As their preferences, the decision comes along with

As Charnwood East Midlands Hotel is
planning to introduce a new business intelligence analytics solution for
effective analysis of their clients and their preferences, the decision comes
along with a consideration of the ethical and professional issues tied to it,
accompanied by the compliance of the legal framework surrounding the system.

1. Information System Ethics

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Ethical problems have recently faced
increased consideration by managers making decisions related to the
implementation of information systems as they continue to be ubiquitous in
human lives. The hotel has to consider the values they endorse as an
association, the ethical moralities they are channelled by, and the responsibility
of information technology in the choices that have to be made in the commercial
world in order to cultivate an agenda to counter ethical quandaries. (Bose, 2011)

1.1 Code of Conduct

With respect to the business
intelligence analytics solution to be created, Charnwood East Midlands Hotel
has the responsibility to adopt its own ‘Code of Conduct’ in order to establish
a professional and ethical nature of responsibility across the firm. For
example, the British Computer Society has the onus to set guidelines and
professional ideals to direct the behaviour of its affiliates in professional
complications (BCS, The Chartered Institute for IT, 2015).

1.2 Professional Responsibilities

The central database has to be used in a
professional manner, where the users are obligated to respect their duties and
responsibilities during their work. The data provided should be utilised accurately
to achieve the goals of the hotel where all the employees aim to ensure the
security of the data warehouse (Bocij, Greasley and Hickie, 2015).

2. Computer Crime

agencies are collecting huge quantities of data from numerous sources to face
the intimidating task of protecting various firms such as Charnwood East
Midlands Hotel against cybersecurity threats and defending their intellectual
properties and foundation. Existing investigation on technologies for
cybersecurity lacks a stable agenda for focusing on these data challenges
(Chen, Chiang and Storey, 2012).

2.1 Theft

With the implementation of the central
database, the financial information stored on the database is at risk of theft
by criminals which is used to disguise the theft of money. However, theft of services
refers to the unauthorised use of the software to commit illegal transactions
in order to damage the database for personal benefit.

2.2 Software Theft

A factor that Charnwood East Midlands
Hotel will have to consider is software theft which is the unauthorised copying
of the information system, thus creating multiple duplicates, allowing the
hotel’s staff to use them at a lower cost. Strict laws apply to such crimes,
which can endanger the performance of the firm in the future.

2.3 Data Theft

With the implementation of the analytics
solution, a threat of data theft may be possible where criminals can be
involved in the theft of sensitive information or make unauthorised changes to
computer records.

3. Legal & Regulatory

To counter the ethical issues and
computer crimes, various legal statutes are in place for the victims. These
laws look to protect the victims who are affected by the illegal use of the
data in the information systems to invade their privacy or sensitive
information in order to benefit from it. Considering the implementation of the
database in the hotel in order to conduct further analysis of their guests’
tastes and preferences, several laws would be applicable since the database requires
the holding of personal details of guests. Following are the laws most
applicable in the company’s situation.

3.1 Data Protection Act 1998

According to UK Legislation, the Data Protection
Act 1998 is “an Act to make new provision for the regulation of the processing
of information relating to individuals, including the obtaining, holding, use
or disclosure of such information’ (, 1998). This
means that the act controls how personal data is utilised by various firms,
organisations or the government. Therefore, it is essential that the hotel’s
database is aligned with the law and to ensure the data held is being used
fairly and for specifically stated purposes.

3.2 Computer
Misuse Act 1990

to UK Legislation, the Computer Misuse Act 1990 is “an Act to make provision for securing computer material
against unauthorised access or modification; and for connected purposes” (,1990).

This law intended to counter unauthorised use of computer systems by
hackers to access and misuse stored information.


these are the ethical, professional and legal issues that need to be considered
during the implementation of the analytics solution at the Charnwood East Midlands


I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out