This essay will discuss some of the Social, Ethical and Legal issues that an IT (Information Technology) Professional will likely face during their career in the Information Technology Sector. Furthermore, I will talk about how these issues affect professionals and how they could approach these challenges to try finding feasible solutions for them.
1.1 Social Issues
When every IT professional starts their journey into the IT Sector, they are bound to come across social issues which will have to be dealt with professionally. One important Issue is being green in Information Technology. The earth’s resources are continuously becoming scarce whilst the demand for them increases sharply. Every IT professional should understand that power consumption does not cover the whole green IT spectrum. Recycling dangerous electronic waste, optimising/virtualising servers to distribute workloads, having a long term green policy, reducing your workplace carbon foot print such as the paperless desk and an efficient data centre-business continuity model; these are a few examples of issues that professional must consider as these issues all occur in the green IT world.
Another issue that an IT professional should take into account is the generations in the workplace. (Klobucher 2011) talks about how Generation 2020 is approaching, how these professionals will be connected, concerned, careful and collaborative. Generation 2020 is the time when there will be five generations in the workplace. The IT professional will face challenges such as communication and collaboration thus he/she should be able take into account these issues, be able to work effectively with the generation and become part of their network.
The IT professional shou...
... middle of paper ...
...ofessional reputation intact. This will create a strong IT world built on fundamental values.
1. Kharpal, A 2013, Cyber-crime is ‘greatest threat’ to companies survival: EY, CNBC, accessed 12 November 2013, http://www.cnbc.com/id/101155856
2. Klobucher, T 2011, Characteristics of Generation 2020: Generations at Work, The Great Workplace Revolution, accessed 11 November 2013, http://www.thegreatworkplacerevolution.com/characteristics-of-generation-2020-generations-at-work/
3. Neal, D 2013, PRISM surveillance turned over Google and Yahoo, The Inquirer, accessed 12 November 2013, http://www.theinquirer.net/inquirer/news/2304070/prism-surveillance-turned-over-google-and-yahoo
4. The Chartered Institute For It Trustee Board Regulations - Schedule 3 Code Of Conduct For BCS Members, BCS, accessed 12 November 2013, http://www.bcs.org/upload/pdf/conduct.pdf
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction The WikiLeaks phenomenon has certainly appeared in the news many times over the last decade for a whole range of different reasons. The site now claims to host more than one million documents and a number of these have had many months of coverage. In this essay I will be taking a look at the effects felt from ethical, legal and social viewpoints. Ethical The WikiLeaks website says that it accepts "classified, censored or otherwise restricted material of political, diplomatic or ethical significance" but does not take "rumour, opinion or other kinds of first hand reporting or material that is already publicly available".... [tags: technology, sensitive information]
1483 words (4.2 pages)
- The problem to be investigated is the connection between ethical foundations and the challenges presented by information technology in today’s high intensity electronic environment. The discussion centers on the topics of societal ethical changes caused by information technology, the ethical usage of information the technology, and the development of a code of ethics surrounding these ethical issues. These topics are reviewed using Brooks (2010, October) article titled, The development of a code of ethics: An outline classroom approach to making connections between ethical foundations and the challenges presented by information technology.... [tags: Information Technology ]
1946 words (5.6 pages)
- Information Technology Staff IT System and Database Administrators have the responsibility to: • Ensure all systems have been certified before placing them into production • This person is responsible for installing and maintaining the operating system and application software on a computer system. Responsibilities include but are not limited to controlling access to the system, maintaining the security of the system, and ensuring that the system is in compliance with all security guidelines established by the company • Certify that systems security requirements are being met.... [tags: Information security, Computer security, Security]
2001 words (5.7 pages)
- Information Management Johannessen and Olsen (2010) noted “with this economic landscape, knowledge itself became a factor of production—specifically, knowledge related to identifying and exploiting new ways to establish temporary competitive advantage” (p. 502). Their observation reflects that under today’s business environment, the ability to optimize information is a significant factor that enables such companies to succeed their businesses. However, the use of information is more important than just limited in business practices, also for everyone living and other professional arenas (Badke, 2009; Turusheva, 2009).... [tags: Technology Information]
1136 words (3.2 pages)
- Ethical and Legal issues in ICT • Introduction The consistent use of information and communication technology (ICT) in modern world enables us for countless opportunities for individuals, institutions, business organisations and scientists, but it also raises difficult ethical and legal problems. In particular, ICT helped to make societies more complex and thus even harder to understand. The use of ICT has led to changes in concepts: ownership, buying and selling, right to possession, theft, justice in the distribution of resources and access rights.... [tags: Information, Communication, Technology]
863 words (2.5 pages)
- Information Technology has the potential to change societal structure and processes similar in scale to that of both the Agricultural Revolution and the Industrial Revolution. On this basis governments should ensure provision of Information Technology to all members of society as a matter of urgency. Discuss. Today, we are experiencing a technological revolution. There is nothing silent or stealthy about it – we are aware of new technology arriving every year. In-your-face advertising and attractive shop displays tempt buyers at every turn, and this year’s new model is next year’s dinosaur.... [tags: IT Technology Society Effect]
1099 words (3.1 pages)
- We think when we log on and off to Facebook and Instagram we think what we delete is forever gone from others and to the word. But little do people know that it is not deleted is it stored in a bank that can be brought back to the light whenever they want too. You would think the things we post a provide because of the privacy settings that they give us when we first set up our different pages. Should social media have the right to own the content we post. I feel that there is nothing we can do about them with holding our personal information because they spy on us all the time no matter how we try and hide from them.... [tags: Facebook, Social media, MySpace, Person]
1029 words (2.9 pages)
- How do you protect your Information Systems (IS) and their information from unauthorized use, access, modifications, disruptions destruction or recording. With an Information Security Policy that is enacted to protect Information Systems and their Information with rules and guidance that limit the type of actions of the unit or organization. There is no cookie cutter Information Security Policy’s for every company. Each Information Security Policy is designed for each company or organization for their which is dependent on the Information Systems, information based on classification, contractual and legal limitations and the risk level that the company management is willing to accept.... [tags: Security, Computer security, Information security]
1818 words (5.2 pages)
- Introduction What do about ninety percent of us have in common. It’s the social networking sites that everyone is a part of these days, whether it’s your twelve year old nephew or your grandmother. Spending hours and hours connecting with your old friends and making new friends over the social networking sites has become a part of everyone’s daily routine. Nonetheless, recently privacy concerns over the social networking sites have taken its peak. Background It all started several decades back, when information technology developments succeeded but had put personal privacy into danger.... [tags: Information Technology Developments, Privacy]
1144 words (3.3 pages)
- Technology is everywhere. It is in community phones, computers, and radios. No matter where you go or who you meet, technology will be there. America has become dependant on technology, so much that it has become useful for giving punishments to children. (By taking their phone, music device, or computer away.) Many have grown accustomed, to having internet when and where they want it. However, it wasn’t always like this, not even a decade ago phones were still being created, more developed, and improved.... [tags: Technology Essays]
2013 words (5.8 pages)