The problem to be investigated is the connection between ethical foundations and the challenges presented by information technology in today’s high intensity electronic environment. The discussion centers on the topics of societal ethical changes caused by information technology, the ethical usage of information the technology, and the development of a code of ethics surrounding these ethical issues. These topics are reviewed using Brooks (2010, October) article titled, The development of a code of ethics: An outline classroom approach to making connections between ethical foundations and the challenges presented by information technology.
Societal Ethical Changes Caused by Information Technology
Information technology has greatly increased the ease of access to information to most of society on a largely unmonitored basis resulting in the need for heightened awareness of security, privacy, and the protection of intellectual property. (Brooks, p. 2) Though it may seem that this topic has gained greater attention in the past few years, the Computer Professionals for Social Responsibility was founded in 1983 to deal with just these issues. (Brooks, p. 2) Crimes of moral character including stealing, lying, and cheating are as prevalent in today’s world of information technology as they are in real terms. (Brooks, p. 4)
A 2008 on-line survey conducted by the Josephson Institute found that one-third of boys and one-fourth of girls surveyed admitted to stealing in the past year. (Brooks, p. 4) This translates all too well to rampant downloading of proprietary or copy written material from web sites. The illegal uploading and downloading of music became so prevalent that there was almost a feeling that if you did no...
... middle of paper ...
...g electronic information: An ethics perspective.
Information Management & Computer Security, 16(1), 20. Retrieved from
http:search.proquest.com.proxy1.ncu.edu/docview/212329448?accountid=28180
BPI. (2011) Commercial music piracy
Retrieved from http://www.bpi.co.uk/our-work/protecting-uk-music/article/commercial-music-piracy.aspx.
Brooks, R. (2010). The development of a code of Ethics: An online classroom approach to
making connections between ethical foundations and the challenges presented by
information technology. American Journal of Business Education, 3(10), 1.
Payne, D., & Landry, B. (2005). Similarities in business and IT professional ethics: The need for
and development of a comprehensive code of ethics. Journal of Business Ethics, 62(10),
73. Retrieved from
http:search.proquest.com.proxy1.ncu.edu/docview/198033129?accountid=28180
Throughout the course of day-to-day business life, the business professionals come in contact with quite a sum of ethical dilemmas. There are various ways to handle these ethical dilemmas, but failure to follow the appropriate manner could result in an unethical outcome. The ethical guides related to the book definitely help students develop an ethical character that is sure to stand out for highly ethical companies. In addition, there are companies that test how ethical applicants are before hiring them, this in turn makes getting the job more difficult and costly. However, despite the high cost and difficulty said companies stay firm to ethics, guaranteeing they get top-of-the-line employees who will act in an ethical manner. Ethics is defined
Fieser, J. & Moseley, A. (2014). Introduction to Business Ethics. San Diego, CA Bridgepoint Education, Inc.
In today’s global society, a Code of Ethics policy is used to label established, acceptable behaviors among that industry’s business associates, potential investors, and the corporation’s executive officers and employees, and most important, the consumer (Ethics Resource Center, 2003). In an attempt to promote an increased efficiency and productivity potential level, among employees and prospective clients, a corporation’s standard Code of Ethics should guide its members toward a more in-depth examination of their personal moral activity, and how these actions affect the people or acquaintances they encounter. A company should utilize this strategy as a model for the professional behaviors and responsibilities of its constituents, and proves the occupational advancement of that business. Ethics are important in every level of a corporation, but specifically in the day-to-day actions of its members, and the image the company broadcasts to its associates is fundamental in building a stable business foundation. These pledges are a vital communication tool used to covey the firm’s standards for business operations, and predominantly, its relationships with the surrounding communities (Ethics Resource Center, 2003).
Barry, Vincent, Olen, Jeffrey, & Van Camp, Julie C. Applying Ethics: A Text with Readings, Tenth Edition. Boston: Wadsworth Cengage Learning, 2011.
Use of computers poses a new challenge for privacy. Privacy is a state of mind, specific place freedom from intrusion or control over the exposure of self of personal information (Czar, 2013). In this day and age, many new rules come into play on how to protect the privacy of the patient. The purpose of this paper is to discuss the importance of ethical use and the unethical issues faced with the use of technology, as well as the impact of specific and a broad range legislation on information technology.
Boylan, M. (2009). Basic ethics: Basic ethics in action (2nd ed.). Upper Saddle River, NJ:
Throughout time, people have resorted to stealing in order to obtain items instead of buying them. It became a problem so consequences were made. Even dating back to the Ten Commandments there were laws against stealing. Recently, theft has become a problem over the internet. Musicians and music companies have lost millions in revenue. Websites such as Napster, The Pirate Bay, and Pandora have made it extremely easy for people, specifically teens, to illegally download and or listen to music for free. Pirating music has become a problem especially because “91 percent of all new music was downloaded illegally over the Internet instead of purchased,” says Logan Lynn from Huffington Post (Lynn). Many, such as the RIAA claim that music piracy is “an ongoing and evolving challenge,” (Who) while others suggest that it is “keeping the music industry alive,” (Issacson).
McArdle argues that although music file-sharing is easily assessable and available in the millennium generation, free music file-sharing is causing damage to individuals involved in the music industry and in the entertainment industry. McArdle starts off the article by mentioning that record labels suffer the most financially in the year 2009. She also mentions that for the last decade, record labels business are experiencing decreases in revenues. McArdle criticizes the millennium generation for violating property rights of recording labels and the music industry. Moreover, McArdle points out that many young people in this millennium generation are the ones who are downloading music for free. She discusses how hard it was for people to look for music and to copy music in the past history compared to the present. She also points out that young people in the millennium generation do not see downloading music for free as a huge problem. She concludes her article by stating that perhaps music piracy is not such a negative trend. Although it affects individua...
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
This essay will discuss some of the Social, Ethical and Legal issues that an IT (Information Technology) Professional will likely face during their career in the Information Technology Sector. Furthermore, I will talk about how these issues affect professionals and how they could approach these challenges to try finding feasible solutions for them.
Reynolds, G. (2012). Ethics in information technology ( 4th ed.). Boston, MA: Course Technology, Cengage.
Mike Freeman, (2002) "Ethical Issues of Information Technology", New Library World, Vol. 103 Iss: 1/2, pp.72 – 75
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
These types of crimes have become a matter of importance for the consumers as well the business firms because it involves large eviction of the amount in terms of money. In these types of crimes, computer and Internet are the primary factor (Spinello, 2000). A high percentage of population is using computers in the Australia, United States as well as other developed nations. These people are much more connected with the world by the use of internet. They are using the computer for fun, business, e-commerce, e-marketing, etc.; thus, it has become an essential part of life and daily routine (Wall, 2008).
The consistent use of information and communication technology (ICT) in modern world enables us for countless opportunities for individuals, institutions, business organisations and scientists, but it also raises difficult ethical and legal problems. In particular, ICT helped to make societies more complex and thus even harder to understand. The use of ICT has led to changes in concepts: ownership, buying and selling, right to possession, theft, justice in the distribution of resources and access rights. During the nineties, the internet has grown into all business segments resulting in a large number of questions running. It has been noted that during those time period there has been merging of computers, telecommunications, and media which is further emphasized by the emergence of new issues and strengthening old ones.