The Development of a Code of Ethics

The Development of a Code of Ethics

Table of Contents

Introduction

The problem to be investigated is how ethical use of information technology applies in the modern society. Evidence shows that information technology in the history of society lacks its applications and creates different impacts. Unlike the past, information technology has changed its direction simply because in every business, technology applies in operations. Almost every business uses information technology because it helps ease the work load and make activities move faster. With that large application of information technology, individuals may engage in unethical activities that relate to information technology, (Quinn, 2006).


Evidence suggests that businesses as well as education systems should develop strategies to address information technology ethical concerns that affect society. It is vital to develop code ethics that govern the use of information technology in order to prevent misuse of IT in organization and in the society at general.


Discussion

Ethical Changes Society

Evidence shows that information technology has an impact on ethical changes in society. Society ethical changes that have been developed in the recent years were not in place some years back. Initially, there was a segregation of how to use information technology. With specific areas using IT, ethical changes that were created did not develop an impact to the society.  This has changed simply because in recent years, globalization and technology development have integrated use of information technology nearly in all business operations.


The current world has digitalized its operations where manual operations are coming to an end. Today, like everyone, must engage in some form of technology in daily activities. In developed countries, the use of information technology starts when an individual wakes up until the time of bed rest. Evidence suggests that, with the high use of information technology is the day to day operations, individuals may engage in unethical activities, (Brooks, 2010).


The use of information technology has allowed individuals have access to non-sensitive and sensitive information. Such information that motivates has developed society ethical changes that affect the world of information technology in society. Changes that have occurred in the recent time include use of information technology to reverse business programs hence achieve trade secrets, harass individuals with the use of information technology, and privately access critical business information in a personal perspective.


The above ethical concerns in the world of information technology have made law enforcement environment develop measures that ensures order works appropriately in those who use IT. Although different security measures have been put in place, it is clear that the issue of unethical concerns in the world of IT have not been fully solved. As information technology develops, unethical concerns also develop at the same pace. Individuals have made different unethical developments where they use information technology to steal from their companies, use other people’s identities to commit criminal activities, and harass people through social networks, (Quinn, 2006).


How information technology has ethically applied in society

In this case, we shall evaluate the ethical usage of IT in two areas. First, we shall evaluate the use of IT at personal or private level. Individuals ethically use information technology in different ways. At this level, individuals utilize IT for personal benefit that does not affect the society in any way. Some of the common personal, ethical usage of information technology include communication, use of personal automated services (baking), interact with friends. Individuals may also use information technology to get business ideas from friends and different areas of business that shares business knowledge. IT has made individuals connect with different sources of vital information that is to run the organization. Individuals have used information technology for legitimate reasons, (King, 2010).


Apart from ethical usage of information technology, there are ways that individuals have engaged in unethical behaviors. Individuals use IT in malicious or fraudulent way. Evidence shows that individuals have developed ways of hacking personal information by accessing their computers. Information technology also helps hackers enter into company’s network and corrupt their system. This trend has developed a serious concern in development of business activities.


Another unethical behavior has been where hackers develop personal identities and use them in stealing personal information from the companies, (Brooks, 2010). They use electronic methods to get customer information, which they use to steal and change their data meant for personal activities. In different malicious, ways individuals have at a point entered into the world of IT and changed different things.


Spread of malware, cyber bullying, cyber crimes, victimization of individuals, and spread of viruses online are some of malicious activities that take place online. Apart from the above issues counting to unethical situations, getting solutions to them have developed ethical dilemmas. In order to establish strategies on how to handle ethical dilemmas in IT environment, individuals should first become responsible on the type and use of information technology where applicable, (King, 2010).


Commercial usage of IT is another level of ethical concern that we shall consider. In commercial usage, the challenge is how different organizations develop strategies to utilize IT in their operations. Apart it emphasizes on ways, IT helps the organization serve customers at any given direction. Currently, there was unethical commercial usage of information technology. A controversy developed when mining of customers behaviors on online sites were used by some companies. Different companies monitored how clients behave when online and ways they use when making their transactions.


When the mining was complete, the information was sold to companies that deal with marketing. Such behaviors are among unethical situations that affect commercial usage of IT. Collections and use of customer’s personal information without their knowledge is another unethical behavior that has affected commercial environment. Unlike personal ethical dilemmas, dealing with commercial dilemmas requires development of legislation rules that organizations should follow during their operations, (Quinn, 2006).


Development Ethics

A number of controversies have affected the development of codes of ethics in usage of IT. One of the main controversies affecting development of codes of ethics is on the negative impacts that corporate organizations may create in IT change through engender society change. The main agenda is that organizations find themselves in socialistic traps and may prevent the aspect of organization sustainability in the society environment.


Bearing in mind that information technology is a distinct business industry, this has become another problem that affects development of IT code of ethics. In simple terms, those ethics that may apply in normal business operations may not apply in information technology industry. Due to its unique characteristics, constitutional rights may in some situation fail to protect IT ethics. The unethical and illegal limitations developed by such rights may not effectively apply in information technology industry, (Brooks, 2010).


In solving the above situation, different approaches may be applied. First, it is vital to determine whether there exist laws or what laws may be required in handling the above situation. The next step should be to develop code of ethics that apply on how information technology should be used by employees as well as customers. In line with this step, an organization ensures that all restrictions developed adheres constitutional and legal rights. They should at all times protect assets and interests of the business. When applied and monitored appropriately, the above steps may help leaders develop effective systems that safeguards organization date and information technology, (King, 2010).


Explanation

The aim of developing code of ethics in the usage of IT in organizations should ensure that opportunities to unethical behaviors have reduced. Currently, individuals have access to information technology something that has contributed to increase in unethical activities. To prevent and reduce the high level of unethical activities in an organization, leaders must develop security measures that govern their employees on how to effectively use IT. Code of ethics that controls employee’s behavior should apply. Such systems will help employees act ethically when using organization IT.  Since such steps only help solve the problem halfway, disciplinary actions and laws should be used in relation to unauthorized use of company information technology, (Quinn, 2006).


In conclusion, the uniqueness of IT industry is one that makes it difficult to develop and implement standards of ethical behaviors of employees. Therefore, the right approach is to develop legal codes and ethical codes that effectively help control the world of IT in the current business development.


Reference:

Brooks, R. (2010) the development of a code of ethics: An online classroom approach to making connections between ethical foundations and the challenges presented by information technology.American Journal of Business Education, 3(10), 1+. Retrieved from, http://www.proquest.com, On November 12, 2012
King, A.V. (2010) Constitutionality of cyberbullying laws: Keeping the online playground safe for both teens and free speech.Vanderbilt Law Review, 63(3), 845-884. Retrieved from, http://www.proquest.com, On November 12, 2012
Quinn, M. J. (2006) On teaching computer ethics within a computer science department. Science and Engineering Ethics, 12 (2), 335-343




Is this your assignment or some part of it?

We can do it for you! Click to Order!



Order Now


Translate »

You cannot copy content of this page