Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
key ethical theories
rules for cyber ethics
ethical theories introduction to ethics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: key ethical theories
Contents
Executive summary 2
Introduction 4
Ethical Analysis 5
Consequence based theory 5
Duty based theory 6
Contract based theory 7
Character based theory 8
ACS Code of ethics 9
Recommendations 10
Conclusion 11
References 12
Executive summary
This article mainly focuses on the ethics and its importance in the daily life and the need of the ethics to the individual and to the society. It mainly focuses on the ethical theories; consequence based theory, duty based theory, contract based theory and character based theory and how these theories are implemented for the copyright infringement i.e. the free access of the copyright material. It explains all the four types of theories in detail with examples and how these are implemented for the given topic. The modern ethical approach has been given based on the four ethical theories and the recommendations based on the outcome of the four theories. It is followed by the conclusion and the references.
INTRODUCTION
Free and easy access is a means of distributing intellectual study that breaks from the traditional subscription model of academic publishing. It has the potential to greatly quicken the pace of scientific discovery, encourage innovation and develop education by reducing barrier to access. Open access moves the costs of publishing so that readers, practitioners and researchers obtain the content at minimum or free of cost. Open access incorporates a range of components such as readership, reuse, copyright, posting and machine readability. Open access benefits users, research institutions and society as a whole by providing accessibility through which everyone can read and use the free publications online, full re-use rights where Intellectual wo...
... middle of paper ...
...thics. Retrieved July 5, 2013, from http://www.acs.org.au/__data/assets/pdf_file/0005/7835/Code-of-Ethics.pdf
3. Australian Computer Society. (2012c). Code of professional conduct and practice. Retrieved July 5, 2013, from http://www.acs.org.au/__data/assets/pdf_file/0014/4901/Code-of-Professional-Conduct.pdf
4. Brinkman, B. & Sanders, A. (2013). Ethics in a computing culture. Boston, MA: Course Technology, Cengage.
5. Reynolds, G. (2012). Ethics in information technology ( 4th ed.). Boston, MA: Course Technology, Cengage.
6. Shaw, W. & Barry, V. (2010). Moral issues in business (11th ed.). Belmont, CA: Wadsworth, Cengage
7. Swan, A. (2010). The Open Access citation advantage: Studies and results to date: University of Southampton
8. Tavani, H. T. (2007). Ethics and technology. Hoboken, NJ, USA: John Wiley & Sons Inc. (Ethical theories in the introduction)
Margaret R.,DeCosse, David, Andre, Claire, & Hanson Markkula, Kirk O. (1988). Center for Applied Ethics at Santa Clara University. Issues in Ethics, V. 1, N. 2. Sobel, Russell S. &
Martin, M.W. and Schinzinger, R. (2005) Ethics in Engineering. 4th ed. New York: McGraw Hill.
7.A Gift of Fire, A: Social, Legal, and Ethical Issues in Computing, by Sara Baase
Thiroux, Jacques P., and Keith W. Krasemann. Ethics: Theory and Practice. Upper Saddle River, NJ: Prentice Hall, 2009. Print.
Sandler, Ronald L. Ethics and Emerging Technologies. New York, NY: St. Martin's Press, 2013. Print.
Von der Embse, Thomas J., and Mayur S. Desai. 2004. Organizational culture, Ethics and Business ethics. Information Management & Computer Security 12 (2-3): 146.
Copyright, piracy, intellectual property and professional codes of ethics are critical subjects for computer and business professionals. This paper will first explain copyright laws and intellectual property. Second, an explanation concerning piracy will be submitted. Finally, a description of my own professional code of ethics will be presented.
Computing professionals are called to act in strict accordance with high ethical standards. Three predominant sources of ethical standards exist for computing professionals. The IEEE, ACM, and Software Engineering Code of Ethics each provide standards for ethical behavior to guide computing professionals both inside and outside of the workplace. These collections of moral imperatives will be used to ethically assess the following scenario.
Quinn, M. J. 2013. Ethics for the information age 5th edn., Pearson Education/Addison-Wesley, Upper Saddle River, N. J. .
Mike Freeman, (2002) "Ethical Issues of Information Technology", New Library World, Vol. 103 Iss: 1/2, pp.72 – 75
4. Unknown. Ethics. Santa Clara University Markkula Center for Applied Ethics. 29th March 2004. http://cseserv.engr.scu.edu/NQuinn/COEN288/EngrHandbook_Ethics.pdf
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
Barbour, Ian Ethics in An Age Of Technology. Harper Collins Publishers Inc: New York, 1993
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
In the twenty first century, ‘Professionalism and Ethics’ has raised the standards of Information Technology and Engineering. William Wisely states that, “The engineer shall apply his specialized knowledge and skill at all times in the public interest, with honesty, integrity and honor.” While emphasizing the importance of ethics in the field of Information Technology and Engineering, Deborah G. Johnson affirms as follows: