SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
ETHICS CASE STUDY REVIEW 1
Ethics Case Study Review
John Kostak
Georgetown University – School of Continuing Studies
Masters of Professional Studies in Technology Management
Capstone Course (MPTM-900-01)
January 21, 2017
Professor Mikah Sellers
ETHICS CASE STUDY REVIEW 2
Table of Contents
Abstract...........................................................................................................................................3
New Stakeholders...........................................................................................................................4
Interwoven Ethics and Governance .............................................................................................5
Network Security ...........................................................................................................................6
Mitigation and Balance .................................................................................................................8
Works Cited..................................................................................................................................11
ETHICS CASE STUDY REVIEW 3
Abstract
Since the beginning of modern business, there has never been a greater need and opportunity for
the application of Professional Ethics, than today. Given the volatile times we live in, companies
have to aggressively compete to meet their strategic business plan and achieve their mission, all-
the-while being responsible corporate stewards of their information-use policies and enterprise
network security. This case study review takes a look at the challenges facing a modern day
networked business and how to balance the interests of the organization with customer’s privacy
rights, need for security and public demand for greater transparency.
ETHICS CASE STUDY REVIEW 4
Ethics Case Study Review
At the core of the digital network age is a catalyst infrastructure of enterprise networks
and virtual networks, capable of providing unprecedented access to information. Never before
has it been so easy to acquire, store and transmit detailed information in a split second around the
world. (Vaccaro, September 4, 2012) CIOs have traditionally done well utilizing ethical analysis,
governance and best practices to set policy and security standards to protect against sensitive
information leaking and data breaches. However, a current trend, similar to that of enterprise
networks “extending” out into private and public clouds to deliver more services to customers
and partners (Hogue, 2010), has C-Suite executives scrambling to assess how the cataclysmic
growth of virtual networks and their communities will redefine their information and security
policies. It’s not enough now to just update the corporate communications, privacy and network
security policies. As big data becomes more valuable and marketers show no boundaries as to
how far they’ll reach out to engage their customer “community”, we’re witnessing firsthand the
integration of social and community networks with corporate networks. There are a few key
areas or business functions that senior executives in organizations will need to review regarding
resulting ethical issues and mitigation solutions for ultimately what should be the design and
implementation of new “virtual” information management, governance and security policies.
New Stakeholders
As the flow of information gets rerouted in response to the virtualization of networked
organizations, stakeholders will change. Those who were firewalled off so-to-speak for
transparency reasons by a third party, now may be a direct enabler and supporter of your
business model and vice versa. And the communications strategy to engage your key
stakeholders may change from being managed by corporate governance to a real-time dynamic
ETHICS CASE STUDY REVIEW 5
engagement model overseen by your social media plan. As referenced in the case study, Redfin
actually, through understanding their information flow structure, leveraged their virtual network
structure of social media and apps and reinvented their industry.
Interwoven Ethics and Governance
Ethical issues can become interwoven in the virtual network world. It’s not enough to
managed silos of functions, each managing their own ethical issues and providing governance,
like Corporate Communications, Investor Relations, Partner and Supply Chain, Social Media and
PR/Press. Many of these are becoming shades of gray, blurring the lines of where one policy
plan stops and another begins as a new discipline. It gets complicated and managers have to be
careful and provide sound and ethical judgment across the board. The privacy or information
security policy for one virtual area of your business may adversely affect another virtual area.
This impacts the best practice plans of corporate transparency and information reliability in
similar ways.
Our governance laws protecting information come from both the corporate world and
governments and both, more or less, focus on their own best interests and reducing risk. The
average corporate policy on information privacy considers mainly protecting intellectual
property within the private enterprise network and behind the physical, guns-guards-and-gates
security. (Harris, 2006) Few corporations have a modern privacy and information security policy
reflective of the new vulnerabilities and risks associated with managing business within the new
domains of virtual networks.
Government has made attempts over the years to introduce new legislature or modify
existing but is severely challenged to keep up with the tsunami of privacy issues related to virtual
and social network build out and integration. The Computer Fraud and Abuse Act can punish
ETHICS CASE STUDY REVIEW 6
anyone who’s attempted to commit an offense or conspiring to do so in regards to breaching a
computer and or the materials on it as a personal asset. (Congress, 1986) The Stored
Communications Act of 1986 has to do with the disclosure of ‘stored wire and electronic
communications and transactional records’ held by a third party ISP. It was also enacted in 1986
and helps to cover the gap left by the Fourth Amendment that protects our right against
unreasonable search and seizure but in this case, “protection” isn’t considering online or digital
assets. (Legislation) The Privacy and Security Responsibilities, Bureau of Consumer Protection
Business Center, Federal Trade Commission performs initial adjudicative fact-finding for the
Commission and resolves disputes made in discovery, explains the correct legality, applies the
law to the facts, and when necessary, issues an order on the remedy. The FTC is expected to be
a popular court to vet many of the up and coming issues related to information privacy.
Network Security
Virtual breaches can be just as damaging if not worse than corporate enterprise breaches.
As recounted in the 2011 Data Breach Investigations Report (DBIR) (Verizon RISK Team with
cooperation from the Australian Federal Police, 2012), 2011 could go down as a year of civil and
cultural uprising. This unrest was not limited to the physical world, as the online world was
riveted with the clashing of ideals, taking the form of activism where the theft of corporate and
personal information was a core tactic. “Hacktivism” haunted organizations around the globe.
The following are snapshots of the summaries of the breach report findings:
ETHICS CASE STUDY REVIEW 7
ETHICS CASE STUDY REVIEW 8
The difficulty in preventing security breaches has dropped over the past few years as better
and easier to configure/deploy technology is available. The challenge comes in mitigating the
risks and balancing security with transparency as it relates to information production and
dissemination over the new “integrated virtual network”, in example:
• The corporate enterprise network – definition and boundaries
• Extended enterprise and VPNs – definition and boundaries
• Partner extranets – definition and boundaries
• Member login portals – definition and boundaries
• Private, public, community and hybrid clouds – definition and boundaries
• The public internet – definition and its boundaries
CIOs and their team must consider all of these types of networking topologies when defining
who corporate, privileged, partner, customer and public users will be, and set the security
policies and configurations accordingly.
Mitigation and Balance
It’s one of the most important balancing acts that a CIO or CTO will face in the new
virtual networked business community; how to balance your customer’s privacy rights, need for
security, and public demand for greater transparency with the interests of your organization. One
of the concluding points from the case study was to remember at the end of the day (or
beginning!) to have an “individual conscious”. The article continues to remind us that the new
business community of stakeholders “has no borders – no rules”.
I believe first and foremost that those who are ultimately responsible for the viability of
the organization (C-suite/board of directors/advisors) need to spear head a new model for Ethics
that spearheads a service-oriented approach to solving the ethical and security issues in the new
ETHICS CASE STUDY REVIEW 9
virtual networked organization. Even before defining the vision (where do we want to go?) and
the mission (how are we going to get there), moral thought needs to be front and center and an
ethics policy should be defined for the common good of the whole company. The ethics policy
could be a framed box of principles for what the company stands for and where the “line(s)”
where they will stop at during the process of achieving their vision.
I’d like to introduce an architecture as a possible model to follow. I call it the “Virtual
Enterprise Ethics Engagement Model” (ve3) for defining and managing Ethics, Transparency,
Compliance, Governance, Security and Risk.
Ethics and the subsequent guidelines focused on managing the flow of information
within the organization stakeholder community are critical methodologies and processes to
manage because when it comes to breaches, misinformation and information leaks, it’s not a
matter of “if”, but “when”. The ve3 model can help manage all of the key variables that will
impact the way information should flow and to whom. When defining governance guidelines,
ETHICS CASE STUDY REVIEW 10
inputs about the kind of information that will be required, processed, stored and shared can be
assigned priorities that will determine a suggested output policy to follow and it can assign a risk
score to feed into the risk analysis function.
The model will need to include an audit and measure process so that it can continue to
evolve as the virtual networked community evolves. And yes, we should have a real-time ve3
app for this! Our organization’s community (virtual
networks) will only grow and become more sophisticated
and complex. Senior executives need to embrace the
changes, but stay out in front of it and don’t let this
evolution and revolution control their business vision and
mission. What can save them hardship down the road, is
leading with an ethics policy and management model. If
they can put this stake in the ground early on, they may
find that the following traditional guidelines concerning
information for IR, communications and commerce will
be easier than ever to establish.
ETHICS CASE STUDY REVIEW 11
Works Cited
Congress, U. S. (1986). Computer Fraud and Abuse Act.
Harris, S. (2006, August). Information Security Governance Guide. Retrieved April 2012, from
Tech Target: http://searchsecurity.techtarget.com/tutorial/Information-Security-
Governance-Guide
Hogue, F. (2010, September 30). CIO Update. Retrieved October 8, 2012, from IT Business
Edge: http://www.cioupdate.com/trends/article.php/3906131/How-to-Govern-the-Ever-
Extending-Enterprise.htm
Legislation, U. S. (n.d.). Stored Communications Act of 1986.
Vaccaro, A. (September 4, 2012). Ethics Hold the Key to Network Contradictions. DEEPinsight,
7.
Verizon RISK Team with cooperation from the Australian Federal Police, D. N.-C. (2012). 2012
Data Breach Investigations Report. Retrieved October 8, 2012, from Verizon Business:
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-
2012_en_xg.pdf

Weitere ähnliche Inhalte

Was ist angesagt?

ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEIJNSA Journal
 
88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 apr88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 aprStraits Interactive
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
The non market issue of cloud computing hp - cloud security alliance
The non market issue of cloud computing   hp - cloud security allianceThe non market issue of cloud computing   hp - cloud security alliance
The non market issue of cloud computing hp - cloud security allianceSumaya Shakir
 
15707 53009-1-pb (1)
15707 53009-1-pb (1)15707 53009-1-pb (1)
15707 53009-1-pb (1)Samir Sami
 
Ea S Presentation Mc D 20090824
Ea S Presentation   Mc D   20090824Ea S Presentation   Mc D   20090824
Ea S Presentation Mc D 20090824Doug McDavid
 
IT Structure & Firm Interdependency - Relational Rents
IT Structure & Firm Interdependency - Relational RentsIT Structure & Firm Interdependency - Relational Rents
IT Structure & Firm Interdependency - Relational RentsPaul Di Gangi
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
Web3 And The Next Internet - New Directions And Opportunities For STM Publishing
Web3 And The Next Internet - New Directions And Opportunities For STM PublishingWeb3 And The Next Internet - New Directions And Opportunities For STM Publishing
Web3 And The Next Internet - New Directions And Opportunities For STM PublishingMills Davis
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintKim Jensen
 
Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...
Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...
Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...iBoP Asia
 
Communication of csr by portugese bank
Communication of csr by portugese bankCommunication of csr by portugese bank
Communication of csr by portugese bankAgava18
 
Digital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe caseDigital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe caseMatthias Dobbelaere-Welvaert
 

Was ist angesagt? (16)

July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
 
88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 apr88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 apr
 
Privacy Year In Preview
Privacy Year In PreviewPrivacy Year In Preview
Privacy Year In Preview
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
The non market issue of cloud computing hp - cloud security alliance
The non market issue of cloud computing   hp - cloud security allianceThe non market issue of cloud computing   hp - cloud security alliance
The non market issue of cloud computing hp - cloud security alliance
 
15707 53009-1-pb (1)
15707 53009-1-pb (1)15707 53009-1-pb (1)
15707 53009-1-pb (1)
 
Ea S Presentation Mc D 20090824
Ea S Presentation   Mc D   20090824Ea S Presentation   Mc D   20090824
Ea S Presentation Mc D 20090824
 
IT Structure & Firm Interdependency - Relational Rents
IT Structure & Firm Interdependency - Relational RentsIT Structure & Firm Interdependency - Relational Rents
IT Structure & Firm Interdependency - Relational Rents
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Web3 And The Next Internet - New Directions And Opportunities For STM Publishing
Web3 And The Next Internet - New Directions And Opportunities For STM PublishingWeb3 And The Next Internet - New Directions And Opportunities For STM Publishing
Web3 And The Next Internet - New Directions And Opportunities For STM Publishing
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO Reprint
 
Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...
Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...
Where Can Public Policy Play a Role A Comparative Case Study of Regional Inst...
 
Communication of csr by portugese bank
Communication of csr by portugese bankCommunication of csr by portugese bank
Communication of csr by portugese bank
 
Digital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe caseDigital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe case
 

Andere mochten auch

Business ethics case study
Business ethics case studyBusiness ethics case study
Business ethics case studyAnmol Sawhney
 
Business ethics case studies
Business ethics case studiesBusiness ethics case studies
Business ethics case studiesSheau Hui Tan
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowingParveen Bano
 
Information Ethics Case Study
Information Ethics Case StudyInformation Ethics Case Study
Information Ethics Case Studystacimnovak
 
Case Study for Research Ethics Social Audit for Public Service Delivery_PACc
Case Study for Research Ethics Social Audit for Public Service Delivery_PACcCase Study for Research Ethics Social Audit for Public Service Delivery_PACc
Case Study for Research Ethics Social Audit for Public Service Delivery_PACcthinktankinitiative
 
Burson-Marsteller and Facebook: A Public Relations Ethics Case Study
Burson-Marsteller and Facebook: A Public Relations Ethics Case StudyBurson-Marsteller and Facebook: A Public Relations Ethics Case Study
Burson-Marsteller and Facebook: A Public Relations Ethics Case StudyNicole Troelstrup
 
Legal issues and challenges of Mergers & Acquisitions in Business world
Legal issues and challenges of Mergers & Acquisitions in Business worldLegal issues and challenges of Mergers & Acquisitions in Business world
Legal issues and challenges of Mergers & Acquisitions in Business worldFatima Aljaidi
 
Case srudy be & cg
Case srudy be & cgCase srudy be & cg
Case srudy be & cgshirufi
 
case study , Executive compensation: needed incentives, justly deserved, or ...
 case study , Executive compensation: needed incentives, justly deserved, or ... case study , Executive compensation: needed incentives, justly deserved, or ...
case study , Executive compensation: needed incentives, justly deserved, or ...Fatima Aljaidi
 
Case study Business ethics, Being Smart about Smartphones
Case study Business ethics, Being Smart about Smartphones Case study Business ethics, Being Smart about Smartphones
Case study Business ethics, Being Smart about Smartphones Fatima Aljaidi
 
Smart phones: improving life
Smart phones: improving lifeSmart phones: improving life
Smart phones: improving lifeSimba Bvundura
 
Acct 422 hollate manufacturing case study ethics
Acct 422 hollate manufacturing case study  ethicsAcct 422 hollate manufacturing case study  ethics
Acct 422 hollate manufacturing case study ethicsDeanaThomas11
 
Nestlé the infant formula controversy
Nestlé   the infant formula controversyNestlé   the infant formula controversy
Nestlé the infant formula controversyMilena Leguizamon
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSRajiv Ranjan Singh
 
Essay on executive compensation
Essay on executive compensationEssay on executive compensation
Essay on executive compensationAtam Motufoua
 
Business ethics case studies sept 2015
Business ethics case studies sept 2015Business ethics case studies sept 2015
Business ethics case studies sept 2015Lau Hui Ming Belinda
 
Nestle: Baby Formula Case Study
Nestle: Baby Formula Case StudyNestle: Baby Formula Case Study
Nestle: Baby Formula Case StudyMark Zatta
 
A Case Study on Rural Entrepreneurship
A Case Study on Rural EntrepreneurshipA Case Study on Rural Entrepreneurship
A Case Study on Rural EntrepreneurshipAbhilash Ravishankar
 

Andere mochten auch (20)

Business ethics case study
Business ethics case studyBusiness ethics case study
Business ethics case study
 
Business ethics case studies
Business ethics case studiesBusiness ethics case studies
Business ethics case studies
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowing
 
Information Ethics Case Study
Information Ethics Case StudyInformation Ethics Case Study
Information Ethics Case Study
 
Case Study for Research Ethics Social Audit for Public Service Delivery_PACc
Case Study for Research Ethics Social Audit for Public Service Delivery_PACcCase Study for Research Ethics Social Audit for Public Service Delivery_PACc
Case Study for Research Ethics Social Audit for Public Service Delivery_PACc
 
Burson-Marsteller and Facebook: A Public Relations Ethics Case Study
Burson-Marsteller and Facebook: A Public Relations Ethics Case StudyBurson-Marsteller and Facebook: A Public Relations Ethics Case Study
Burson-Marsteller and Facebook: A Public Relations Ethics Case Study
 
Legal issues and challenges of Mergers & Acquisitions in Business world
Legal issues and challenges of Mergers & Acquisitions in Business worldLegal issues and challenges of Mergers & Acquisitions in Business world
Legal issues and challenges of Mergers & Acquisitions in Business world
 
Case srudy be & cg
Case srudy be & cgCase srudy be & cg
Case srudy be & cg
 
case study , Executive compensation: needed incentives, justly deserved, or ...
 case study , Executive compensation: needed incentives, justly deserved, or ... case study , Executive compensation: needed incentives, justly deserved, or ...
case study , Executive compensation: needed incentives, justly deserved, or ...
 
Case study Business ethics, Being Smart about Smartphones
Case study Business ethics, Being Smart about Smartphones Case study Business ethics, Being Smart about Smartphones
Case study Business ethics, Being Smart about Smartphones
 
Smart phones: improving life
Smart phones: improving lifeSmart phones: improving life
Smart phones: improving life
 
Acct 422 hollate manufacturing case study ethics
Acct 422 hollate manufacturing case study  ethicsAcct 422 hollate manufacturing case study  ethics
Acct 422 hollate manufacturing case study ethics
 
ADARSH SCAM PPT
ADARSH SCAM PPTADARSH SCAM PPT
ADARSH SCAM PPT
 
Nestlé the infant formula controversy
Nestlé   the infant formula controversyNestlé   the infant formula controversy
Nestlé the infant formula controversy
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OS
 
BP case study
BP case studyBP case study
BP case study
 
Essay on executive compensation
Essay on executive compensationEssay on executive compensation
Essay on executive compensation
 
Business ethics case studies sept 2015
Business ethics case studies sept 2015Business ethics case studies sept 2015
Business ethics case studies sept 2015
 
Nestle: Baby Formula Case Study
Nestle: Baby Formula Case StudyNestle: Baby Formula Case Study
Nestle: Baby Formula Case Study
 
A Case Study on Rural Entrepreneurship
A Case Study on Rural EntrepreneurshipA Case Study on Rural Entrepreneurship
A Case Study on Rural Entrepreneurship
 

Ähnlich wie Ethics Case Study Review_JKostak_APA_Style

Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceNathaniel Russell
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docxnolanalgernon
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfjiricejka
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protectionNicha Tatsaneeyapan
 
How to navigate token launch risks - a16z crypto.pdf
How to navigate token launch risks - a16z crypto.pdfHow to navigate token launch risks - a16z crypto.pdf
How to navigate token launch risks - a16z crypto.pdfHarsha MV
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big DataNicolae Sfetcu
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security PoliciesLaura Martin
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?Cigniti Technologies Ltd
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 

Ähnlich wie Ethics Case Study Review_JKostak_APA_Style (20)

Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological Competence
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docx
 
Review questions
Review questionsReview questions
Review questions
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
How to navigate token launch risks - a16z crypto.pdf
How to navigate token launch risks - a16z crypto.pdfHow to navigate token launch risks - a16z crypto.pdf
How to navigate token launch risks - a16z crypto.pdf
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big Data
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 
5G - Societal Security_9
5G - Societal Security_95G - Societal Security_9
5G - Societal Security_9
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 

Mehr von John Kostak

JW Marriott Testimonial | Creative & Production
JW Marriott Testimonial | Creative & ProductionJW Marriott Testimonial | Creative & Production
JW Marriott Testimonial | Creative & ProductionJohn Kostak
 
Disrupting higher education student recruitment
Disrupting higher education student recruitmentDisrupting higher education student recruitment
Disrupting higher education student recruitmentJohn Kostak
 
MPTM500 Presentation Outline_Abr_JK_Latest
MPTM500 Presentation Outline_Abr_JK_LatestMPTM500 Presentation Outline_Abr_JK_Latest
MPTM500 Presentation Outline_Abr_JK_LatestJohn Kostak
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALJohn Kostak
 
WTFFinalPaperJohnKyleLizKil
WTFFinalPaperJohnKyleLizKilWTFFinalPaperJohnKyleLizKil
WTFFinalPaperJohnKyleLizKilJohn Kostak
 
WTF Where's The Food
WTF Where's The Food WTF Where's The Food
WTF Where's The Food John Kostak
 
2010 NEO Econ Study(1)
2010 NEO Econ Study(1)2010 NEO Econ Study(1)
2010 NEO Econ Study(1)John Kostak
 
Proposal for the Creation of a New Economic
Proposal for the Creation of a New EconomicProposal for the Creation of a New Economic
Proposal for the Creation of a New EconomicJohn Kostak
 
NEO ED Strategy Executive Summary Presentation 120205
NEO ED Strategy Executive Summary Presentation 120205NEO ED Strategy Executive Summary Presentation 120205
NEO ED Strategy Executive Summary Presentation 120205John Kostak
 
Cluster Strategy Team Memorandum of Understanding
Cluster Strategy Team Memorandum of UnderstandingCluster Strategy Team Memorandum of Understanding
Cluster Strategy Team Memorandum of UnderstandingJohn Kostak
 
How-to-Make-a-Region-Innovative
How-to-Make-a-Region-InnovativeHow-to-Make-a-Region-Innovative
How-to-Make-a-Region-InnovativeJohn Kostak
 
Critical Steps in Cluster Development
Critical Steps in Cluster DevelopmentCritical Steps in Cluster Development
Critical Steps in Cluster DevelopmentJohn Kostak
 
AdaptiveCluster_proposal_CityLabfall11_FINAL[1]
AdaptiveCluster_proposal_CityLabfall11_FINAL[1]AdaptiveCluster_proposal_CityLabfall11_FINAL[1]
AdaptiveCluster_proposal_CityLabfall11_FINAL[1]John Kostak
 

Mehr von John Kostak (13)

JW Marriott Testimonial | Creative & Production
JW Marriott Testimonial | Creative & ProductionJW Marriott Testimonial | Creative & Production
JW Marriott Testimonial | Creative & Production
 
Disrupting higher education student recruitment
Disrupting higher education student recruitmentDisrupting higher education student recruitment
Disrupting higher education student recruitment
 
MPTM500 Presentation Outline_Abr_JK_Latest
MPTM500 Presentation Outline_Abr_JK_LatestMPTM500 Presentation Outline_Abr_JK_Latest
MPTM500 Presentation Outline_Abr_JK_Latest
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
 
WTFFinalPaperJohnKyleLizKil
WTFFinalPaperJohnKyleLizKilWTFFinalPaperJohnKyleLizKil
WTFFinalPaperJohnKyleLizKil
 
WTF Where's The Food
WTF Where's The Food WTF Where's The Food
WTF Where's The Food
 
2010 NEO Econ Study(1)
2010 NEO Econ Study(1)2010 NEO Econ Study(1)
2010 NEO Econ Study(1)
 
Proposal for the Creation of a New Economic
Proposal for the Creation of a New EconomicProposal for the Creation of a New Economic
Proposal for the Creation of a New Economic
 
NEO ED Strategy Executive Summary Presentation 120205
NEO ED Strategy Executive Summary Presentation 120205NEO ED Strategy Executive Summary Presentation 120205
NEO ED Strategy Executive Summary Presentation 120205
 
Cluster Strategy Team Memorandum of Understanding
Cluster Strategy Team Memorandum of UnderstandingCluster Strategy Team Memorandum of Understanding
Cluster Strategy Team Memorandum of Understanding
 
How-to-Make-a-Region-Innovative
How-to-Make-a-Region-InnovativeHow-to-Make-a-Region-Innovative
How-to-Make-a-Region-Innovative
 
Critical Steps in Cluster Development
Critical Steps in Cluster DevelopmentCritical Steps in Cluster Development
Critical Steps in Cluster Development
 
AdaptiveCluster_proposal_CityLabfall11_FINAL[1]
AdaptiveCluster_proposal_CityLabfall11_FINAL[1]AdaptiveCluster_proposal_CityLabfall11_FINAL[1]
AdaptiveCluster_proposal_CityLabfall11_FINAL[1]
 

Ethics Case Study Review_JKostak_APA_Style

  • 1. ETHICS CASE STUDY REVIEW 1 Ethics Case Study Review John Kostak Georgetown University – School of Continuing Studies Masters of Professional Studies in Technology Management Capstone Course (MPTM-900-01) January 21, 2017 Professor Mikah Sellers
  • 2. ETHICS CASE STUDY REVIEW 2 Table of Contents Abstract...........................................................................................................................................3 New Stakeholders...........................................................................................................................4 Interwoven Ethics and Governance .............................................................................................5 Network Security ...........................................................................................................................6 Mitigation and Balance .................................................................................................................8 Works Cited..................................................................................................................................11
  • 3. ETHICS CASE STUDY REVIEW 3 Abstract Since the beginning of modern business, there has never been a greater need and opportunity for the application of Professional Ethics, than today. Given the volatile times we live in, companies have to aggressively compete to meet their strategic business plan and achieve their mission, all- the-while being responsible corporate stewards of their information-use policies and enterprise network security. This case study review takes a look at the challenges facing a modern day networked business and how to balance the interests of the organization with customer’s privacy rights, need for security and public demand for greater transparency.
  • 4. ETHICS CASE STUDY REVIEW 4 Ethics Case Study Review At the core of the digital network age is a catalyst infrastructure of enterprise networks and virtual networks, capable of providing unprecedented access to information. Never before has it been so easy to acquire, store and transmit detailed information in a split second around the world. (Vaccaro, September 4, 2012) CIOs have traditionally done well utilizing ethical analysis, governance and best practices to set policy and security standards to protect against sensitive information leaking and data breaches. However, a current trend, similar to that of enterprise networks “extending” out into private and public clouds to deliver more services to customers and partners (Hogue, 2010), has C-Suite executives scrambling to assess how the cataclysmic growth of virtual networks and their communities will redefine their information and security policies. It’s not enough now to just update the corporate communications, privacy and network security policies. As big data becomes more valuable and marketers show no boundaries as to how far they’ll reach out to engage their customer “community”, we’re witnessing firsthand the integration of social and community networks with corporate networks. There are a few key areas or business functions that senior executives in organizations will need to review regarding resulting ethical issues and mitigation solutions for ultimately what should be the design and implementation of new “virtual” information management, governance and security policies. New Stakeholders As the flow of information gets rerouted in response to the virtualization of networked organizations, stakeholders will change. Those who were firewalled off so-to-speak for transparency reasons by a third party, now may be a direct enabler and supporter of your business model and vice versa. And the communications strategy to engage your key stakeholders may change from being managed by corporate governance to a real-time dynamic
  • 5. ETHICS CASE STUDY REVIEW 5 engagement model overseen by your social media plan. As referenced in the case study, Redfin actually, through understanding their information flow structure, leveraged their virtual network structure of social media and apps and reinvented their industry. Interwoven Ethics and Governance Ethical issues can become interwoven in the virtual network world. It’s not enough to managed silos of functions, each managing their own ethical issues and providing governance, like Corporate Communications, Investor Relations, Partner and Supply Chain, Social Media and PR/Press. Many of these are becoming shades of gray, blurring the lines of where one policy plan stops and another begins as a new discipline. It gets complicated and managers have to be careful and provide sound and ethical judgment across the board. The privacy or information security policy for one virtual area of your business may adversely affect another virtual area. This impacts the best practice plans of corporate transparency and information reliability in similar ways. Our governance laws protecting information come from both the corporate world and governments and both, more or less, focus on their own best interests and reducing risk. The average corporate policy on information privacy considers mainly protecting intellectual property within the private enterprise network and behind the physical, guns-guards-and-gates security. (Harris, 2006) Few corporations have a modern privacy and information security policy reflective of the new vulnerabilities and risks associated with managing business within the new domains of virtual networks. Government has made attempts over the years to introduce new legislature or modify existing but is severely challenged to keep up with the tsunami of privacy issues related to virtual and social network build out and integration. The Computer Fraud and Abuse Act can punish
  • 6. ETHICS CASE STUDY REVIEW 6 anyone who’s attempted to commit an offense or conspiring to do so in regards to breaching a computer and or the materials on it as a personal asset. (Congress, 1986) The Stored Communications Act of 1986 has to do with the disclosure of ‘stored wire and electronic communications and transactional records’ held by a third party ISP. It was also enacted in 1986 and helps to cover the gap left by the Fourth Amendment that protects our right against unreasonable search and seizure but in this case, “protection” isn’t considering online or digital assets. (Legislation) The Privacy and Security Responsibilities, Bureau of Consumer Protection Business Center, Federal Trade Commission performs initial adjudicative fact-finding for the Commission and resolves disputes made in discovery, explains the correct legality, applies the law to the facts, and when necessary, issues an order on the remedy. The FTC is expected to be a popular court to vet many of the up and coming issues related to information privacy. Network Security Virtual breaches can be just as damaging if not worse than corporate enterprise breaches. As recounted in the 2011 Data Breach Investigations Report (DBIR) (Verizon RISK Team with cooperation from the Australian Federal Police, 2012), 2011 could go down as a year of civil and cultural uprising. This unrest was not limited to the physical world, as the online world was riveted with the clashing of ideals, taking the form of activism where the theft of corporate and personal information was a core tactic. “Hacktivism” haunted organizations around the globe. The following are snapshots of the summaries of the breach report findings:
  • 7. ETHICS CASE STUDY REVIEW 7
  • 8. ETHICS CASE STUDY REVIEW 8 The difficulty in preventing security breaches has dropped over the past few years as better and easier to configure/deploy technology is available. The challenge comes in mitigating the risks and balancing security with transparency as it relates to information production and dissemination over the new “integrated virtual network”, in example: • The corporate enterprise network – definition and boundaries • Extended enterprise and VPNs – definition and boundaries • Partner extranets – definition and boundaries • Member login portals – definition and boundaries • Private, public, community and hybrid clouds – definition and boundaries • The public internet – definition and its boundaries CIOs and their team must consider all of these types of networking topologies when defining who corporate, privileged, partner, customer and public users will be, and set the security policies and configurations accordingly. Mitigation and Balance It’s one of the most important balancing acts that a CIO or CTO will face in the new virtual networked business community; how to balance your customer’s privacy rights, need for security, and public demand for greater transparency with the interests of your organization. One of the concluding points from the case study was to remember at the end of the day (or beginning!) to have an “individual conscious”. The article continues to remind us that the new business community of stakeholders “has no borders – no rules”. I believe first and foremost that those who are ultimately responsible for the viability of the organization (C-suite/board of directors/advisors) need to spear head a new model for Ethics that spearheads a service-oriented approach to solving the ethical and security issues in the new
  • 9. ETHICS CASE STUDY REVIEW 9 virtual networked organization. Even before defining the vision (where do we want to go?) and the mission (how are we going to get there), moral thought needs to be front and center and an ethics policy should be defined for the common good of the whole company. The ethics policy could be a framed box of principles for what the company stands for and where the “line(s)” where they will stop at during the process of achieving their vision. I’d like to introduce an architecture as a possible model to follow. I call it the “Virtual Enterprise Ethics Engagement Model” (ve3) for defining and managing Ethics, Transparency, Compliance, Governance, Security and Risk. Ethics and the subsequent guidelines focused on managing the flow of information within the organization stakeholder community are critical methodologies and processes to manage because when it comes to breaches, misinformation and information leaks, it’s not a matter of “if”, but “when”. The ve3 model can help manage all of the key variables that will impact the way information should flow and to whom. When defining governance guidelines,
  • 10. ETHICS CASE STUDY REVIEW 10 inputs about the kind of information that will be required, processed, stored and shared can be assigned priorities that will determine a suggested output policy to follow and it can assign a risk score to feed into the risk analysis function. The model will need to include an audit and measure process so that it can continue to evolve as the virtual networked community evolves. And yes, we should have a real-time ve3 app for this! Our organization’s community (virtual networks) will only grow and become more sophisticated and complex. Senior executives need to embrace the changes, but stay out in front of it and don’t let this evolution and revolution control their business vision and mission. What can save them hardship down the road, is leading with an ethics policy and management model. If they can put this stake in the ground early on, they may find that the following traditional guidelines concerning information for IR, communications and commerce will be easier than ever to establish.
  • 11. ETHICS CASE STUDY REVIEW 11 Works Cited Congress, U. S. (1986). Computer Fraud and Abuse Act. Harris, S. (2006, August). Information Security Governance Guide. Retrieved April 2012, from Tech Target: http://searchsecurity.techtarget.com/tutorial/Information-Security- Governance-Guide Hogue, F. (2010, September 30). CIO Update. Retrieved October 8, 2012, from IT Business Edge: http://www.cioupdate.com/trends/article.php/3906131/How-to-Govern-the-Ever- Extending-Enterprise.htm Legislation, U. S. (n.d.). Stored Communications Act of 1986. Vaccaro, A. (September 4, 2012). Ethics Hold the Key to Network Contradictions. DEEPinsight, 7. Verizon RISK Team with cooperation from the Australian Federal Police, D. N.-C. (2012). 2012 Data Breach Investigations Report. Retrieved October 8, 2012, from Verizon Business: http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report- 2012_en_xg.pdf