Name:
Institutional Affiliation
Decision-making framework.
Fact-finding
The revelation of technology in the last two decades has influenced the society in a manner that many had not perceived. Not only has technology been applied in places of business, but it is also in our personal lives. A hallmark of this technological revolution is social media. To facilitate some of these services, such as online banking, the user is required to part with vital information. These data includes personal records, bank statements, documents of high value, say tenders to services of bitcoins. with the availability of such information online, information concerning personal details of computer users lives such as bank records and identification. Using a technique dubbed phishing, online criminals hack into emails or accounts of unsuspecting victims and plant a pop-up message. If the user clicks this message a virus is installed on their devices that retrieve all the passcodes, addresses and log in the user might have. They then use this information to embezzle funds from accounts or steal identities. Phishing can also be accomplished by sending e-mails to unsuspecting users. These e-mails have malware installed and upon opening them, steals information. Some The end user does not have the infrastructure to ensure data flows fluently and privately among billions of other typical users trying to do the same. The management of data has been left to companies that provide such services with a specialization in controlling super computers that manage the grid of Internet connection in a relative area. These companies have data storage systems and satellites that enable billions of users to interconnect. This paper seeks to delve into the ethical issues management of data brings. Who has the right to access this data? To whom does this information belong? Does the business of managing data give the responsibility to monitor its application? When technology started influencing business enterprises, the positive outcome was felt instantly (George, 2007). Business became easier and efficient. When a company is installing a Human Resource or payroll system, the service providers of this system would need access to all the records of the company to facilitate its assimilation. This data may include personal information of clients and employees. Do these developers observe confidentiality while sifting through data that they may not be given access to in different circumstances?
Shareholder identification
Which brings us to the individuals who are part of this quagmire. The stockholders include the end user, data management companies and eventually stockholders. (Hull, 2011) The end user suffers the most. Being the customer, this stockholder has to part with data to access the service. This data is handed to authorities whom may do with it as they may so, please. Users should take the initiative and be informed. The easiest resolve is to not click on pop-ups or emails that are unfamiliar and not to give out the information required be private such as pin numbers or passwords. If users can identify an element of the cybercrime, avoiding it becomes that much easier and securing of private data online will give confidence to users to use these vital easier services.The second stockholder is the data management service provider, whose runs the company that provides the business is to facilitate data exchange with optimum efficiency. As a bonus to engaging in this kind of entrepreneurship, these companies’ gains access to vital information that can be used for commercial purposes. These stakeholder needs to facilitate the security of data users bestows upon them. These are the enterprises with resources that can access security opportunities the end user may be unable to. Guaranteeing this security enables market security and business growth as customers will rely on companies that can deliver security against cyber crimes.
Among such opportunities is, for instance, a lending institution uses personal financial data obtained from a car loan transaction to market new products to the same customers. This was not the original intention when that data was provided. If the customer feels that there was a breach of confidentiality or manipulative business, they will seek business elsewhere. The financial institution will lose a portion of its market. These companies will need to protect the interests of the customers to promote ethical business practices. The final stakeholder is the stockholder. Stockholders usually own enterprises that manage data on a global scale majorly. If such institutions abuse the confidentiality of the data they manage, scandals will wreck the company. This will damage the companies’ integrity and eventually business will shut down. Stockholders need to take interest of the company at a managerial standpoint in order to micromanage decisions and ensure they conform ethically. With the application of business policies that facilitate the security of the service of mutual interests, these owners will be promoting solidification of a dependable business enterprise.
Consequence consideration.
The provision for a solution to this challenge could be viewed as the same perspective enterprises have been solving ethical issues since time in memorial. Application of traditional ethical theories provides two key options. (Newton, 2009)The solution can be based with priority going to the result, with the end users interests’ comprising the solution otherwise known as teleological theories. Alternatively, it can be propped up on the method of achieving ethical data management with the consequences taking a back seat. This may involve influencing the customer to sign away privacy rights to this data; hence, the corporation will not be breaking any laws. Otherwise known as deontological theories. The challenge is that traditional theories have not changed with the evolution of the market that is technological assimilation. Moreover, these theories did not factor in the change in competition, which stiffened, and innovation of present day business. Another perspective is the application of normative theories of business ethics whose interest is to protect the stockholders. These are the individuals who invested their time and resources to creating this company and are the rightful owners.
As much as this business may risk mismanagement of confidential and important personal data, they are the eventual losers, businesswise, when the consumer goes up in arms against some of the management policies. In the defense of the stockholders, the users know the risk that comes with entering information online. Once it is online, it is everywhere and accessible to all those who have the capability of doing so. So the business owners should be protected from market manipulation or abuse if normative theories were the way to go. The solution could be anchored upon the laws that govern business. This solution seeks justification in the constitution where human rights are core. Business practices rights are also taken into account. This contractarianism approach is considered just and fair (Pimple, 2014).
Guidelines and principles
This solution will give the corporations legal ownership of the data if the consumer consents. This will enable the corporations to apply the data in practices that promote the business, in most cases marketing, without violating the rights of the user nor breaking any constitutional policies. With sustainability of the business guaranteed, this solution profits the stockholders eventually (George, 2007). The stockholder will be confident enough to indulge in a business that is legal, profitable, and innovative without compromising its reputation nor putting its important consumers in harm’s way. Enterprises that require consumer confidentiality need to earn the trust of the consumer. A company can only do this if principles such as honesty diligence and self-preservation are applied in its practice. It needs to employ individuals who are of the highest conduct and practice a non-tolerance policy to employees who are unable or abuse these standards. These companies need to consider whether or not there are any constitutional violations in terms of privacy and rights in the service they wish to provide. Such an enterprise also needs to formulate internal policies to facilitate this. Among such policies are social policies. These cater for maintenance and distribution of income so that employees remain well motivated by punctual and reasonable payments. Moreover, the company can also implement a customer policy that caters for any complaints relevant to data security, so as to ensure that such matters are given first and adequate attention and solutions. Information dissemination to customers concerning developments in the system should also be made policy as transparency boots consumer trust in the company and confidence in the service.
Evaluation of options
Contractarianism is the best approach due to its main strength; upholding the law. This benefits the consumer predominantly as human rights take the lead in this solution. It considers the right to privacy, where users have the option of whether or not to agree on releasing personal information. The consumer has only himself/herself to blame if this information lands in the wrong hands. This method also protects the company.
An alternative is a pluralism which is a solution that leans focus on the social principles that govern morality. Ethical attributes such as self-improvement, honesty and fairness will all be considered as vital principles of the solution regardless of the cost.
Decision review.
The result of the application of contractarianism has the interest of all stockholders in its roots. The consumers whose information was at jeopardy will now have a say on what information goes online (Newton, 2009). Confidential and private information will be released only if the user allows it. To the companies, the greatest gain is constitutional protection.
Evaluation of results
There will be no legal violations of any kind if the company uses the vital information for business practices. Whatever they may be, the consumer is aware of these transactions as they gave the go ahead to the companies. With co-operation of the actual owners of the information, ethical business will flourish. This solution will benefit the stockholder too. With good ethical business practices comes to a good public image and reputation. With the growth of a market come increased profits and an eventual rich stockholder (Hull, 2011).
There is a need, however, to formulate company policies that are customized to enduring ethical values are practiced in the enterprise. With the evolution of cybercrime in the modern day internet society, companies need to take measures in assisting users to curb these crimes. Research needs to be done on formulating ways of providing online services on a continuous basis as hackers will constantly find their way around present solutions. Cybercrimes no longer affect users only but companies too. The relevant stockholders should invest more resources in protecting the consumer as it is an ethical responsibility to ensure customer protection and satisfaction. Enterprises should formulate laws that govern the company in accordance with the constitutional laws to avoid indulging in illegal means of data retrieval when conducting business. Moreover, governments should also revise some laws that govern online businesses to accommodate new crimes that come up every day. This will solidify the assurance the public has on conducting important transactions online.
References
George, R. D. (2007). The ethics of Information Technology and business. New York: Wiley.
Hull, R. T. (2011). Ethical Issues in the new reproductive technologies. New York: Prometheus Books.
Newton, D. E. (2009). DNA Technology: A Reference Handbook. Thousand Oaks: ABC-CLIO.
Pimple, K. D. (2014). Emerging Pervasive Information and CAommunication Technologies (PICT). Amsterdam: Springer Netherlands.
TO GET YOUR ASSIGNMENTS DONE AT A CHEAPER PRICE,PLACE YOUR ORDER WITH US NOW