Sunday, December 8, 2019

Includes Suggestion By The Project Manager-Myassignmenthelp.Com

Questions: What Is Going On? What Are The Facts? What Are The Issues? Who Is Affected? What Are The Ethical Issues And The Associated Implications? What Can Be Done About It? What Are The Options That May Be Used? Answers: 1.The scenario that has been selected for the case study includes the suggestion by the Project Manager to the Program Director to go ahead with the early launch of the project without the encryption. It has been suggested by the Project Manager on the recommendation of the CEO in order to gain more revenues and business opportunities (Youtube, 2017). 2.The Project Manager is not sure about the implications that the project may have in case of the absence of encryption from the project. Program Director; however, understands that the delivery of the project without encryption may lead to some serious implications such as security attacks and difficulties to the users (Bergold Thomas, 2012). 3.The CEO and the project client have urged to the Project Manager for early launch of the project. The Program Director has informed the manager regarding the issues such as security implications that may emerge (Heeney, 2016). The Manager has recommended that the fixes may be provided in the first security update. However, the delay in the inclusion of encryption can lead to violation of security and may impact the privacy of information (Glover, 2009). 4.Project Manager and his team will be affected as the early launch will lead to the impressive results in the beginning but occurrence of errors will be the accounting and responsibility of the project team. Project client will be affected as the decision to delay the launch may lead to adverse impact on the reputation (Birkholm, 2016).End users will also be affected as their information and data may be put to risk. Character Ethics 5.There are many ethical theories that have been defined and one of such theories is the theory of Character Ethics. As per the principles of this ethical theory, an activity can be termed as ethically correct only when the virtues that are involved are positive and lead to happiness. In this case, the Project Manager is willing to launch the project earlier due to personal benefits and selfish interests as it will provide him with better business opportunities. The Manager is ignoring the implications that his decision may have on the associated parties (Annas, 2014). Therefore, as per the principles of the theory of Character Ethics, the act included in the case study is not justified and is not correct as per the ethical principles. Theory of Consequentialism It is an ethical theory that says that the consequences of a particular activity determine the ethical justification of an activity. If the consequences that come out from an act are positive and cause benefits to all then the act is ethically correct and vice versa. In this case, if the decision is taken to go ahead with the early launch of the project without the encryption included in it, it may have negative consequences. The early launch will lead to the appreciation by the CEO and the project client to the project team and the project manager. However, in case of security implications, the client will get to know that the delivered project was defected and the same will lead to decreased customer trust and poor reputation in the market (Hoeyer, 2012). Since, the consequences that have been observed are negative in nature; the ethical correctness of the act cannot be justified. The act is ethically incorrect as per the theory of Consequentialism. Deontology Ethics This is the ethical theory that says that the act shall be based upon the rules and regulations that are defined in association with it. If the act does not maintain the adherence to the rules and guidelines, then the act cannot be termed as ethically correct (Mandal, Ponnambath, Parija, 2016). The primary rule of any project is to make sure that the customer and business requirements are met. Also, as per the rules of business and professional ethics, it is necessary to ensure that the professional and ethical codes of conduct are also met. There is a clear violation of all of these rules in this case and therefore, the act is ethically incorrect as per the theory of Deontology ethics. 6.The Project Manager must communicate the CEO and the project client regarding an important functionality that is missing which may lead to some of the severe security implications. A meeting shall be held with the Project Manager, Program Director and other project resources regarding the minimal time that may be taken to include encryption in the project (Ehrbar, 2015). 7.The following options may be used in this case: There shall be a revision of the project strategies and schedule to understand the least amount of time that may be taken to include encryption in the project. The Project Manager may seek for additional resources to speed up the tasks in order to fulfill the clients wish to receive the project earlier than the due date. If the time required to complete the project along with the encryption exceeds the earlier due date in all the scenarios, the Project Manager shall clearly communicate the security implications that the project may result in. Also, the plan to deliver the security update in the earliest fix shall also be informed. Conclusion Business ethics and professional code of conduct are the two parameters and necessities that must be reflected in all of the business processes and activities. In the case study, the Project Manager is looking at the immediate results that he will experience in terms of satisfied customer and increased business opportunities. However, in the long run, the decision may prove to be wrong as the project may experience security violations and other adverse results. The project resources must therefore understand that the use of incorrect and unethical practices will always lead to damage and loss. The business activities must be executed with utmost honest and correctness. References Annas, J. (2014). Applying Virtue to Ethics. Retrieved 9 August 2017, from https://onlinelibrary.wiley.com/doi/10.1111/japp.12103/abstract Bergold, J. Thomas, S. (2012). Participatory Research Methods: A Methodological Approach in Motion. Qualitative-research.net. Retrieved 9 August 2017, from https://www.qualitative-research.net/index.php/fqs/article/view/1801/3334 Birkholm, K. (2016). HYLE 22-1 (2016): The Ethical Judgment: Chemical Psychotropics. Hyle.org. Retrieved 9 August 2017, from https://www.hyle.org/journal/issues/22-1/birkholm.htm Ehrbar, J. (2015). Ethical Considerations of Genetic Manipulation in Sport. The Sport Journal. Retrieved 9 August 2017, from https://thesportjournal.org/article/ethical-considerations-of-genetic-manipulation-in-sport/ Glover, J. (2009). Doing  Ethics in Rural Health Care Institutions. Retrieved from https://geiselmed.dartmouth.edu/cfm/resources/ethics/chapter-04.pdf Heeney, C. (2016). An Ethical Moment  in Data Sharing - May 13, 2016. Journals.sagepub.com. Retrieved 9 August 2017, from https://journals.sagepub.com/doi/full/10.1177/0162243916648220 Hoeyer, K. (2012). Transgressive ethics: Professional work ethics as a perspective on aggressive organ harvesting - Oct 26, 2012. Journals.sagepub.com. Retrieved 9 August 2017, from https://journals.sagepub.com/doi/full/10.1177/0306312712460341 Mandal, J., Ponnambath, D., Parija, S. (2016). Utilitarian and deontological ethics in medicine. Retrieved 9 August 2017, from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4778182/ Youtube. (2017). Scenario 3: Early Launch. YouTube. Retrieved 9 August 2017, from https://www.youtube.com/watch?v=v5M7ohdZ6qA

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.