StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Reliability of Privacy - Assignment Example

Cite this document
Summary
The author of the following paper "The Reliability of Privacy" will make an earnest attempt to analyze the case based on the four dimensions of the PAPA framework (Mason, 1986), and discuss problems that could arise in each of the four dimensions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful

Extract of sample "The Reliability of Privacy"

1. Analyse the case based on the four dimensions of the PAPA framework (Mason, 1986), and discuss problems that could arise in each of the four dimensions. Privacy The reliability of privacy factor is often weak, and remains a major concern in most of the IT organizations. Manson predicted many years, and this has been manifested in Jenny’s case. It is very clear that internet use is growing and privacy on the hand is compromised my advanced knowledge of It. There are two level of risks associated in this case. One, personal responsibility risk: Jenny is under huge financial debt, she finds an opportunity of selling company’s product in order to pay back the fall-back of her investment. Problems perhaps may arise from either side on this privacy issue. Apparently, Jenny was to keep the information about selling the product secretly but unfortunately she disseminated it to her team member accidentally. If the core member reports this, then Jenny will face the law. There are two forces that have threatened privacy in this case. One is the IT expertise of Jenny that has led her to hack IRP system of the company. Two, the increased value of information. The value of cosmetic product is high and this has threatened Jenny to hack IRP system. On the organization side, there will be a problem of ‘exposure of competitive power of organization.’ Jenny is trading with the direct competitor of the organization. There is a high possibility that its competitive power ion the market will be suppressed by the direct competitor. Accuracy According to Mason (1986), inaccurate information from a party with power and authority may be misleading. Bonson & Bonson’s Corporations needs to depend heavily on the information about this product that is from IRP system of Jenny’s organization. if at all the effects of cosmetic products will not be the way Jenny said, the, it will portray the wrong profile of Jenny and place the information to be inaccurate. This is an information that makes medical assessment, therefore, inaccuracies could make a potentially devastating effects that will affects the accountability aspects in IS ethics research. Making decision to purchase the product will be a risk venture to Bonson and Bonson’s Corporations. Jenny is up to recovering from financial drawbacks, and the pressure from good offer by Jenny would make Bonson acquire the product. Property Jenny has gone beyond the respect on the intellectual property. She hacked a system developed by Louis and Uncle Ken implying an important ethical concern (Mason, 1986). Any individual item is costly and therefore Jenny is getting into paying the costs associated with the unethical act if at all she is caught. Moreover, the information from Louse IRP system has an illusive quality where by it can be used by Bonson to destroy the original one therefore pulling apart the strategic aspirations of the company Jenny is employed. Accessibility According to Mason, access to information is limited to only those who have advanced knowledge of IT, money and resources. Jenny has rather the three factors and that is why she walks into the IRP system and hacked. A social problem on the capacity of social contract when it comes to access of information of a particular party is created from this case. Every worker is obliged to have intelligent skills of accessing information itself. Jenny has this capability but uses it beyond ethical requirements within the organization. The insurance of the company in the ideal society is compromised by her unethical act. 2. What should you do now? Recommended a clear course of action and justify it based on an ethical theory. The most important element when effecting the course of action in this case is education and creation of awareness. As a team member of Jenny, I should first take time to understand her actions, attitude and her sense of right and wrong. Apparently, everyone in the organization who regards any information as the important asset, then compromising it would be disastrous (Zhao and Aggarwal, 2010). The following actions are recommended; 1) Moral Sensitivity: I should recognize that there is presence of an ethical issue going on. There is no way a moral problem can be solved unless it is considered existing. I should request Jenny to step back from the action and pay back $6000 she received. She knows very well that the eventuality of whatever she is doing will land her in jail. It is clear that she is desperately looking on a want to pay back the debt, but this is not the right way anyway, and she should understand. Accepting personal responsibility and practicing openness on the issue-the act is dangerous. 2) Moral Judgment: The course of action in this component is derived from the first component-moral sensitivity. This will allow me to make the judgment on the act whether it is right or wrong thing to do. At the moment, Jenny is under preconventional thinking-you help me I will help you (Zhao and Aggarwal, 2010). Uncle Ken and Louse are the two people I should look for them to guide my decision on whether to report. This will build up my utilitarian principle where I will focus on the interest of the entire group rather than Jenny when she refuses to step back from the misconduct. 3) Moral Focus: After clearly defining the best course of action take, I should be more focused on the motivation factors on Jenny’s choice of hacking IRP system. The organization should use motivational force like promotion in order to suppress the individual issues of Jenny. Happiness makes people optimistic and soon when Jenny finds this, then I belief she will play down the act of misconduct. 4) Moral Character: Executing this plan of action takes character. My moral agents should have to overcome my opposition-strong opposition comes from Jenny’s words, “We are friends, do you want me to end up in jail?” It takes courage to choose the best course of action (Zhao and Aggarwal, 2010), and therefore, I should not disobey the company and help the shooting victim. I will file the report of an ethical conduct after gathering the valid evidence including the email Jenny sent to me. I should propose for acceptance module to be part of course of action in Jenny’s case. This would help create ethical awareness to both parties, minimizes predicaments and as a result the users of the information will gain ability in making the right decisions when it comes to matters like those for Jenny. Apparently, the two parties will get satisfaction at the final point when acceptance is confessed. Also, education is important in integrating the four elements during the course of action. Sustainability Report 1. Provide a clear and detailed example of how IS could enable a more sustainable packaging system at IRCL Cost-effectiveness during production and environmental sustainability are two sides of the same coin. Internet Solution (IS) presents an enabling environment to the whole supply chain changing order of doing things. New supply chains integrated with IS present new opportunities for the companies having integrated ERP. By automating many of the administrative tasks that are associated with supply chain, the cost of the business is significantly reduced (Møller, Rubach and Hanssen, 2010). IS adoption will enable improvement in three main business areas: production, consumer-focused and internal management processes (Møller, Rubach and Hanssen 2010, pg. 76). For example, in customer-focused functions, in regard to delays due to waste of time during packaging experience in IRCL, the introduction of help desk (IS idea) on the IRCL website will improve the efficiency of customers when it comes to order quantity. Help desk also will reduce cost time pressure on the other manual handling services like telephone helplines. Emerging Economies: IS would enable IRCL to reach customers in the emerging economies. There will be a need to restructure relationship between manufacture, supplies and customers since the manual handling of procedures plus paper work will be somewhat limited. IS provides bread range of functions which is very essential in provision of many features to the clients of IRCL Company. Acquiring off-the-shelf software, which is pre-written software, can be configured to fit ERP of the IRCL at low cost. Feasibility assessment of IS The main reason of integrating IS into the packaging system is to enhance a feasible technical and economic environment. The system is expected to perform within the standards required in speed, volume assessment, usability as well as reliability to the users. The compatibility of IS application to the ERP of IRCL will need process re-engineering especially with the IT department on order to run the application successful within the company. Integrating IS into the packaging system will reduce complexity and variability of orders. IRCL for example, customers experience delay of orders since a lot of time is wasted in the process of packaging and perhaps organization of logistics. IS would ensures coordination of single or a number of items ordered to be delivered from more than one depot. The information of the product in this case is centralized but the products are made easily accessed by the consumers/customers. Enhancing sustainable packaging solutions through management of logistic matrix a) Storage facilities: Using internet of things software in its warehouses, IRCL can easily react to the demands from the customers. It helps in expanding target market for the products. b) Packaging and Unitization: This seems to be a major problem in IRCL since there is waste of time and resources. Customer purchase decision major depends on this and therefore, the ease way of doing things by the system will increase the level of satisfaction of the customers using the system. c) Communication: IS ensures that there is better communication between the company and its clients through the ERP system. This entails the information on stock, volumes, prices and promotions. IS will therefore sustain the trust of the clients in using ERP system especially in purchase decision. 2. Flowchart on how IS enable sustainable packaging References Chow, W. S. (2001). Ethical belief and behavior of managers using information technology for decision making in Hong Kong. Journal of Managerial Psychology,16(4), 258-267. Chow, W. S. and Choi, K. Y (2003), Identifying managers who need ethics training in using IT at work, Behavioural & Information Technology Journal, 22 (2), 117-125. Fernie, J and Sparks, L (2000) Logistics and Retail Management, London: Kogan Page, pg. 20. Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 10(1), 5-12. Møller, H., Rubach, S., & Hanssen, O. J. (2010). Evaluation of sustainable packaging in the norwegian shopping basket 2001-2007. Packaging Technology and Science, 4(1), n/a-n/a. Zhao, S., & Aggarwal, A. (2010). PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks. Security and Communication Networks,3(5), 371-383. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Reliability of Privacy Assignment Example | Topics and Well Written Essays - 1500 words, n.d.)
The Reliability of Privacy Assignment Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/2052012-introduction-to-information-systems-assessment-2
(The Reliability of Privacy Assignment Example | Topics and Well Written Essays - 1500 Words)
The Reliability of Privacy Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/2052012-introduction-to-information-systems-assessment-2.
“The Reliability of Privacy Assignment Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/2052012-introduction-to-information-systems-assessment-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Reliability of Privacy

Three Aspects of Privacy

hellip; According to Lessig, there are three aspects of privacy namely: privacy in private, privacy in public: surveillance and privacy in public data (201).... The first aspect of privacy in private is related to the element of private property where the traditional law stipulates that each person has a right to be left alone.... This makes it a bit challenging to enforce the law of privacy in different scenarios.... The second aspect is related to privacy in public where it can be noted that it is quite difficult to be protected by the law in terms of privacy in the public space....
5 Pages (1250 words) Essay

Probable Difficulties and Risks Associated With Using a Public Infrastructure

Such intrusions are quite likely to affect the customers' privacy which is quite likely to ultimately affect the company in its long-run performance.... This research is being carried out to evaluate the probable difficulties and risks associated with using a public infrastructure and to analyze....
3 Pages (750 words) Assignment

Privacy Policy And E-commerce

The prime purpose of the paper "privacy Policy And E-commerce" is to discuss the advantages of using electronic commerce in business and issues related to it.... Some may think that the only essential thing to do is to create a website that gives the detailed descriptions of what you offer to the public, but actually, there are lots of concerns relating to e-commerce, such as the policy, privacy, security and the business processes, that must be considered.... These policies also give business reliability and credibility....
3 Pages (750 words) Essay

Modular questions for vendor systems

The Centers for Disease Control (2012) agrees with Sabooniha in stating that the integration of systems will enhance security of the systems and greatly curtail the infamous leaks of patient privacy.... The most important resulting problem is the loss of data reliability.... The factors one must consider, according to Sabooniha, are “Flexibility, Real time, reliability, Reusability, Performance, Complexity, Maintainability, Maturity, Portability, Scalability and Heterogeneity” and their brief definitions are below:1....
2 Pages (500 words) Article

Civil Liability and Private Police

It is a constituted body that is empowered by the state and the constitution to enforce law within the states territory, for eliminating civil disorder, and to protect… Throughout the world police is a department that is under the control of executive body of the state, because enforcement of law is one of the key functions of this institution....
5 Pages (1250 words) Essay

Liability for nurses

This will result in a breach of patient privacy thus making the nurse liable for his/her action.... Accountability is the act of being able to provide reasons why an individual has taken an action or the rationale, and there is a need to… Liability implies that there is a legal concept of damage caused by the action of an individual; for this reason, liability involves accountability that is legally binding and is punished in court (Guido, 2013)....
1 Pages (250 words) Essay

Court of Appeal: The Everest Experience, Incorporated

These include defamation, invasion of privacy, and negligence referral or breach of duty to warn.... These include defamation, invasion of privacy, retaliation, and negligent referral or breach of duty to warn.... "Court of Appeal: The Everest Experience, Incorporated" paper is an evaluation of the liability of employers for references, in relation to common law duty of care....
6 Pages (1500 words) Coursework

Psychological Distress and Mental Health Problems With Respect to Healthcare Delivery in America

The study enhances the validity and reliability of the study by including randomization and controls in designing the general health questionnaire.... The interviewers confirmed the confidentiality and privacy of the information derived from the telephone survey to eligible respondents....
6 Pages (1500 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us