Monday, December 9, 2019

Ethical Issue in ICT Operation for Security - MyAssignmenthelp.com

Question: Discuss about theEthical Issue in ICT Operationfor Security. Answer: Introduction The technological development of the existing models would allow the users for forming the growth of the use of ICT operations in the business organization. The ethical issue in the ICT professionals operations had been a severe case of the deployment of the existing technology and development schemes (Wilson Wilson, 2015). The use of specific models would allow the modification of the existing facilities in the organization. The article titled Danger Ahead: The Governments Plan for Vehicle-to-Vehicle Communication Threatens Privacy, Security, and Common Sense had been evaluated for forming the specific modulation of the development functions. Analysis of the Situation on Ethical Theories The situation depicted in the article consists of the ethical issue of privacy of data and information for transmittal. The government had planned to develop the internal communication of the vehicle to vehicle for improving the functions of the driving of the vehicles and detecting the location (Kiran, Oudshoorn Verbeek, 2013). The system had to be developed so that it could automatically send the information about the speed and movements of the car to other persons. The National Highway Traffic Safety Administration had been planning to develop such situation where the speed and movements of one vehicle would be transmitted to other and it would reduce the probability of occurrence of the traffic accidents (Williams, 2017). The major impact of the development plan is for forming the accurate and optimized development of the functions for the separate operations. The evaluation of the scenario in terms of the various ethical theories have been given below, Social Contract Theory: The social contract theory revolves around the persons preference and interest (Iep.utm.edu., 2017). The social interaction of the person is done when the person doesnt have the threat of sacrificing the individuals self interest. However, the contract theory is being made for realizing the fact that social contract or cooperation is only possible, when each of the individual is getting some benefit from the contract/cooperation. The parties of the social contract are being measured for providing support to the cooperation of the individual along with the actualization of self problems. In the scenario mentioned above the National Highway Traffic Safety Administration (NHTSA) have been thinking about developing the system for minimizing the factors of traffic and hence it would save the issue of traffic control for the National Highway Traffic Safety Administration. However, the situation would not be able to support the privacy concerns of the vehicle. The us e of information shared by the vehicles could be used for regulating the vehicle travel route (Oosterlaken, 2015). It would cause the issue of occurrence of infiltration of data and raising issue in forming system management. Utilitarianism Theory: The utilitarianism theory is the ethical theory causing the balance of positivity and negativity for any specific function (Ryan, 2015). The deployment of the uncommon development factor for increasing either sides of the theory would be minimized for developing the balance in the operations. The theory would evaluate the possibilities of forming the most accurate and modified functions for the development of the actions. The theory is being proven for supporting the most suitable action for the development of the accurate and appropriate development of the operations. The actions can be considered right if the action would maximize the possibility of the occurrence of good or it would minimize the occurrence of bad. The scenario of vehicle data transfer would minimize the possibility of the traffic accidents and it could be considered right. However, the same situation would maximize the possibilities of data infiltration and occurrence of theft in information (Oosterlaken, 2015). The similar situation would result in harming the ongoing faculties of divergence of the occurrence of the errors. The issue would cause the major mayhem for the operations of the system. Deontology Theory: The deontology theory would allow the users for focusing on the greater goods considering humanity as whole. The deontology theory would allow the users for forming the analysis of the development theory of occurrence of the issues and management (Sacco et al., 2016). There are several methods that would evaluate the maximization of the operations of the operations for forming the hindrance to the greater functions. The act is a representation of the person eccentric functions for developing the faster and more efficient theories. The universal acceptance criteria had been deployed for forming the acute development of the functions. The scenario had formed the occurrence of the deontological theory of forming the compliance of the deontology theory. The issue of the data privacy hindrance and lag would result in forming the definite harm to the existing operational system. The major compliance for the development of the issues in vehicle to vehicle data transfer is the external infiltration of the system information for their personal use (Mulgan, 2014). The people would have to suffer from privacy infiltration and the data misuse of their information. The location of the vehicle could serve the purpose of tracking any individual for harming them (financially or physically). Virtue Ethics Theory: The virtue ethics theory is being reinstated for forming the analysis of the qualities of the individual person for performing right (Hursthouse, 2013). The human virtue and ethics is the primary form of the analysis factor for the ethics of doing. The theory provides the analysis of an individuals concept for realizing whether the persons doing is good or bad. The virtue ethics had been uncovering the concept of developing the accurate and impact operations of the organization. The major concern of the person being good or bad would be evaluated in this theory. The scenario of the development of the appropriate modulation of the theory would result the formation of the system integrated operations in the organization. The more impactful operations of the organization are for forming the support to the developing field of operations. It is possible that the development factor would tarnish the correct doing intuition of National Highway Traffic Safety Administra tion. They want to reduce the amount of traffic on the roads by forming the transfer of the information related to speed and accurate position of the individual for forming the support to the person (Mulgan, 2014). The overall impact would result in forming the security and theft of the data. The intention of doing is right, in spite of the overall outcome to be bad. Recommendations: The development of the existing system for the transmitting the information and data would be helpful for forming the safety measures for the traffic congestion. The system integration with security would allow the users for forming the effective implementation of the system development. Some recommendations are, Security development using Encryption Network infiltration protection using IDS/IPS Conclusion It can be concluded from the evaluation of the article titles Danger Ahead: The Governments Plan for Vehicle-to-Vehicle Communication Threatens Privacy, Security, and Common Sense that the most important factor of development of the new system is the security. The security, privacy of the data, and network would be helpful for developing the definite development of the security functions. The transfer of the data and information would serve the purpose of keeping the data secured and private from external infiltration. The various theories like social contract theory, utilitarianism theory, deontology theory, and virtue ethics theory had been resulted in forming the development of the effective and smart functional development of the operations. The ongoing facilities of the development factor had been developed for forming the acute formation of the development of the system. References Hursthouse, R. (2013). Normative virtue ethics.ETHICA,645. Iep.utm.edu. (2017). Social Contract Theory | Internet Encyclopedia of Philosophy. Retrieved 14 May 2017, from https://www.iep.utm.edu/soc-cont/ Kiran, A. H., Oudshoorn, N., Verbeek, P. P. (2013). Designing norms: rethinking the relationships between design, ethics and technology. Mulgan, T. (2014).Understanding utilitarianism. Routledge. Oosterlaken, I. (2015). Towards an Ethics of Technology and Human Development. InEngineering Ethics for a Globalized World(pp. 109-125). Springer International Publishing. Ryan, A. (2015). 16. Utilitarianism and Bureaucracy: The Views of JS Mill. Sacco, D. F., Brown, M., Lustgraaf, C. J., Hugenberg, K. (2016). The Adaptive Utility of Deontology: Deontological Moral Decision-Making Fosters Perceptions of Trust and Likeability.Evolutionary Psychological Science, 1-8. Williams J., (2017).Danger Ahead: The Governments Plan for Vehicle-to-Vehicle Communication Threatens Privacy, Security, and Common Sense. Electronic Frontier Foundation. Retrieved 14 May 2017, from https://www.eff.org/deeplinks/2017/05/danger-ahead-governments-plan-vehicle-vehicle-communication-threatens-privacy Wilson, C., Wilson, G. T. (2015). Taoism, Shintoism, and the ethics of technology: an ecocritical review of Howl's Moving Castle.Resilience: A Journal of the Environmental Humanities,2(3), 189-194.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.