Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Key ethical theories
Rules for cyber ethics
Ethical theories introduction to ethics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Contents
Executive summary 2
Introduction 4
Ethical Analysis 5
Consequence based theory 5
Duty based theory 6
Contract based theory 7
Character based theory 8
ACS Code of ethics 9
Recommendations 10
Conclusion 11
References 12
Executive summary
This article mainly focuses on the ethics and its importance in the daily life and the need of the ethics to the individual and to the society. It mainly focuses on the ethical theories; consequence based theory, duty based theory, contract based theory and character based theory and how these theories are implemented for the copyright infringement i.e. the free access of the copyright material. It explains all the four types of theories in detail with examples and how these are implemented for the given topic. The modern ethical approach has been given based on the four ethical theories and the recommendations based on the outcome of the four theories. It is followed by the conclusion and the references.
INTRODUCTION
Free and easy access is a means of distributing intellectual study that breaks from the traditional subscription model of academic publishing. It has the potential to greatly quicken the pace of scientific discovery, encourage innovation and develop education by reducing barrier to access. Open access moves the costs of publishing so that readers, practitioners and researchers obtain the content at minimum or free of cost. Open access incorporates a range of components such as readership, reuse, copyright, posting and machine readability. Open access benefits users, research institutions and society as a whole by providing accessibility through which everyone can read and use the free publications online, full re-use rights where Intellectual wo...
... middle of paper ...
...thics. Retrieved July 5, 2013, from http://www.acs.org.au/__data/assets/pdf_file/0005/7835/Code-of-Ethics.pdf
3. Australian Computer Society. (2012c). Code of professional conduct and practice. Retrieved July 5, 2013, from http://www.acs.org.au/__data/assets/pdf_file/0014/4901/Code-of-Professional-Conduct.pdf
4. Brinkman, B. & Sanders, A. (2013). Ethics in a computing culture. Boston, MA: Course Technology, Cengage.
5. Reynolds, G. (2012). Ethics in information technology ( 4th ed.). Boston, MA: Course Technology, Cengage.
6. Shaw, W. & Barry, V. (2010). Moral issues in business (11th ed.). Belmont, CA: Wadsworth, Cengage
7. Swan, A. (2010). The Open Access citation advantage: Studies and results to date: University of Southampton
8. Tavani, H. T. (2007). Ethics and technology. Hoboken, NJ, USA: John Wiley & Sons Inc. (Ethical theories in the introduction)
Margaret R.,DeCosse, David, Andre, Claire, & Hanson Markkula, Kirk O. (1988). Center for Applied Ethics at Santa Clara University. Issues in Ethics, V. 1, N. 2. Sobel, Russell S. &
ACM Council. (1992, 10 16). ACM Code of Ethics and Professional Conduct. Retrieved from Association of Computing Machinery: http://www.acm.org/about/code-of-ethics
Thiroux, Jacques P., and Keith W. Krasemann. Ethics: Theory and Practice. Upper Saddle River, NJ: Prentice Hall, 2009. Print.
Spinello, Richard. Cyber Ethics: Morality and Law in Cyberspace. Jones and Bartlett Publishers, Inc. Sudbury, MA
Ferrell, O. C., Fraedrich, J., & Ferrell, L. (2013). Business ethics: Ethical decision making and cases: 2011 custom edition (9th ed.). Mason, OH: South-Western Cengage Learning.
Underwood, A. (2000, January). Professional Ethics in a Security and Privacy Context–the Perspective of a National Computing Society. In Information Security and Privacy (pp. 477-486). Springer Berlin Heidelberg.
Fieser, J. & Moseley, A. (2014). Introduction to Business Ethics. San Diego, CA Bridgepoint Education, Inc.
Copyright, piracy, intellectual property and professional codes of ethics are critical subjects for computer and business professionals. This paper will first explain copyright laws and intellectual property. Second, an explanation concerning piracy will be submitted. Finally, a description of my own professional code of ethics will be presented.
Computing professionals are called to act in strict accordance with high ethical standards. Three predominant sources of ethical standards exist for computing professionals. The IEEE, ACM, and Software Engineering Code of Ethics each provide standards for ethical behavior to guide computing professionals both inside and outside of the workplace. These collections of moral imperatives will be used to ethically assess the following scenario.
Betts, Mitch. (1993, June). What about ethics? Computerworld, 27(23), 84. Retrieved February 28, 2011, from ProQuest Computing. (Document ID: 305546).
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
Barbour, Ian Ethics in An Age Of Technology. Harper Collins Publishers Inc: New York, 1993
Mike Freeman, (2002) "Ethical Issues of Information Technology", New Library World, Vol. 103 Iss: 1/2, pp.72 – 75
1 Bowyer, Kevin W. "Ethics and Computing: Living Responsibly in a Computerized World." Second Edition. IEEE Press: New York, 2001; pages