Wednesday, May 6, 2020

ICT-Cyber Crime

Question: What is the ICT-Cyber Crime ? Answer : Introduction The ethical dilemma is about the systems where there is an involvement of all the mental conflicts with the problems of the moral imperatives. There have been considerations about the situations where the different course of actions is necessary for determining the ethics, values, morals and the different laws. The principles include the group to identify situations for the right course of action where the reliability is on handling the logical and the regional criteria with cognitive process. (Chell et al., 2016). The description is based on the value or the prize where the feeling is the affective component. The report is about how the ethical issues have a significant impact on the organization set in regards to ICT tools. The discussion is about the ABC Company which has been facing the problem of the cybercrime and cyber security and hacking. The description is mainly related to the problems with the discussions about how the issues are settled in the business organization. Description of the Case ABC Company works on the architectural designing, and all the data is set in the computer systems so that all the employees could easily access it. The designs are set to the primary database server for correctly handling the networking with the other employees so that they can work on it by just logging in to their account. The designs for any architectural company are the intellectual models that are confidential in the database of the network. But with time, it was noticed that all the architectural plans are being hacked by the competitor company. (Crane et al., 2016). The error messages clearly showed that the cyber-hacking is taking place where there is no major evidence about the stealing as it was done in a systematic manner, where the data was used by the other company with the development set before the ABC. (Dugan et al., 2016). Analysis With the development, it was also found that the company is involved in the growth phase where the primary outlet for the designing was funded, and the employees were hired for the same. The target was the new customers so that the architectural company ABC could be popular in the market. But with time, it was also found that the designs for the target market under a particular range for all the houses, or the buildings, etc., were leaked. The Doing Ethics Technique has been necessary to analyze the effects with the setup of all the issues or the problems which have been discussed: What is going and what are the facts for the ethical issue? The hackers used the technique of cybercrime to hack the server of the ABC Company where the designs were completely stolen, and the product range of the company was also utilized for the business development of the rival company. (Fiolleau et al., 2016). What is the issue of accessibility? With the patterns set, the issue is the major ethical fact where the hackers directly got the entry for the database of the system. It led to stealing the designs in the completely unauthentic manner where the access has been driven mainly by the confidential data with proper designing. Who has been affected? It has been seen that the stakeholders of the company have been majorly affected with this, as they trusted the architectural company to work on the same. The delivery of the products was based on attracting all the new customers with the range of growing business, and stealing the designs was sued due to hacking. There has been a huge loss with the problems related to the product demands. What has been the ethical issue and their implication? Considering the standards of the company, the focus has been mainly on not able to claim for the designs. (Hindley et al., 2017). The ABC Company had to lose their company graphics and the information which was copied and gradually hacked by the rival company, unknowingly. Along with this, there has been no trademark that the designs only belong to the ABC Company and so there is no possibility to claim for the problem that occurred. The result of this was that there had been no possible generation of revenue. What can be done about it? Presently, nothing can be done for the loss, but in future, it is important that the server is improved and the designs are registered under the government with a copyright mark so that any hacking could not take away the rights of the company. (Mullen et al., 2016). What options are best for this? To comment on the options, the improvement in the infrastructure is necessary, to the network security standards, to meet the demands of the clients as well. This will help in overcoming all the problems with the protection from the firewall as well as correctly accessing the database with the better issues. Conclusion With this, the ethical standards are necessary to be met so that the company ABC can handle the loss along with trademark the designs. The company could not claim for the stolen designs as there was no evidence of proof for the same. (Dugan et al., 2016). The issue could not easily be resolved for this but could be taken care of the same in future through better network security setup. Reference Chell, E., Spence, L. J., Perrini, F., Harris, J. D. (2016). Social entrepreneurship and business ethics: does social equal ethical?.Journal of Business Ethics,133(4), 619-625. Crane, A., Matten, D. (2016).Business ethics: Managing corporate citizenship and sustainability in the age of globalization. Oxford University Press. Dugan, M. T., Taylor, G. (2016). ETHICAL ISSUES RELATED TO EARNINGS MANAGEMENT: AN INSTRUCTIONAL CASE.Journal of the International Academy for Case S Fiolleau, K., Kaplan, S. E. (2016). Recognizing ethical issues: An examination of practicing industry accountants and accounting students.Journal of Business Ethics, 1-18. Hindley, A., Font, X. (2017). Ethical Issues of Consumer Behaviour. Routledge. Mullen, E. W., Cory, S. N., Martinez, G. (2016). ETHICAL ISSUES AND SELLING: PERCEPTIONS OF MEN AND WOMEN.International Journal of Sales, Retailing Marketing,5(2).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.