10 Sep 2022

69

Information Technology and Ethics - A Guide

Format: APA

Academic level: University

Paper type: Research Paper

Words: 1899

Pages: 7

Downloads: 0

Introduction 

Ethical codes include written principles concerning behavior and conduct that an organization creates to guide its employees. These codes offer the management, employees, and outside parties a point of reference, which adhere to organizational ethical beliefs, standards, and policy. The public can see the codes to ensure quality, integrity, and to stop the misguided behavior. Notwithstanding the governing body or organization, a code acts as the go-to guide since ethical challenges can begin from anywhere. Kohlberg specified a moral code that could maintain this to familiarity, and that was that there should exist the recognition of the difference between bad and good and respect for the rules of the right code of conduct (Gibbs, 2013).

In numerous ways, technology is significant in the society. However, numerous individual question how technology will or can be unethical. Information Technology is used in different sectors and businesses including research, security, the government, the banking sector, transportation, and medicine. Therefore, this makes IT professionals significant within a work environment. Most individuals think that IT professionals are employed to fix their computers and for when they cannot retrieve their emails. Nonetheless, in every business, an IT professional has different roles. Certified IT professionals manage, support, implement, develop, study, or design computer based information systems. Additionally, Information Technology has affected the society in both wrong and right ways in aspects including the law, age, relationship, freedom, education, and the living within the community. According to Giacalone and Thomson (2006), one can apply the ethical standards to influence the selection and recruitment process, attain organizational goals, and help in the course of making decisions. Therefore, IT professionals have a significant ethical, legal, and moral responsibility.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

As the universe is developing new technology, ethical requirements arise for proper sustenance and growth to decrease the danger of using IT wrongly. As part of IT, the Internet has a significant effect on the revolution of universal communication. The Internet has offered numerous individuals an opportunity to share many things including gathering data on the internet. The internet has given way to online shopping, where buyers can find anything. Additionally, numerous banks offer online services where an individual can manage his or her daily transactions by logging into his or her account while sitting at home. However, the development of Information Technology has brought numerous cultural conflicts.

Recently, there are numerous internet sites including online dating sites that many people access. According to Ackerley (2014), "Social Medias are interactive and allow individuals to convey messages and share data in public forums instantly." However, individuals use fake addresses and names on these sites. Therefore, numerous Muslim traditions to not allow online dating. Additionally, with the rise of Information Technology, many pornography sites have been developed. However, Eastern nations consider pornography unethical; hence, they are prohibited.

The Kantian Ethics ought to be applied to tackle the ethical dilemmas since it forms the ideological duty theory that examines the moral rightness of an action without considering the consequence. He proposed that only the responsibility and the rules be enough to govern people's actions. It is termed as deontological because deontology is the normative ethical seat that the judges of morality entertain (Onora, 2013). The theory holds that an action is either just or unjust.

Data innovation refers to various information administration, system administration, programming, and equipment parts, which are required for a framework to work. Normally, businesses utilize a PC or Personal Computer based data frameworks to assess deal patterns, buy new stock, pay employees, monitor the stock, and record consumer purchases. Minus the backing of data innovation, numerous businesses would end. For example, if a company does not use Personal Computer based data frameworks, the organization may lack the capacity to monitor the products including the profits and losses the organization is making. Therefore, the business loses vital data for achievements in the future.

Beauchamp, Bowie, and Arnold (2004) note that data innovation could assist in a business’ leadership. Numerous leaders make decisions from the data collected from the Personal Computers database frameworks. For example, a store manager could decide whether to stop purchasing a particular product or offering a specific service due to data retrieved from the PC database. Data innovations ultimately help an organization to have an advantage over those that lack the framework.

Additionally, an important use of IT ethics is to stop cybercrime . The society has undergone numerous changes due to technology. However, the technology has significantly enhanced cyber-crime. Different avenues within the society seek various methods to ensure that they stay safe notwithstanding the use of digital elements to fight the digital crime. Numerous organizations and individuals use cyber security to enhance their security systems against cyber- attacks. Therefore, cyber security can effectively tackle cyber-crime. Therefore, cyber security has effects on the society as a whole including the crime itself (Galeoti, 2014).

First, using information technology to fight digital crime has improved the society’s preparedness towards such malicious attacks. Additionally, cyber security restores the trust that individuals have with the law enforcement agencies , and the public becomes wary of cyber crimes . Along these lines, the general public ends up plainly ensured and guaranteed of well-being with the data innovation to battle wrongdoing. Also, the bodies that arrangement with digital security gives business changes to the individuals from the public. Through this, more people in public as a whole are brought to have financial flexibility (Pinguelo and Muller, 2011).

Then again, the economy flourishes because of the utilization of the data innovation to battle wrongdoing. Since advanced wrongdoing focuses on the business stores and banks, the use of computerized materials to securely protect the frameworks is a huge stride. The economy of the nation and the stores, for the most part, flourish because there are in conceivable means through which they could be hacked . The programmers who take account data and complete private exchanges from people records can be identified right now which they meddle the PC frameworks. However, using IT or information technology to combat digital crime is costly, and the law enforcement agencies incur significant expenses. The law enforcement bodies ensure that their systems are up to date and efficient . Therefore, it is necessary to have the machines regularly checked and updated. In itself, this is expensive to maintain (Pinguelo & Muller, 2011).

Despite the way that there have been revisions in the legal requirement offices to incorporate cyber-crime unit, there are various difficulties that face the social orders still. The free idea of the law shows a simple stage for the web clients, and the utilization of the law hinders these offices against completing a few obligations. In this way, the use of the legal requirement organizations to battle advanced wrongdoing is both exorbitant and extreme.

Despite the way that the crooks can be followed , the advanced violations that happen have a remittance for some person to complete wrongdoings from another area. In this way, in the examination of violations, the law authorization offices are fixing to manage the people since they rise above their limits. Hoodlums from different nations to complete assaults in the United States have utilized this. An example is a hack on Target stores that was directed by Russia, and the impact was felt in the United States (Taylor et al. 2014).

Then again, the autonomous law still uses the customary criminal law to seek after the digital offenders. PCs are a developing piece of the world, and the organizations need the correct techniques for researching and taking in the different crooks who are included with the hacks. The digital wrongdoing units, like this, require the enactments that are prescribed to have faculty who are recognized by the law to manage the cybercrime hazard. The law does not have an arrangement for a digital wrongdoing unit in the battle against PC violations. Consequently, this makes it hard to fight the offense because the officers do not mechanically side by side as the crooks (Galeoti, 2014).

Keeping in mind , the end goal to take care of the issue of digital crime, the country is ordered to take a gander at the choice of making a free body to manage the problem of digital crime. The PC wrongdoings require a team that is side-by-side and prepared to confront the ills that are related to PC wrongdoing. Then again, enactments in the constitution should arrange digital security units in the law authorization organizations. Fundamentally, this will enhance the approach given to PC wrongdoing (Pinguelo and Muller, 2011).

To fight digital crime , the United States government should align the federal agencies in a manner that favors the war. The federal agencies require a remarkable change in the form of operation to allow for the open war against digital crime (Galeoti, 2014). Notably, digital crime improves with the technological advancements, therefore; the federal agencies should be capable of handling them in the most efficient manner (Yang & Hoffstadt, 2006).

The federal agencies should have units that are specially trained on how to combat cyber-crime. The units should be informed on how technological changes affect the area of offense . Moreover, these units should be critically accessed to ensure that they could handle situations relating to cyber crime . Therefore, the government needs to form bodies that analyze the technological trends and manufacture software that can be used to detect various intrusions in potential vulnerability zones. This would enhance the awareness of the public. Furthermore, the creation of an informed task force will help to realize attacks before they happen or cause massive damages and react in the recommended manner. Therefore, according to Yang and Hoffstadt (2006), it is possible to conclude that the federal agencies require training on the technological changes.

On the other hand, the federal agencies can also be equipped with tracking devices that can detect the locations of the attackers and efficiently respond towards making arrests. The criminals should keep information within the system under tight supervision to prevent intrusion from causing harm (Pinguelo & Muller, 2011).

Global technological advancements make the internet a fundamental need in various business and transactions. Shortly , a very considerable number of the world's population will be carrying out online transactions, and they will be based on the internet based storage systems like cloud storage. Therefore, the future of digital crime is also set to change. The most frequent instances of digital crime include cyber bullying and identity theft; however, the developments will increase the intensity of the offense (Galeoti, 2014).

The digital crimes will have the capacity to attack the national governments and cause great harm in the individual countries. This could be an offset of the war against nations and political leaders. While the world is faced with the problem of tackling the deep net criminals, they will become a greater menace since more individuals will have the opportunity to become online (Galeoti, 2014). As businesses adopt online transactional models, the criminals have an excellent chance of causing terrible harm. Therefore, the cyber crime is expected to rise shortly . The magnitude of their harm is also projected to increase (Pinguelo & Muller, 2011).

To combat digital crime and terrorism, the United States should create a specific independent body to deal with the cyber crime . The digital terrorists and criminals have their platforms and have special expertise; this can, however, be specially tackled by a specially trained task force on the same issue. Therefore, the institution of digital police departments will help fight the security threats (Pinguelo & Muller, 2011).

Numerous organizations and individuals use cyber security to enhance their security systems against cyber- attacks. 

Through this, more people in public as a whole are brought to have financial flexibility (Pinguelo and Muller, 2011). Then again, the economy flourishes because of the utilization of the data innovation to battle wrongdoing. Therefore, it is necessary to have the machines regularly checked and updated. In itself, this is expensive to maintain (Pinguelo & Muller, 2011). Despite the way that there have been revisions in the legal requirement offices to incorporate cyber-crime unit, there are various difficulties that face the social orders still. In this way, the use of the legally required organizations to battle advanced wrongdoing is both exorbitant and extreme.

In conclusion, digital crime and digital terrorism present a significant challenge to the contemporary society. However, to combat this security threat , national governments require special task forces that are trained in how to handle these situations. On the other hand, the law also requires an amendment to accommodate the institution of fighting digital crime. It would create a remarkable effect on the community, as it would be free and safe from random and malicious criminal attacks.

References

Ackerley, N. (2014). Social Media in the Workplace. Veterinary Nursing Journal (Wiley-Blackwell), 29(6), 192-193.

Beauchamp, T. L., Bowie, N. E., & Arnold, D. G. (2014).  Ethical theory and business . Upper Saddle River (N.J.: Pearson.

Galeotti, M. (2014). Global crime today: the changing face of organized crime. Routledge.

Giacalone, R. A., and Thompson, K. R. (2006). "Business ethics and social responsibility education: Shifting the worldview." Academy of Management Learning & Education : 266-277 

Gibbs, J. C. (2013). Moral development and reality: Beyond the theories of Kohlberg, Hoffman, and Haidt . Oxford University Press, 2013. 

Onora, O. (2013) Acting on principle: An essay on Kantian ethics . Cambridge University Press , 2013. 

Pinguelo, F. M., & Muller, B. W. (2011). Virtual Crimes–Real Damages: A Primer on Cybercrimes in the United States and Efforts to Combat Cybercriminals. Virginia Journal of Law and Technology, Forthcoming. 

Tavani, H. (2009).  Ethics and technology . Hoboken, N.J.: Wiley.

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press. 

Yang, D. W., & Hoffstadt, B. M. (2006). Countering the cyber-crime threat. Am. Crim. L. Rev., 43, 201.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Information Technology and Ethics - A Guide.
https://studybounty.com/information-technology-and-ethics-a-guide-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Ethics

The Relationship Between Compensation and Employee Satisfaction

In line with the United States Occupational Safety and Health Administration (OSHA), work-related illness or injury derive from incidents or contact with the workplace hazards ( Singhvi, Dhage & Sharma, 2018). As far...

Words: 363

Pages: 1

Views: 97

17 Sep 2023
Ethics

The Tylenol Murders: What Happened in Chicago in 1982

The Chicago Tylenol Murders of 1982 were tragedies that occurred in a metropolitan region of Chicago and involved an alarming amount of recorded deaths. It was suspected to that the deaths were caused by drug...

Words: 557

Pages: 2

Views: 129

17 Sep 2023
Ethics

Ethical and Legal Analysis: What You Need to Know

Part 1 School Counselors (ASCA) | Teachers (NEA) | School Nurses (NASN) |---|--- The ASCA is responsible for protecting students’ information from the public. They always keep them confidential,...

Words: 531

Pages: 2

Views: 90

17 Sep 2023
Ethics

Naomi Klein: The Battle for Paradise

Corporate Social Responsibility (CSR) refers to self-driven motives by an organization or a state government to ensure the well-being of its people is safeguarded. Corporate Social Responsibility creates a strong...

Words: 1369

Pages: 6

Views: 392

17 Sep 2023
Ethics

What is Utilitarianism?

It is a normative theory that defines the morality of an action on whether it is right or wrong, based on the result (Mulgan, 2014) . This theory has three principles that serve as the motto for utilitarianism. One...

Words: 833

Pages: 3

Views: 155

17 Sep 2023
Ethics

Argument Mapping: Traffic Fatality

The first part of the paper critically analyzes the claim that "The US should return to the 55-mph speed limit to save lives and conserve fuel." According to Lord and Washington (2018), one of the verified methods of...

Words: 1111

Pages: 4

Views: 91

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration