Ethics Australian code of Ethics is a set of principles and rules that guide the computer users in Australia, however some of the ethics are applicable to the victim company pertaining privacy and information ethics. The Primacy of the Public Interest. The company should have invested in the provision of discrete privacy to its clients. The company placed its interests ahead of the clients. Theses is evidenced by the company charging of information deleting whereas as exposed, this was not performed. The company did not consider the effect the exposure of the information would cause to the clients (Graham and Low, 2014). Therefore the company is to blame and be held responsible for the event. Competence The competence of the company ability to hold information with privacy is doubtable. Having been in the industry that handled sensitive information the company failed to meet minimum standards as pertaining securing the information. Professional excellence should be based on laid down standards for appropriate level of competence. The company should strive to maintain such standards. With information technology being dynamic, the professionals should upgrade their technical skills and technology. All the stake holders should adhere to the contracts all the times. Honoring and remaining committed to the contract shows integrity and honesty. Moreover, all the parties should support policies that protect the dignity of the users and third parties that can be affected by such information ((Graham and Low, 2014)) In conclusion, drawing from Australian computer agency code of ethics, the company failed to honor the privacy of its consumers there by resulting to breach. References Aynsley, B. (2015). The importance of ethical conduct. [online] Theaustralian.com.au. Available at: https://www.theaustralian.com.au/business/technology/opinion/ethics-essential-for-ict-professionals/news-story/78307af0586683a61e7a0d537c5f6cf8 [Accessed 8 Sep. 2016]. Boyle, D. (2015). Ashley Madison hack: Live updates as 'UK Government email addresses' in data of 32 million dumped online. [online] Telegraph.co.uk. Available at: https://www.telegraph.co.uk/news/11811356/Ashley-Madison-hack-live.html [Accessed 8 Sep. 2016]. Graham, R. and Low, G. (2014). 2nd ed. [ebook] Australian Computer Agency. Available at: https://www.acs.org.au/__data/assets/pdf_file/0014/4901/Code-of-Professional-Conduct_v2.1.pdf [Accessed 8 Sep. 2016]. Krebs, B. (2015). Online Cheating Site AshleyMadison Hacked Krebs on Security. [online] Krebsonsecurity.com. Available at: https://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/ [Accessed 8 Sep. 2016]. Loui, M. And Miller, K. (2016). Ethics And Professional Responsibility In Computing. [Online] Available At: https://www.ideals.illinois.edu/bitstream/handle/2142/12247/ecse909.pdf?sequence=2 [Accessed 8 Sep. 2016]. Mason, J. and Sharp, A. (2015). Hacker's Ashley Madison data dump threatens marriages, reputations| Canada| Reuters. [online] Ca.reuters.com. Available at: https://ca.reuters.com/article/domesticNews/idCAKCN0QN2BN20150819 [Accessed 8 Sep. 2016]. Relkin, J. (2006). 10 ethical issues confronting IT managers - TechRepublic. [online] TechRepublic. Available at: https://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/ [Accessed 8 Sep. 2016]. Weckert, J. and Lucas, R. (2009). The Governance of Information and Communication Technology. AJIS, 16(1).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.