Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
advantages of technology
advantages and disadvantages of technology abstract
advantages of technology
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: advantages of technology
Ethics in Information Technology
Technology Department
Technology is in many ways very beneficial to our society, but in what ways can and/or will this fast growing business be unethical. This article explains the power and information that an IT personnel has in the business world. Most people think of the IT person as someone who comes to fix their computer when they can't figure out their e-mail. But what does an IT person have access to. Every business is different and has different responsibilities required for the IT personnel. This article explains how most companies use the IT department for monitoring their employees on the computer. The article raises many questions on the ethical behaviors of IT personnel, but it doesn't give many answers. That's because the question of "Is it ethical?" must be answered by each individual IT professional. In other professional careers such as Medicine or Law that have been around for a long time have a set of laws or code of ethics that goes along with the job. This field has yet to establish such rules. The article states that most ethical issues such as: reading the employee e-mails and changing words, using key loggers to obtain everything a specific person has typed, or screen capture programs to monitor everything they have looked at, have not even been confronted by law, nor is there a standard that any IT professional has to follow.
It's scary to think how much power and information that an IT professional have access to, and the fact that there are no laws that prohibit some of the procedures they is also a frightening thought. Even at Southwestern Assemblies of God University the IT people have access to our social security number, web pages we visit, and even our internet passwords like e-mail or student login. If the IT professional are hired and have no prior discretion of ethical issues how can we trust what they will do with the information they have about us. I trust that the employers at Southwestern have chosen the right people for the job, but what the everyday office of America. The article states that some of the IT professionals even help employees to get others fired. An example of this would be: At this particular business the IT department receives all the e-mails to be screened before they leave to the recipient.
TechFite, known for its production of high-tech goods in Britain, began production in its first overseas factory in Dellberg USA. As TechFite begins its globalization of international economic integration, it soon realizes there are financial and social responsibilities that needed to be addressed in Dellberg.
In this case, a large health services organization (HSO) in Florida, that has a world-renowned AIDS treatment center had information breach of 4,000 HIV+ patient records, and the list was sent to newspapers, magazines, and the internet. Consequently, this issue was featured in every media vehicle in the world and as CEO, you are requested by the board of trustees to come up a better management information system (MIS) to resolve all information security issues or you will face termination. After hiring an undercover computer security consultant to help determine where the security leak came from, she quickly identifies numerous breaches in computer security and provides a report with the issues identified. The report furnished by the consultant revealed that facility had major problems with the MIS and the staff. In order to determine how to address the issues, the CEO must first answer the following questions: what law is being violated by the employees, why was this law enacted, what are the penalties for such violations, what are the penalties for sharing celebrity information, and should he be updating his resume and looking for another job (Buchbinder, 378).
The main points that are stated in "Employees & Ethics With Computers" by Debra Kraft are personal internet usage, email, harassment, privacy, policies, and training. Kraft's computer ethics relate to the Ten Commandments of Ethical Computing by Computer Ethics Institute. The first computer ethic personal internet usage would fall under multiple commandments such as number two, seven, and ten. If employees are using the internet access for personal internet usage it can slow down and hinder the company connectivity for the entire organization. Email is also a computer ethic that falls under a few the commandments such as one, two, seven, and nine. Improper usage of email service can cost the company in data or business losses.
Since the end of World War 2, the technology one sees around them and uses everyday has grown exponentially. In the field of counseling, phones, fax machines, copiers, and computers are all used to run everyday operations and transfer information. Despite how great technology can be, ethical issues can arise because of it. For example, talking on the phone with a client in a crisis situation can create a condition in which confidentiality can be breeched. (McMinn, 1999).
“The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations” (Fingerman, 2004).
Use of computers poses a new challenge for privacy. Privacy is a state of mind, specific place freedom from intrusion or control over the exposure of self of personal information (Czar, 2013). In this day and age, many new rules come into play on how to protect the privacy of the patient. The purpose of this paper is to discuss the importance of ethical use and the unethical issues faced with the use of technology, as well as the impact of specific and a broad range legislation on information technology.
Townsend, A. M. & Bennett, J. T. (2003). Privacy, technology, and conflict: emerging issues and action in workplace privacy. Journal of Labor Research, 24(2), p. 195. Retrieved October 19, 2004, from EBSCOhost Database.
Ethics is part of philosophy that deals with how human actions is considered to be wrong or right and technology makes it possible for individuals and institutions to behave in ways they couldn't possible do without technology. Computer ethics brings these unexplored areas of ethics into focus.
Previously it took a lot of equipment to monitor a person's actions, but now with technology's development and advancement all it requires is a computer. And there are many mediums which can be monitored such as telephones, email, voice mail, and computers.4 People's rights are protected by many laws, but in private businesses there are few laws protecting an individual's rights. 5 As an employee of a company there is an understanding of the amount of monitoring the employer does. The employer has to decide how much monitoring is necessary to satisfy the company needs without damaging the company's employee morale.6 With all the monitoring done by private businesses they are free to violate employee privacy since the Constitution and the Bill of Rights a...
The issue of privacy is a big concern in the workplace. With the expanding of new technology, many employees are concern about his or, her privacy in the workplace. Employees have the right to go to work knowing that his or, her employer will not invade their privacy. The rights to privacy in the workplace only provide limited protection for workers against monitoring and breach of confidentiality. The National Work Rights Institute states, under the federal law, "the limited protection the Electronic Communication Privacy Act of 1986 provides to employees' has been reduced because the statue has been outdated."
Kharpal, A 2013, Cyber-crime is ‘greatest threat’ to companies survival: EY, CNBC, accessed 12 November 2013, http://www.cnbc.com/id/101155856
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
The Internet has received a great deal of attention in the media lately due to its tremendous