Tuesday, January 8, 2019
Development of a Code of Ethics: IT Challenges Essay
Societal changes caused by cultivation applied science and the resulting good function The randomness technology advancements continue to collision the workplace, societies and cultures. In todays world, information technology is almost start of every(prenominal) avocation, educational institute, and raze personal exercise (Brooks, 2010). data processor and meshing access get to found their way to households, schools, libraries, peoples cell ph 1s, banks, hospitals, governments, c souree shops, and other open places. As the industry evolves, so do the needfully and special niches of society from processor systems, to micro systems, to PC-based LAN and WAN systems, to pr defendical(prenominal) systems and the internet.Advanced technology closes absolute prospects for the society. In the same token, new technologies mean increased exposure to engage in un estimable behaviors. The growing concerns train granted rise to efforts in developing tag of goods to p revent violations and cover up estimable dilemmas. When policies be ambiguous, ethical decisions drive out quit depending to the personal judgment or exposition of the manager.There be instances where the lines are clouded that it becomes difficult to draw the line amid ethical and unethical behavior (Brooks, 2010). This is the lawsuit why it is beta for education systems and businesses to get across the ethical concerns of information technology purpose and to develop a edict of moral philosophy to prevent ethical dilemmas and violations.New capabilities of computers keep rise to new choices for action. This results in situations where each there is no conduct for pleader or there is inadequate form _or_ system of government to address the situation. James H. Moor, a prof of Intellectual and Moral Philosophy at Dartmouth College published an hold What is computing machine morality? where he identified this situation as policy vacuum (Moor, 1985).History of the culture of formula of morals in reckonIn the 1950 era, a new technology in the form of TAB machines was introduced by accountants. Very few understood the capabilities of these machines and even fewer had the skills to operate them. The machine accountants were set about with ch all toldenges in the physical exercise of the TAB machines and did non have any guidance to follow. The matter Machine Accountants connection (NMAA) was founded in 1960 to address the growing outs of this new technology. The ever-changing constitution of processing information brought about by the introduction of computers in the early 1960s gave rise to some other challenge.The industry was changing and the widespread interest on computers essential a change in the deputation and goals of NMAA. The connectives name was changed to entropy Processing Management Association (DPMA) to be more reflective of the new objectives that promoted chronic education and professional certification of its members.As the computing industry evolved, business leaders, accountants, and educators acknowledge the need to advance tuition engine room (IT) professional development, support IT education, and formulate IT policies that allow for guide the usage of IT in some facets of society. The necktie adopted yet another name in 1996 which is now the Association of Information technology Professionals (AITP). phylogenesis of Code of moral philosophyThere are at least two basic factors that diverge the development of Code of ethics for IT. genius is from sources outside of the corporate structure, and the other is from the hatfuls governance.AITP as an outside source. The chronicle environment open the Public ships company Accounting Over potbelly Board to oversee, regulate, and check up on accounting firms that do not correct to accountability and transparency standards. In the information technology world, similar professional agencies were organise to erect guidi ng principles in the usage of information technology to ward off undesirable and unethical behavior. A striking professional association that lends oversight to the guiding principles of information technology is the AITP.AITP is an association fetch up of a premier communicate of IT business professionals focused on providing a familiarity of knowledge, education and resources to its members bound by the associations guiding principles on manoeuver Principles reflect AITPs beliefs about your portion as a member and the relate we want AITP to have in the IT profession. The association extends opportunities to its member to become better leaders that excel through honesty demanding ethical behavior and fiscal responsibility.The associations webpage shares news, IT developments and events with chapter members, IT professionals, faculty advisors, student members, and various fraternity groups. Today, there are over 1,000 U.S. regional chapters with members that are linked in who make continuous network connections around the sphere and across the globe.Corporate governance as an inside source. Prudent governance of an plaques IT functions is vox populied as an integral part of corporate strategy in facilitating information-based private-enterprise(a) advantage in promoting organizational offshoot and progress. Enterprise leaders like the wit members, executive management and chief information officers are entrusted with the responsibility of raising consciousness and understanding to ensure IT meets and exceeds expectations, its risks mitigated, and standards followed (IT Governance Institute, 2003).These officers are uniquely positioned to fulfill their role in prostituteonizing the organizational strategy with the accounting, auditing, operational and IT controls that is rudimentary in adhering to corporate ethical behavior. It is important for top management to lead in promoting awareness of ethical compliance inwardly their organization as it sends messages to takeees that inevitably watch the culture of their organizations. Enforcement issues related to a codification of ethics for information technologyThe expansion of Internet brings together antithetical cultures and societies where norms of ethical and acceptable behavior, and the role of computing and chat networks at bottom the society vary a lot. In protecting globally distri excepted systems that employ open public networks, there is a great demand to specify what individuals rights and responsibilities are in regard to these networks. The distributed global disposition of networks makes this a importantly difficult task.The need of centralized authority and differences in moral codes between different groups, such as original developers of networks, business users, private users and political organizations lead to signifi female genitaliat consistencies. These situations discharge comfortably trigger enforcement issues that can result in e thical dilemmas.Differences of organizational culture can also become problematic when relations with how operational policies and methods are enforced. Various groups within the company may have significantly different objectives and requirements for the use of networks, and balancing different needs and wishes may be a difficult task. The task of adopting or intent a parking lot communication network to adapt to the various departmental needs becomes complex.The issue becomes even more manifold when considering the non-technical issues. For instance, it becomes difficult to establish a common ethics guideline that can set aside comprehensive protection and security for all aspects of the organizational structure.There is also an enforcement issue on banning people from downloading data like medication off the internet. This is a clear violation of the Copyright laws but protecting the authors is difficult to enforce considering that the internet is open to anyone who has acc ess to a computer. The downloading of music does not cause actual harm to anyone, but it is unethical. A hacker can argue that a detestation is not committed since there is no theft, malicious mischief or breach of confidentiality.In an examiner article published by Scot Trodik on honest Issues on Hacking (Trodik, 2011), the Hacker manifesto states that the only crime committed is the crime of curiosity and since the information is free, hacking is therefore justified. Conversely, the Computer Fraud and Abuse act of 1986 deep expanded in March 2013 do it illegal to tap into a computer without authorization and access private government, pecuniary or credit card information.However, this act was flawed because of its broad scope and unclear wordings that would criminalize many everyday activities allowing outlandishly severe penalties. Establishing a code of ethics in an online educational environment engineering science has enormously changed the teaching world from the trad itional classroom to online training. Distance learning allows a student to choose courses to enroll in and enables a student to develop a personalized schedule. Higher education institutions that widen online learning should not lose sight in stressing the importance of ethical fictitious character development of both the faculty and the apprentice in the pursuit of a personal, faculty member and professional excellence.This educational revolution can pose an ethical challenge because the fundamental interaction between the faculty and the learner becomes less(prenominal) personal in comparison to a face-to-face classroom instruction.It is for this reason that it is important to establish and adopt a code of conduct that gives guidance to the maintenance of impressive and responsible distance learning programs. Institutions should provide policy guidelines for faculty and learners to follow and integrate technology ethics in the curriculum. An pedantician Conduct Comm ittee should be established to enforce academic rules and promote an halo of learning. Penalties for violators of the code should be weighed with fairness memory in mind the intent to withhold the integrity of distance learning educational process.A student handbook on the rules of academic integrity should be a required reading material so that students know what the instances that violate academic integrity. Extype Ales of these violations imply plagiarism, fabricating citation, use of unauthorized assistance, and falsifying or altering results of research work.Among these violations, Plagiarism is one of the most common academic bungle in a distance learning setting. Many factors lead students to commit plagiarism. whatever of these reasons may be because of new rules to learn, academic pressures, poor time management or poor research skills. Notwithstanding these, students should have the responsibility to educate themselves honestly.ReferencesAl-Rjoub, H., Zabian, A. & Qawasmeh, S. (2008). electronic Monitoring The Employees Pointof View. daybook of kindly Sciences , 4(3), 189-195.Brooks, R. (2010). The Development of a Code of moral philosophy An Online classroom Approach to Making Connections between honest Foundations and the Challenges Presented by Information Technology. American Journal of Business Education. October 2010. 3(10), 1-13.Collack. V. (2007). What is computer ethics? oblige analysis. Retrieved August 21, 2013 from http//www.collak.net/index.php?option=com_content&view=article&idCone, E. (2008, September 10). Social Responsibility Doing the Right Thing. CIOInsightRetrieved from http//www.cioinsight.com/c/a/Research/Doing-the-Right-ThingHarbert, T. (2007, October 29). Ethics in IT lamentable Secrets, Ugly Truths. And Little Guidance.Computerworld , 41(44), 34-36.Jennings, M. (2009). Business Ethics Case Studies and Selected Readings(6th Ed.).Mason, OHSouth-Western Cengage Learning.Kuzu, A. (2009). Problems Related to Computer Ethics Origins of the Problems and Suggested Solutions. Turkish Online Journal of Educational Technology,8(2), 91-110.Mingers, J. & Walsham, G. (2010). Toward ethical information systems The contribution of hash out ethics. MIS Quarterly. Vol. 34 No. 4. December 2010. 833-854.Moor, J. H. (1985). What is Computer Ethics? Darmouth College.Moor, J. H. (2001). The Future of Computer Ethics You Aint Seen Nothin Yet Ethics and Information Technology,3, 38-91.Moor, J. H. (2005). Why We Need get around Ethics for Emerging Technologies. Ethics and Information Technology, 7, 111-119. doi10.1007/s10676-006-0008-0Association of Information Technology Professionals. http//www.aitp.org/?page=Ethics. Accessed August 20, 2013.Board apprize on IT governance. IT Governance Institute. http//www.itgi.org/Template_ITGIc9a4.html?Section. Accessed August 22, 2013.Trodik, S. (2011). Ethical issues on hacking. The Hackers Manifesto. http//www.examiner.com/article/ethical-issues-hacking. Ac cessed August 23, 2013.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment