Saturday, December 7, 2019

Business and Society Ethics Sustainability MyAssignmenthelp.com

Question: Discuss about the Business and Society for Ethics Sustainability. Answer: Introduction Ethical considerations are a key part of practice that professionals in diverse fields must observe and demonstrate. Ethics refer to a set of standard for judging right from wrong where one is required to act honestly and fair during decision making [1]. In this case, it is a mistake to use the privilege of access to information to read the private emails of network users. In any case the duties in a workplace demand one to read such emails for security reasons, individuals using the network who have the right to information disclosure must be made aware of the move, and the reasons disclosed earlier. Therefore, employees must be made aware that the workplace emails are not supposed to serve for private reasons and that every mail written shall be monitored for them to take precautions during engagement Warren, Warren, Lucas Lucas [5]. The right to information disclosure is essential in ethics where individuals vulnerable have to understand the consequences of their actions before making a certain move. The situation calls for ethical reasoning in the process of carrying out duties along with carrying on the roles at workplace. Ethics call for doing the right act that does not cause harm to others. Monitoring websites visited by individuals can be a job routine which if done for the right reasons and way is justified. Workplace networks are supposed to be used for purely professional reasons and are the work of a network system professional to check this for quality management at the workplace. Monitoring sites being used for quality purposes to prevent visiting pornographic sites are efficient towards creating a safe environment that does not encourage misuse according to Warren, Warren, Lucas Lucas [5]. It is ethical to consider information disclosure to the parties involved in advance to make them aware of the fact that the sites visited should remain solely for professional purposes. Further, they should be made conscious of the fact that the sites visited can be monitored for quality purposes and the repercussions to such actions revealed. In this case, employees shall understand the rights given to the network management professionals regarding intrusion to the privacy for work quality management reasons . Placing key loggers on the network to capture information typed by individuals can be a security measure towards organization information protection and a measure of quality management limiting workers to use computers for work-related purposes. Besides, using screen captures serves the same reasons of upholding information security that might remain vulnerable in the absence of monitoring. Care must be taken not to infringe on the rights to privacy and information disclosure. Employees or individuals attached to a given network have the right to be informed of the actions that might be taken on their accounts in absentia to enable them to take the right precautions. In remaining ethical, individuals working on the networks must be made aware that their actions at the workplace shall be monitored and reasons spelled out; say to protect information disclosure to third parties. In this case, professionals would be remaining ethical in their practice. The right to privacy and information disclosure in organizations remains an essential path towards success. For security reasons, reading information stored in computers and the file server can be okay if it goes in line with the work duties of network management professional. Identification and Analysis Workplace ethics suggest the use of resources for the right purposes where such use must remain for work-related benefits and personal information should be used at ones risk as it violates workplace provisions., advocates that in the process of doing so, the parties whose information might be accessed should be notified in advance to prevent breaching the right to privacy and information disclosure. Acting positive to an organization demands carrying out duties according to the roles described. However, ethical guidelines provide an essential right to doing good and that which is morally upright. In so doing ethics would remain practiced by the professionals. The professional should monitor the data in organizations after having disclosed the possibility of the same to the employees to make them aware and only do so in good faith to the organization and not for personal reasons. Information security individuals ought to remain responsible to their organizations and as well ethical in their undertakings so as to avoid harming the rest of the employees in organizations. The case presents an ethical issue where a professional risks being compromised to does a substandard security issue to meet a clients demand. Security is a key measure to information safeguard and thus must be upheld to the latter. Network security professionals should not leave any information to risk to conform to clients demand and lack of finance. In this case, it would be unethical for a security expert to go ahead and configure a network in a manner that will jeopardize the security concerns of individuals [2]. Ethics call for full protection, and if funds for such are not available, such installations should be postponed. References Archie, Carroll, and Ann Buchholtz.Business and society: Ethics, sustainability, and stakeholder management. Nelson Education, 2014. George H. Frederickson, and Richard K. Ghere.Ethics in public management. ME Sharpe, 2013. Thomas Peltier. R.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press, 2016. Shahryar Sorooshian. "Business Ethics for Mobile Network Operators."Science and Engineering Ethics(2017): 1-2. Matthew, Warren et al. "Ethics and ICT: Why all the fuss?."Journal of Information, Communication and Ethics in Society14.2 (2016): 167-169. Joseph Weiss W.Business ethics: A stakeholder and issues management approach. Berrett-Koehler Publishers, 2014.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.