You can download the solution to the following question for free. For further assistance in Business Management assignments please check our offerings in Accounting assignment solutions. Our subject-matter experts provide online assignment help to Accounting students from across the world and deliver plagiarism free solution with free Grammarly report with every solution.
(ExpertAssignmentHelp does not recommend anyone to use this sample as their own work.)
Read the 3 Case Studies below and select ONE as the basis of your analysis and discussion. Please indicate clearly which Case Study you have chosen
Case Study 1 – Jennifer the Consultant
Three years ago Jennifer started her own consulting business. She has been so successful that she now has several people working for her and many clients. Their consulting work include.sd advising on how to set up corporate intranets, designing database management systems, and advising about security.
She is currently designing a database management system for the personnel office of a medium sized company. Jennifer has involved the client in the design process, informing the CEO, the director of computing, and the director of personnel about the progress of the system. It is now time to make decisions about the kind and degree of security to build into the system. Jennifer has described several options to the client. Because the system is going to cost more than previously planned, the client has decides to opt for a less secure system. Jennifer believes that the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims, salaries and so forth.
With weak security, employees working on client machines may be able to figure out ways to gain access to this data, not to mention the possibility of online access from hackers. Jennifer feels strongly that the system should be more secure. She has tried to explain the risks, but the CEO, director of computing and director of personnel all agree that less security will do.
What should she do? Should she refuse to build the system as they request?
PE_Assignment1_Set 1 – May 2015
Case Study 4 – Quality Assurance Case
A small software company is working on an integrated inventory control system for a very large national shoe manufacturer. The system will gather sales information daily from shoe stores nationwide. This information will be used by the accounting, shipping, and ordering departments to control all of the functions of this large corporation. The inventory functions are critical to the smooth operation of the system.
Jane, a quality assurance engineer with the software company, suspects that the inventory functions of the system are not sufficiently tested, although they have passed all their contracted tests. She is pressured by her employers to sign off on the software. Legally she is only required to perform those tests which have been agreed to in the original contract. However, her considerable experience in software testing has led her to be concerned over risks of the system.
Her employers say that they will go out of business if they do not deliver the software on time. Jane contends if the Inventory sub-system fails, it will significantly harm their client and its employees. If the potential failure were to threaten lives, it would be clear to Jane that she should refuse to sign off. But since the degree of threatened harm is less, Jane is faced with a difficult ethical decision.
Case Study 7 – Website Links
Yan is a public servant, he is a web developer within a department of a state government. Yan has been given responsibility for developing a tourism website by the I.T. Manager Sarah. Yan adds various links to news services to enliven this government webpage. These links include global news channels.
It is later found that those sites sometimes provide news on court cases which are currently under suppression order here in Australia as they are in process. When noticed this causes huge embarrassment to the government department.
Sarah, the I.T manager of the department had not seen the website before it went live but even if she had it is unlikely that she would have noticed and tested every link. In any case the links were not problematic until a local court case gave rise to a publication suppression order.
Sarah now needs to determine who should take responsibility and what actions should be taken about the event. She needs to prevent recurrence of this type of problem.
Briefly discuss the dilemma for Sarah. Show your utilisation of either Thomas White or Chris MacDonald’s methodology to demonstrate how Sarah might analyse and resolve the dilemma. Provide a recommendation of what actions Sarah should initiate and to whom she needs to communicate throughout the process.
Include in your answer those clauses from the ACS Code of Ethics and ACS Code of Professional Conduct that are relevant and briefly explain why. Refer also to any relevant legislation again with an explanation of how it relates.
PE_Assignment1_Set 1 – May 2015
From what you have learned during Week s 3 and 4 of your Professional Environments Course, discuss ethical, professional and legal issues which you consider arise from this scenario. Make some recommendations of actions which could be taken to resolve the situation and/or to minimise the chance the scenario may recur. Support your answers with relevant references (as well as the Codes and Laws).
Review your requirements with our FREE Assignment Understanding Brief and avoid last minute chaos.
We provide you services from PhD experts from well known universities across the globe.
No more plagiarism worries. We give you a FREE Grammarly report with every assignment.
The major responsibility of the consultant is to provide the best solutions, and information's to the clients. It can help clients to avoid risks and unnecessary problems during business operations. In the current case, also Jennifer is bound by the same responsibilities.
One of the clauses, 4.8.2 social implications, of ACS code of conduct, stated that being an ICT professional, there is need for respecting the privacy of other people (Code of Ethics 2016). She has fulfilled her major responsibility that she educated her client about all the security options which they can implement within the company. Jenifer has explained that there are various security systems that can complement with the nature of their data and business as well. She did not hide any service features from their client, which indicate her professional nature. Secondly, she has ensured that she should study the sensitivity of the client’s data and information which shows her competency as per the professional code of ethics (ACS Code of Professional Conduct Professional Standards Board Australian Computer Society 2012). The client stored the information like insurance policies of customers, their details and so on. Here, she fulfilled another clause of ACS code of ethics, 4.5 priorities, that she gives her best to secure the confidentiality of others.
Thus, she fulfilled her responsibility on the ground of both informing customers and exploring all the risks which are associated with their client's business. She further followed the 4.9 clauses of the ACS code of ethics. She tried to develop the professional environment and most specifically tried to implement 4.9.3, which says that ICT professional should encourage developing ethical and professional development (Code of Ethics 2016). At the same juncture, it could be seen from the case study that Jennifer put her serious efforts to convince the CEO of the company to go for the highly secured system. The CEO was stubborn, but she just informs them about the risks of losing data and easy access from the hackers and so on. It shows her fulfilment of professional conduct related to Honesty and giving preference to the public interest (ACS Code of Professional Conduct Professional Standards Board Australian Computer Society 2012).