Preview

Ethics in Information Technology

Powerful Essays
Open Document
Open Document
1196 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics in Information Technology
Are the ethical decisions that a technology user must make fundamentally different than those facing the ordinary person? No, because it is difficult to resolve competing interests no matter what the nature of action or behavior is contemplated. Is the existence of competing interests ' reason enough to impose a set of rules, or codes of conduct, within the technology environment?
Unfortunately, the large number of activities, and their complex nature, conducted by information technology professionals, and users, can sometimes have serious repercussions, and affect the well being of many individuals. When these activities include, theft, destruction, or fraud, most would agree these types of activities are wrong. However, when can the behavior with respect to, privacy issues associated with databases and electronic mail, and electronic monitoring be considered wrong? Developing a set of rules, or codes of conduct will identify accepted actions for technology users.
Privacy concerns have heightened the unease about ethics within technology. And it is this unease that prompted many professional organizations, such as the Association for Computing Professionals (ACM), to develop ethical codes of conduct for information technology professionals and users to provide guidance about ethical behavior. This paper will discuss the form of some of these codes and their effectiveness.
The code of ethics adopted by ACM consists of 24 imperatives (ACM, 1992). These imperatives, similar to Immanuel Kant 's (1724-1804) Deontological theory, are rules that command a type of action without regard to the type of desired end. For instance, ACM 's General Moral Imperative 1.5 "Honor property rights including copyrights and patents" presupposes situations where matters of public security require custody of personal property in order to acquire information of unlawful activity. For example, under this theory, it is not considered ethical to steal a loaf of bread even if your



References: Association for Computing Professionals. (1992) ACM Code of Ethics and Professional Conduct. Retrieved from http://www.acm.org. September 17, 2006. Bentham, Jeremy (1748-1832). The Internet encyclopedia of Philosophy. Retrieved from http://www.utm.edu/research/iep/b/bentham.htm on September 23, 2006 Institute for Electrical and Electronic Engineers. (1991). IEEE Code of Ethics. Retrieved from http://www.ieee.org/portal/pages/about/whatis/code.html September 17, 2006 Kant, Immanuel (1724-1804). The Internet encyclopedia of Philosopy Retrived from http://www.utm.edu/research/iepk/kantmeta.htm on September 23, 2006 Levy, Steven. (1985) Hackers: Heroes of the Computer Revolution. New York: Doubleday. Lysecky, Sarah. Listen up and listen in. IT.business.ca (September 12, 2006). Retrieved from www.ITbusiness.ca September 23, 2006 Office of the Privacy Commissioner of Canada. Retrieved from http://www.privcom.gc.ca/index_e.asp September 23, 2006 The White House. Retrieved from http://www.whitehouse.gov/infocus/patriotact/ on September 23, 2006.

You May Also Find These Documents Helpful

Related Topics