Tuesday, May 5, 2020

Chief Officer Company is creating pressureâ€Myassignmenthelp.Com

Questions: What's Going On? What Are The Facts? What Are The Issues (Non-Ethical)? Who Is Affected? What Are The Ethical Issues And Their Implications? What Can Be Done About It? What Are The Options? Which Option Is The Best And Why? Answers: 1.The title of this video is Early Launch. It starts with a scenario where the Program Director of the company is talking over the phone with the Chief Information Officer ("Scenario 3: Early Launch", 2017). Then the Project Manager enters the room. The Program Director informs him that the Chief Executive Officer of the company is creating pressure on the Chief Information Officer regarding early delivery of the Willis project. The CIA of the company even asked the Program Director whether their team will be able to deliver the Willis project one month earlier by eliminating the encryption part of the project. The CIA was worried whether the client company will sign the next contract or not whose worth is over and above 3 million. In reply the Project Manager said that according to Jason, the Senior Developer of the company, encryption is an important requirement for the Willey system that is needed to done. The Program Director on the other hand said that the chances of the system to get hacked is very little and if they deliver the project earlier then this will open several opportunities for the company in future. The situation depicted tension and dilemma between the Program director and the Project Manager of the company. 2.The scenario depicts an IT based company. There is a confusion regarding what can be done. The Program Director suggests that if the project team delivers the project one month earlier then there will be several opportunities for the company as well as the team. Delivering the project earlier will convince the client company to sign the next contract whose worth is more than 3 million. The company will definitely gain and even the project team will earn huge bonuses. The project team can deliver the Willis project one month earlier by not including the encryption part and later on attach encryption software after few weeks (Stallings Tahiliani, 2014). The Project manager on the other hand has a different point of view. According to him, encryption is an essential part of the Willey system and not encrypting it can cause serious trouble for the client company. It will also affect the reputation of the vendor company. 3.There is a severe non ethical issue in this matter. The ethics of encryption is an important part of organization or business ethics (Bellwood et al., 2014). When a vendor company delivers software, then it is the key responsibility of the client company to incorporate the security matter in the software project that it is delivering. If the company delivers the Willis project without encryption then it is a major non ethical issue in the security of the business organization. This will show that the company is not responsible enough to take care of the security of its client. Later on if the software of the Willey system gets hacked, then this will cause a loss of several sensitive data of the client company. If the vendor company does not encrypt the software that it is delivering to the client company just to deliver it before one month, then this becomes a non ethical issue in terms of business security and safety. 4.If the vendor company delivers the Willis project to the client company without encrypting it then there will a lot affected people. First of all, if the unprotected and unencrypted software gets hacked then this will cause a severe loss of sensitive information. This will in turn affect millions of people whose sensitive data is lost. Millions of people might lose their financial and other important information to the hackers. This can spoil the entire life of the people. Secondly, if the system gets hacked then the vendor companys reputation will fall to a great extent. Other companies will not give them any contracts in the future and this will generate huge loss for the vendor company. Delivering a product that is not secured and protected will not reflect well on the company. This will harm the company in future. The company will either have to shut down or will run at huge loss (Bednarz, 2013). If the client company files a complaint against the vendor company then this will lead to legal proceedings which will be extremely harmful for the company. So it can be concluded that it will affect the people whose data is stolen and also the vendor company in terms of their reputation. 5.There are several ethical issues in this scenario. The Program Director agrees to what the Project Manager says and delivers a safe and secured product to the client company. In this case the code of business ethics is followed. Though the vendor company does not deliver the product before the given deadline but it delivers a product that is safe and reliable. This will be good for the company in the future. Another issue can be that the Project Manager agrees to what the Director says and delivers the product before time but with no encryption. Here the implication can be severe. Later on when the system gets hacked then it not only affects the millions of users but also the project team of the company along with the reputation of the company. There can be another ethical issue that is the Project Manager disagrees to provide non encrypted software to the client (Martin, 2017). Here the project manager can be removed from this responsibility. This will demotivate the employees of the company. 6.There are several possibilities that can be done about this situation. The Project Director can agree with the Project Manager and explains the CIA regarding the need of encryption in the company. In this case, the company will deliver the project within the original deadline but will not be able to deliver one month earlier. But on the other hand the company will not lose its reputation and will do well in the future (Lazo Strider, 2015). This will result in giving high protection to the data and also raise the reputation of the company. The Project director must have faith on the Project Manager and follow no shortcut approach. 7.There are three options available in the video. First option is that the Project Manager agrees to what the Project director says and then they proceed to deliver the project before one month without encryption of the software. The consequence of this is dangerous in case of any hack in the future. The reputation of the company is spoilt. And on the other hand the job of the Project Manager is at risk. The second option is that the Project Manager disagrees with the Project Director. Here the Project Manager is taken off from the project. This will lead to dissatisfaction of employees in the organization (Franks Davis, 2015). The third option is that the Project Director agrees with the Project Manager and does not follow any shortcut. Here the companys reputation is maintained and there will not be any loss of sensitive data in the future. This will be ethically correct. 8.The best option for the company is to encrypt the software and then deliver it. This is the best option because this is ethically correct. This will not only protect the users from any loss but also will protect the company from loss of reputation ("Scenario III 3 Program Director Listens to team", 2017). The company will deliver a safe and reliable project to the client. This will enhance its reputation. This option will help in maintaining the ethics of the business and organization. References Bednarz, T. F. (2013). Ethics in Business.Practical Ethics for Food Professionals: Ethics in Research, Education and the Workplace, 75-91. Bellwood, T. A., Chumbley, R. B., Rutkowski, M. F., Tarpinian, A. (2014).U.S. Patent No. 8,724,811. Washington, DC: U.S. Patent and Trademark Office. Franks, D. M., Davis, R. (2015). The costs of conflict.SUSTAIN: Cutting Edge Business Solutions,2(February), 58-59. Lazo, A., Strider, S. H. (2015). Preparing students to be ethical decision makers.International Journal of Research in Social Sciences,5(1), 388-409. Martin, J. A. (2017). Encryption Backdoors: A Discussion of Feasibility, Ethics, and the Future of Cryptography. Scenario 3: Early Launch. (2017).YouTube. Retrieved 9 August 2017, from https://www.youtube.com/watch?v=v5M7ohdZ6qA Scenario III 3 Program Director Listens to team. (2017).YouTube. Retrieved 9 August 2017, from https://www.youtube.com/watch?annotation_id=annotation_726259537feature=ivsrc_vid=BEtvmNou7r8v=JjLK_JjAu48 Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.