PROJECT
Program: Information Systems Business Analysis
Course Name: Information System Ethics
Course Code: W24 BU1173-G2
Name: Navleen Kour
Student Id: 202303161
Introduction
In this time of rapid change and innovations, ethics are what guide the decisions and activities of
information systems professionals. This project is set out as a guide for those who are in
information systems and unfamiliar with the ethics involved. The principles of ethics and how to
apply ethics frameworks will be introduced in detail and interpreted by the case studies that will
be provided for a better understanding. Case B is one of the ethical dilemmas in all, and in this
instance, it is advised to implement a tracking feature without user consent. The case clearly
illustrates the complexity of moral principles, duties the professional must perform, and the
effects such actions could have on the key players. Using this particular case application of virtue
ethics, justice theory, and privacy rules, we will look deeper into the resulting ethical
ramifications and we are giving the recommendation that incorporates both its ethics level higher
and the problems on its many-sided side that are related to it.
Summary of Case B
In Case B, a software developer is confronted with the manager asking for the implementation of
a new feature that would be tracking user activity without the prior consent of users. Based on
the rule of ethical behaviour, however, such a step is regarded as a violation of users' privacy and
personal autonomy. They are concerned with action taken by their manager if they do not
comply with the request. The case showcases the dilemma of choosing between professional
duties and personal values, which underlines that the principle of professional ethics is essential
for software engineering practice.
Key Ethical Issues
Respect for user privacy and autonomy: Implementing the tracking feature without user
consent infringes upon their privacy rights and autonomy. People have legitimate
expectations regarding their involvement in a specific software platform that this will not
be monitored or tracked without user agreement. Not respecting this expectation gives
rise to a perception of not being trusted and puts aside the ethical principle of respecting
an individual’s right to decide on their personal information and online activities.
Integrity and honesty in professional conduct: The developer faces a conflict between
their ethical principles and pressure from their manager to compromise those principles.
We cannot tailor the tracking function without the permission of the users as the tactic is
the basis of the principles of deception and non-disclosure of tracking personal
information for spying purposes. At the same time, this is a moral dilemma between their
ethical standards and the pressure of the working environment as the manager requires
them to follow.
Balancing personal values with professional obligations: The developers would have to
balance their ethical standpoint and professional duty to the employer. This conflict
shows how difficult is to balance personal ethics and the institution’s codes with the
requirements there. The developers will need to take into account this conflict and
determine the most ethical decision that conforms to their moral beliefs and professional
commitments.
Impact on Stakeholders: The implementation of this feature without the user's
involvement might have dramatic implications to a considerable extent for different
parties. Users may feel they were lied to or betrayed, and worry about the quality of their
personal information and security, which can cause reputational issues for the company
as well.
Long-Term Ethical Implications: Applying this specific feature without the permission of
the user potentially will have long-term ethical consequences for both the company and
the whole industry. It thus creates a precedent for unethical procedures, corporations start
prioritizing their interests instead of users’ rights, and may potentially bring an
atmosphere of surveillance and distrust to the digital community.
Apply Ethical Frameworks
Utilitarianism
The establishment of the tracking feature could be beneficial in the company’s eyes
because it empowers them to collect user data for analysis and marketing purposes.
Although the effort being made towards protecting user privacy and freedom is
commendable, it has failed to mention the potential negative repercussions on their
privacy and freedom. From a utilitarian point of view, the overall well-being of the users
should be emphasized in which case privacy should be among the most essential
priorities. Therefore, the drawbacks of implementing the tracking feature without consent
prevail over the potential advantages that may be gained.
Given that privacy defence and preservation of freedom are well-noticed, it is crucial to
acknowledge the possible negative effects of implementing the tracking feature without
disclosing its purpose to the user. Through this measure, users' privacy and autonomy
are compromised, correspondingly with a rise in their lack of trust and unease.
Furthermore, information theft can be the consequence of unauthorized tracking that, in
turn, makes it possible to violate user privacy and handle sensitive data incorrectly,
which might result in data breaches and security risks.
Privacy protection and encouraging the well-being of the users are among the top social
values. Preservation of personal data security is not only important in the user's trustful
relationship with the company but also it increases the satisfaction of users and their
loyalty (Capital, 2024). Besides, the value of privacy for users might also be
compromised for business reasons causing distrust in a company since it may bring
about brand damage and legal issues.
Deontology
From a deontological standpoint, the developer must adhere to ethical principles,
including respect for user privacy and autonomy. Even if pressured by their manager, the
developer is obligated to act by these principles. Implementation of the tracking system
without approval would break the moral duties despite the potential effects.
Virtue Ethics
Virtue ethics starts from the fundamentals of virtue development and virtue cultivation
for moralities, such as honesty, integrity, and compassion. Concerning the case study, the
programmer can base the decision-making on a virtue ethics approach by demonstrating
how strongly their well-being affects their personality.
Among the core traits that such developer’s integrity embodies are honesty and openness
in the refusal to promote the tracking feature without user consent even if they face a
manager’s pressure. Developing an application that is geared towards user privacy and
autonomy reveals the fact that the developer has a commitment to ethical principles and
thus acts in line with his/her moral virtues.
Justice Theory
Justice theory, just as fairness or distributive justice, deals with the equal distribution of
burdens and advantages within society (Kaufman, 2012). Justice theory will act as a
compass for developers who must acquaint product users with fairness, and look into the
ethical issues concerned with other stakeholder group options.
Access to the monitoring option without the prior consent of the user would finally make
the disproportionate seizing of power and control possible as it goes beyond the limits of
the user's privacy rights. It undermines the cherished principles of fairness and equality
by reducing the users into objects whose freedoms and rights are limited as a result of
these surveillance practices.
Privacy Principles
Privacy principles constitute the basis for protecting individual data and for assuring their
legal protection at the same time (Policy, 2022). In regards to Case B, privacy principles
can be applied to make sure that no user’s privacy is broken and it stays protected and
respected during all stages of software development.
The developer should apply fundamental privacy ideals like transparency, consent, and
data minimization while creating and implementing the tracking option. One of the
principles is to give clear data collection information and request users’ explicit consent
for tracking activities, together with limiting the collection and use of personal data to
what is needed for serious purposes only.
Professional Decision-Making
o Communicate Ethical Concerns: The developer should initiate a conversation with their
manager to express their ethical concerns regarding the implementation of the tracking
feature without user consent. Precisely indicate the possible consequences for
stakeholders, highlighting the encroachment of user privacy rights and the degradation of
user belief and satisfaction.
o Refer to Professional Codes of Conduct: Appeal to professional codes of conduct, such as
the ACM Code of Ethics (ACM, 2024) and Professional Conduct or IEEE Code of Ethics
(IEEE, 2024), which emphasize the importance of respecting user privacy, autonomy,
and informed consent in software development practices. Illustrate the fact that the
proposed action goes against these ethical principles and weakens the authority of the
profession.
o Consider Legal and Regulatory Requirements: Assess relevant legal and regulatory
requirements, such as data protection laws (e.g., GDPR, CCPA) and industry standards,
to ensure compliance with legal obligations. Highlight the possible legal consequences of
inserting the tracking element either without user approval. These include fines, penalties,
and loss of the reputation of the company.
o Propose Ethical Alternatives: Offer alternative solutions that align with ethical principles
and legal requirements, such as obtaining explicit user consent for tracking activities or
implementing privacy-preserving measures to anonymize user data. Consider proposals
for easily understandable consent mechanisms and fully comprehendible accounts of data
collection procedures to encourage the trust of users.
o Long-Term Impact on Society: The long-term societal impact of the proposed solution
needs to be taken into account, and accordingly promote ethical practice and innovation
to ensure the industry remains accountable. Highlight how providing user privacy and
autonomy that support an ecosystem that is more ethical and sustainable will in the long
run build trust and transparency and protect human rights.
Privacy and Security
The issue of privacy and security must be dealt with as a matter of being the number one
priority for any software project where the coming software is involved (A3Logics,
2023). Enabling a tracking mechanism without the consent of the user not only
contravenes the privacy of users but also exposes the data to potential vulnerable security
risks.
Finding the right balance between measures of security and with privacy of users is the
key for software development practices to be kept ethical and prominent in the society.
(Linkedin, 2023)
Anonymity
Guarding the anonymity of the whistleblower or individuals reporting ethical violations
amongst the employees in the company is necessary to instill ethical behaviour as well as
to prevent retaliation.
Conclusion
The end of Case B shows the ethical considerations in the information system field and the
importance of professionals in their reconciliation with moral rightness and responsibility. Virtue
ethics, justice theory, and the principle of privacy that we have deployed in this research help us
identify the ethical concerns and provide a solution which is privacy-centric, which is in line
with the requirements of the professional codes of conduct and which promotes the individual
well-being and social well-being in the long term. While the technology is presented
continuously advanced, Ethical awareness and ethical decision-making would remain vital for
technology to be used for the well-being of the people and overturn the fundamental values of
fairness, respect and justice. It is by the same ethical dedication and professional ethics that
professionals in the industry can obtain a more ethical and sustainable digital future.
Presentation
Introduction:
The information systems bring into force ethical concerns making it crucial to undergo
ethical analysis.
Case B is the situation of a software engineer who is forced to install tracking software at
the end users' lack of consent.
It points out the ethical conflict that revolves around personal morality and professional
impartiality.
Ethical Analysis:
Major problems include the invasion of privacy of users and how the moral
responsibilities of the professional services can be engaged with the professional code of
conduct and when personal values clash with job tasks.
Utilitarianism pursues the idea that the end should always justify the means and
companies by user well-being over corporate interests.
Deontology imparts the importance of such ethical principles which will not change no
matter the external pressures.
Virtue ethics, on the other hand, inspire morality of honesty, courage, and integrity in the
thought process.
The idea of justice as a theory also supports fairness and impartiality treatment to all the
concerned parties.
Privacy principles encourage voluntary and understated disclosure, and demand for the
least data possible to be processed and retained.
Professional Decision-Making:
While thus the developer should address their manager with ethical concern.
Concerning regulatory requirements to legal frameworks, professional conduct must form
guidance to the actions of individuals.
Since the 21st century as digital technology advances, so do the ethical implications.
Undoubtedly, these implications are immense and urgent. Nonetheless, ethical societal
structuring, focusing on user privacy, and taking into consideration the long-term societal
effects are inevitable.
Conclusion:
For Case B we see the ethical issues in the bearing on the information systems.
Ethical frameworks aid in the modelling and exploration of problems.
The first necessity is ahead of user privacy and the society’s fabric
Ethical consciousness is inexorable for individuals to develop ethical practices helping to
formulate a moral digital future.
References
A3Logics. (2023, May 12). Why Security is The Top Priority in Software Development.
Retrieved from A3Logics: https://www.a3logics.com/blog/why-security-is-the-top-
priority-in-software-development
ACM. (2024). ACM Code of Ethics and Professional Conduct. Retrieved from ACM:
https://www.acm.org/code-of-ethics
Capital, F. (2024, March 23). How Data Privacy Startups Can Help Businesses Build Customer
Loyalty and Trust. Retrieved from Faster Capital: https://fastercapital.com/content/How-
Data-Privacy-Startups-Can-Help-Businesses-Build-Customer-Loyalty-and-Trust.html
IEEE. (2024). IEEE Code of Ethics. Retrieved from IEEE:
https://www.ieee.org/about/corporate/governance/p7-8.html
Kaufman, A. (2012). Distributive Justice. Retrieved from Science Direct:
https://www.sciencedirect.com/topics/social-sciences/distributive-
justice#:~:text=Distributive%20Justice%2C%20Theories%20of&text=Distributive
%20justice%20is%20concerned%20with,with%20competing%20needs%20and
%20claims.
Linkedin. (2023, April 27). Balancing Data Security and User Privacy. Retrieved from
Linkedin: https://www.linkedin.com/pulse/balancing-data-security-user-privacy-finding-
sweet-spot
Policy, F. P. (2022). The Six Privacy Principles of the GDPR. Retrieved from Free Privacy
Policy:
https://www.freeprivacypolicy.com/blog/gdpr-6-privacy-principles/#:~:text=According
%20to%20Article%205(1,Data%20Minimization