Tuesday, December 10, 2019

Research Ethics for Smartphone Hacking Simulation- myassignmenthelp

Question: Discuss about theResearch Ethics for Smartphone Hacking Simulation. Answer: Introduction There is a lot of research and development work that is being carried out in every business sector and industry. It is necessary to ensure that the element of ethics is not missed out in any of the research work that is executed. There are many benefits and drawbacks that result out due to the execution of a research process. The case study that has been selected to carry out the analysis on research ethics is on the topic of Smartphone hacking simulation/testing in real workplace environment. The report covers the research background and studies the research work on the basis of the ethical theories and principles. The benefits and drawbacks of the research work are also included in the report. Research Background The research has been carried out on the ethical element of the topic Smartphone hacking simulation/testing in real workplace environment. There are a number of business organizations that carry out the hacking and testing processes on the Smartphones to understand the aspects of device performance, user activities, user preferences and choices. It provides the organizations with the ability to understand the latest set of practices and trends that are involved (Patton, 2002). The research methodology that has been used and applied in this case is the qualitative process of research. The process includes the collection of the data and information from a number of different data sources. The data is then analyzed to come up with the required trends and patterns. Research Purpose The purpose of the research is to understand the ethical, integrity and safety issues that are involved in the Smartphone hacking simulation/testing in real workplace environment. The research that is carried out on this topic is done to understand the user and device aspects that are associated with the Smartphones (Hancock, 2009). Expected Results The expected results that shall be gained after the completion of the research process are as listed below: Pros and cons of the research on the topic Smartphone hacking simulation/testing in real workplace environment. Ethical issues that are involved with the research process on the selected topic. Integrity and safety issues that are involved. Pros and Cons There are a number of advantages that come out with the research on the topic as Smartphone hacking simulation/testing in real workplace environment. The research process provides the details on the Smartphone behavior and performance along with the areas that may be improved. The process also lists out the user expectations from the Smartphones in terms of the features and functionalities. User preferences and trends can be easily understood with the results that are achieved which may aid in the development of better phones and marketing strategies. Customer feedback and the patterns in terms of the user activities can also be obtained. There are, however, a lot many cons that are also associated with the research process. In the process of simulation or testing of the device in the real workplace environment, the information that is present in the Smartphones is put at risk. The researchers get the access to all of the information which is usually critical and sensitive in nature. There is a lot of personal data and financial information that is also stored in the phones which is also exposed. The incidental or accidental use and exposure of information by the researchers can damage the privacy and security of the information. Ethical Issues, Integrity and Safety Issues and Risks There are various ethical principles and theories that have been applied to understand the ethical dilemmas that are involved with the research on Smartphone hacking simulation/testing in real workplace environment. As per the theory of Consequentialism, an act is termed as ethically correct if it involves positive results and outcomes. In this case, the consequences provide the details on user and device behavior, preferences, patterns and trends that allow the development of better functionalities, devices and strategies. However, the information and data may be put at risk which is also one of the prime consequences (Suikkanen, 2009). There have been many cases wherein the privacy of the data has been compromised. The activity cannot be put completely in the category of ethical activities due to the negative outcomes that are involved (Sachs, 2013). Deontology ethics is an ethical theory that says that the act shall abide by the rules and guidelines. In case of Smartphone hacking simulation/testing in real workplace environment, there are researchers and associates that do not stick to the professional codes of conduct. They expose the information of the users and the devices to the unauthorized entities which is completely unethical as per this theory (ONeill, 2012). There are also many integrity issues that are involved in the research on Smartphone hacking simulation/testing in real workplace environment. There are various unauthorized alterations that are often made by the malevolent entities by taking advantage of the privileges and rights that are provided to them. The integrity of the information and the device properties leads to the negative impact on the information and device privacy and safety. There are many location based services and other malware that are intentionally installed to keep a track of the activities even after the completion of the research work. The same is unknown to the users to take any action (Waters, 2017). The risks that are associated with these processes include the security and privacy risks in terms of data and information. There are insider threats that are executed to pass on the information to the competitors. Response Plan The first and the foremost response activity that shall be executed shall include the strengthening of the legal and regulatory policies. The users and device owners must be informed about the process and their consent must be received. The entire policies and terms shall be documented in a formal contractual agreement. The researchers and associates must be provided with ethical trainings and awareness sessions regarding the outcomes of the violation of ethics and professional codes of conduct. The process will lead to the avoidance of the deliberate threats and attacks (Lim, 2015). It is also necessary to promote end-user awareness. There are users that do not have any idea of the security mechanisms and protocols that they shall follow. The users must be informed about the latest advancements in the area to allow them to make sure that they take the corrective steps and actions for the avoidance and prevention of the attacks. There shall be use of enhanced logical and technical controls that must be installed on the Smartphones to enhance the security of the devices. These steps will make sure that the misuse of the device and device information is not possible (Keller, 2017). Conclusion It is necessary to make the necessary amendments and advancements in every business area and field. Such processes will lead to the adoption of the latest elements in every field and sector. However, it is equally important to stick to the business rules and guidelines so that the process does not result in any of the negative impacts. In case of Smartphone hacking simulation/testing in real workplace environment, there are various activities that may be carried out and this may cause harm to the end-users, device owners and associated entities. These damaging impacts are usually in the form of ethical, integrity, safety and privacy issues and risks. It is necessary to develop a treatment and response strategy to avoid and prevent such issues and risks. The response plan must target the avoidance of the risks by providing enhanced awareness and technical control on the devices. References Hancock, B. (2009). An Introduction to Qualitative Research. Retrieved 22 August 2017, from https://www.rds-yh.nihr.ac.uk/wp-content/uploads/2013/05/5_Introduction-to-qualitative-research-2009.pdf Keller, N. (2017). Why mobile security is more critical today, but still just as challenging. BetaNews. Retrieved 22 August 2017, from https://betanews.com/2017/08/15/mobile-security-is-more-critical-today/ Lim, D. (2015). Biometric security at the workplace: 5 factors to consider. Enterprise Innovation | Asia's Premier Business and Technology Publication. Retrieved 22 August 2017, from https://www.enterpriseinnovation.net/article/biometric-security-workplace-5-factors-consider-492282511 ONeill, O. (2012). Kantean Ethics. Retrieved 22 August 2017, from https://gbelic.org/courses/intro/lectures/lecture-7-deontology.pdf Patton, M. (2002). A Guide to Using Qualitative Research Methodology. Retrieved 22 August 2017, from https://cloudfront.ualberta.ca/-/media/science/research-and-teaching/teaching/qualitative-research-methodology.pdf Sachs, B. (2013). Reasons Consequentialism. Retrieved 22 August 2017, from https://www.st-andrews.ac.uk/philosophy/docs/staff/bas7/Reasons%20Consequentialism.pdf Suikkanen, J. (2009). Consequentialism, Constraints and the Good-Relative-to: A Reply to Mark Schroeder. Retrieved 22 August 2017, from https://www.jesp.org/articles/download/Consequentialism.pdf Waters, J. (2017). The ABCs of Identity Management. CSO Online. Retrieved 22 August 2017, from https://www.csoonline.com/article/2120384/identity-management/identity-management-the-abcs-of-identity-management.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.