Wednesday, May 6, 2020

Analyse the Ethical Dilemma

Question: Required to analyse the ethical dilemma you have identified above using use the Doing Ethics Technique? Answer: 1. Introduction: McLean (2011) opined that the digitization of organizational works is closely related with arising of ethical issues. Katz Ali (2015) stated that implementation of ICT provides employees with more opportunity for utilizing organizational resources. On other hand Doridot, (2013) stated that the tasks of monitoring employees activities became more difficult due to extensive use of ICT applications in organization. However, use of ICT is resulting ethical dilemmas in business while increasing efficiency of employees. The current assignment deals with analysis of ethical issues related with ICT in my organization. In my organization, employees use e-mails for communicating among themselves. Recently it is found that some employees are using these e-mail accounts for their personal purposes also. In our organization e-mails are usrd sometimes for sharing data. It is also found that the confidentiality of data is lost due to use of e-mails. As the misuse of ICT is increasing, management of our organization has started monitoring the e-mail activities of each employee. Although monitoring all employees is reducing the chances of misusing e-mails, but it is also leading to loss of privacy for employees. Apart from this, increase in the number of ethical issues is not only destroying integrity of organization, it is also impacting negatively on the employee loyalty and productivity. 2. Eight Question Doing Ethics Technique: The effects of ethical issues regarding ICT on our organization can be understood using Eight Question Doing Ethics Technique. Use of Eight Question Doing Ethics Technique not only enables to identify the overall impact of ethical dilemmas on the performance of an organization, but it may give idea regarding the solutions of identified problems also (Medlin, 2013). 2.1 What is going on? Analysis on the current situation in our organization indicates that some employees are misusing e-mails and their activities are leading to loss of secrete data. As the management got proof for such activities, they started monitoring e-mail communications of all employees. As a result, the number of e-mail misuse is reducing. On other hand, monitoring all communications over e-mail is leading to privacy loss of every employee. It is causing rising of ethical dilemmas in organization. 2.2 What are the facts? As confidentiality of secrete data has been lost, profitability of the company is reducing. Monitoring every communication of all employees is also causing their privacy loss. It is resulting degradation of the relationship between management and employees. It is evident that the incidents of e-mail misuse are affecting long term performance of the organization. 2.3 What are the ethical and non ethical issues? Ethical issues: Analysis of current scenario indicates presence of two ethical issues-confidentiality loss of important data due to e-mail misuse some staffs and privacy loss of employees due to management activities. Non ethical issues: As some of the employees are involved with the incident of confidentiality loss of secret data, effectiveness of business strategies are reducing and thus the performance of business is degrading. Apart from this the relationship with employees is also degrading and it is reducing productivity of whole team. 2.4 Who is affected? The management is affected as profitability of business is reducing. Due to degradation in the relationship between management and employee both parties are affected. 2.5 What are the ethical issues and implication? Confidentiality loss of important data: Business strategies are becoming less effective. Some important data is also lost due to loss of important password. It cut down the revenue. Privacy loss of employees: Loyalty of employees is reducing. It is leading to loss of integrity and reduction in productivity. It is also impacting on the employee retention strategies. 2.6 What can be done? Management of our organization requires storing the misuse of e-mails while securing privacy of employees. 2.7 What are the options? Reducing use of e-mail: The management can reduce use of email to stop the malpractices. Partial access of data: Important data requires being partially available to employees. Management requires developing policies which will ensure that a staff is viewing only the required portion of database to increase security (Stuart Gillinder, 2013). Full data will be viewed by management team only. 2.8 Which option is best and why? Confidentiality of important data can be lost in different ways .Limiting the access to database not only reduces the chances of data loss through e-mails, it is also increasing security of data (Kelmendi, 2013). Thus it can be considered as best option. 3. Conclusion: The activities regarding use of ICT in last few months affected the relationship between, management and employees in our organization. Development of new policies can enable management to utilize ICT more efficiently without hampering level of integrity among staffs. References Doridot, F. (2013). Ethical governance of emerging technologies development. Hershey, PA: Information Science Reference. Katz, I., Ali, R. (2015). nformation and Communication Technology Literacy: What Do Businesses Expect and What Do Business Schools Teach?. Retrieved 13 March 2015, from https://www.ets.org/Media/Research/pdf/RR-10-17.pdf Kelmendi, K. (2013). Violence against Women: Methodological and Ethical Issues. Psychology, 04(07), 559-565. doi:10.4236/psych.2013.47080 McLean, A. (2011). Ethical frontiers of ICT and older users: cultural, pragmatic and ethical issues. Ethics And Information Technology, 13(4), 313-326. doi:10.1007/s10676-011-9276-4 Medlin, D. (2013). Integrations of technology utilization and social dynamics in organizations. Hershey, PA: Information Science Reference. Stuart, S., Gillinder, B. (2013). My Revision Notes OCR Cambridge Nationals in ICT Levels 1. London: Hodder Education.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.