This report consists of two major issues IRCL is currently facing, ethics and sustainability. With regards to both issues, explanations and solutions are discussed in depth as to how the company should proceed moving forward.
I – Ethics Report
Mason (1986) observed that two forces threaten our privacy: unprecedented advancement in information technology and its superior ability to capture, compute and communicate information & the value of information to the people who can use it for their own benefit. Jenny’s unprofessional conduct of hacking into sensitive and confidential information on the ERP system that not only will contain competitive business strategies, secret experimental formula and customers’ details is an invasion of privacy.
Mason (1986) suggested that with the growing collection of data, dependence on the accuracy of information is heavily relied upon. For information that is used by medical researchers, agriculture research, weather predictions, inaccuracies of information could cause devastating effects. As in Jenny’s case, secretly stealing the secret formula for a new cosmetic product that she has no knowledge or experience about could be hazardous to consumers if the product goes on the market. The secret experimental formula that has the potential to revolutionize acne and skin care treatment might not be finalized or stable enough for human usage. Her action of selling the formula to a competitor organization could jeopardize Bonson & Bonson’s business and reputation, legal lawsuit being the worst-case scenario. If the product does not prove popular to consumers, and Bonson & Bonson’s suffered financial losses; who is then to be held accountable; could Bonson & Bonson’s sue IRCL...
... middle of paper ...
...ent [ONLINE] Available at: http://www.strategicinventorymanagement.com/1/post/2011/11/pursuing-sustainability-in-retail-best-green-practices.html [Accessed 07 May 2014].
• Sustainable Packaging Coalition (2011) “Definition of Sustainable Packaging” A project of GreenBlue [ONLINE] Available at: http://sustainablepackaging.org/uploads/Documents/Definition%20of%20Sustainable%20Packaging.pdf [Accessed 07 May 2014].
• The Australian Computer Society (ACS), 2012, code of ethics and case studies
• Underwood, A. (2000, January). Professional Ethics in a Security and Privacy Context–the Perspective of a National Computing Society. In Information Security and Privacy (pp. 477-486). Springer Berlin Heidelberg.
• Woodward, Belle, Nancy L. Martin, and Thomas Imboden. "Expansion and Validation of the PAPA Framework." Information Systems Education Journal9.3 (2011): 28.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... This, according to Johnson (1994) will help make students (future computing professionals) aware of the ethical issues surrounding computers, to sensitise them to ethical issues in the use of computers, and in the practice of the computing professions, convey to students a deep understanding of the ways in which computers change and impact on society, and provide conceptual tools and develop analytic skills for ethical decision making within the computing world. Several authors have defined Computer ethics differently.... [tags: crime, hacking, viruses, privacy, stress]
879 words (2.5 pages)
- It is a tad bit frightening and alarming to think that the conversations between your child and their toy are being recorded and that real people are hearing it. The company Mattel, responsible for the extremely popular Barbie dolls, have recently launched a new doll but this time it is one who has the ability to speak back to children. Now this may sound appealing at first but upon further investigation, it is revealed that it does so through Wi-Fi connection. In other words, the conversations the child has with the doll are recorded through this voice recognition and are sent to a third party agency.... [tags: Barbie, Mattel, Privacy]
1109 words (3.2 pages)
- Employee Privacy Report 1 In this report, I will be addressing e-mail, Internet use, and privacy policies in my workplace; the current laws regulating employee e-mail and Internet privacy; the reasons to companies carry out e-mail and Internet use policies; the assumptions employees make about their privacy at work; and how these policies affect employee privacy at work. E-Mail and Internet Use , Privacy Policies The E-mail/Internet usage and privacy policies at my job are part of a system of written decisions established by the organization to support and to build a desire culture through managing risk, regulation, and administration.... [tags: Privacy Report]
986 words (2.8 pages)
- Many people view video cameras as an invasion of privacy. People think that if they are being recorded, these recordings could be misused. However, in most cases of recording the safety the cameras provide is more important than the possibility of misuse. Misuse of information is also possible on the internet. Any employer can look up an employee or future employee’s profile if his or her name is linked to it. This is not an invasion of privacy, but can be if it is used as discrimination. It has always been a worry of mine that I will be disqualified or excluded from a future opportunity because of a semi-popular blog I run.... [tags: Privacy, Privacy law, Camera, Employment]
841 words (2.4 pages)
- The 21st century has brought a lot of modern ideas, innovations, and technology. One of these is social media. The invention of Facebook has completely changed the way we communicate with one another. Instant messaging, photo sharing, and joining online groups have created a way for families and friends to connect. Some argue that Facebook is the greatest invention however, while it is seemingly harmless, Facebook has created an invasion of privacy. The accessibility of Facebook and its widespread use has created privacy problems for users, teens, and interviewees by allowing easy control to viewers.... [tags: Privacy, Privacy law, Facebook, Identity theft]
1221 words (3.5 pages)
- Since surveillance cameras have been invented for security reasons at shopping malls and stores they have also been place in public areas such as stoplights, parking lots, hallways, bus stops, and more. I mainly think that our privacy maybe invaded due to the cameras being placed in a mass of public areas privacy can easily be invaded I don’t like it because if your on the phone and the people that watch the tapes can read lips can see what you are saying/texting and with texting they can zoom in on the messages.... [tags: privacy, security cameras, safety]
739 words (2.1 pages)
- Technology and the internet are fluid, constantly changing shapes and sizes as time goes on. Comparatively, society has come a very long way with both. Technology and the internet have helped to connect people both near and far, find cures for diseases, have aided in new ways to educate, been a form of entertainment to all that have the leisure of using it, and have both provided an unimaginable amount of jobs. Technology and the internet have helped to mold society into what it is today. Take a look around, it’s everywhere and its users are avid.... [tags: Technology, Internet, Abuse]
1103 words (3.2 pages)
- The Privacy Invasion of Consumers Through the Internet and Bluetooth Devices ABSTRACT Faster, easier, and cheaper access to a plethora of information, products and people is a primary stimulus for the growing number of online consumers who use the Internet to fulfill information foraging, communication and commerce needs. Oddly enough, these conveniences appear to override users concerns of privacy invasion. As the mechanisms behind information technologies become increasingly transparent, users must trust the companies producing the products to protect them from privacy invasion and refrain from deceitful consumer information practices.... [tags: Internet Privacy Web Cyberspace Essays]
4206 words (12 pages)
- Technology and the Invasion of Privacy As citizens of America we are all entitled to our rights of privacy. When something threatens this guaranteed privacy we tend to take extra precautions to prohibit prolonged violation. As the advancing world of technology continues to grow and expand, so do the amount of cases involving privacy invasion. Technology drives these privacy-invading crimes; however, crime also drives technology, creating a vicious cycle. Without technology an invader could not enter that of a stranger’s life.... [tags: Exploratory Essays Research Papers]
710 words (2 pages)
- Libel and Invasion of Privacy Libel and invasion of privacy are two very important issues dealing with broadcast media. The two are very similar but different from each. Libel deals more with what was actually printed or broadcast, where as invasion of privacy deals with how the information was actually gathered. Both have laws to regulate and influence what kind of information is gathered and, how it is actually obtained. Libel simply is "defamation of character by published word", the publishing of falsities to hurt a person's reputation or standing.... [tags: essays papers]
1174 words (3.4 pages)
- Foreign Policy: The Iran-Contra Affair
- The Price of Death: Romeo and Juliet by William Shakespeare
- The Pivotal Use of Multiple Narrators within Wilkie Collins’s The Moonstone
- The TPAJAX Project: Taking Down The Political Regime of Mosaddeq
- Baseball as a Plot and a Metaphor: The play, Fences by August Wilson
- Emergin Markets: Direct Selling at the Base of the Pyramid by Jessica Chelekis and Susan M. Mudambi