Who is responsible for the data and protecting its privacy


Discussion Post: Ethical Issues That Impact User-Centered Design

Throughout this course, you have learned about user-centered systems design and evaluation. Specifically, you have learned how to employ user-centered methodologies in the design of information technology applications and systems, to analyze user problems to inform user-centered design solutions, and to evaluate the design and development of a user-centered system. As user-centered design solutions are implemented, it is critical to consider the ethical impact. Although IT professionals design solutions that focus on user requirements and user needs, a system could have an unethical component that creates long-term problems for users, organizations, and society.

For this discussion:

a) Review the three ethical scenarios.
b) Select one scenario.
c) Answer the questions to reflect on how you would handle the situation.

In your initial post, be sure to communicate to your peers which scenario you selected.

Scenario A: Imagine you are leading user testing for a software system development team of a large organization. Before beginning the user testing, you have users sign a nondisclosure agreement (NDA). At some point in the system development, you discover that one of the users violated the NDA and disclosed information to potential users of the system. You became aware of this after user testing was completed. If you select this scenario, reflect on the following:

a) How would you respond, and what would you do?

b) How would your decision and actions impact others?

c) What have you learned in this course to help you address an ethical dilemma like this?

Scenario B: Imagine you are a developer for a small start-up, and your project team recently collected user data from surveys. This user data contains first- and last-name information, phone numbers, and geographical information, as well as data on personal preferences and on user behaviors with an interface. A few weeks before your project team launches the system, you receive an email from a colleague you admire. This colleague works for a company you have been thinking about working for. The company is also a competitor of your current company because they share a similar user base. In the email, your colleague asks you to forward the data you gathered. By forwarding the data, you can save your colleague's company time, money, and resources. If you select this scenario, reflect on the following:

a) How would you respond, and what would you do?

b) Who is responsible for the data and protecting its privacy?

c) What impact would you have on your current organization and on the surveyed users if you decide to share that information?

Scenario C: Imagine you are a UX designer for a new augmented reality (AR) medical system. You love the innovative design that the interface offers to users, but there is a problem with its accessibility. Doctors, nurses, other medical staff, and patients need to use the system. Currently, the AR that you and your team developed is not usable by those who have vision or hearing disabilities. Another developer on your project team claims that the system is ready to be released on the market and sold to hospitals. If you select this scenario, reflect on the following:

a) How would you respond, and what would you do?

b) Is the technology ready to be released on the market?

c) How much consideration should you and your company give to the AR user experience for those users who may have a disability?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Who is responsible for the data and protecting its privacy
Reference No:- TGS03284687

Expected delivery within 24 Hours