This research proposal depicts the importance of implementing different ethical aspects in the computing society. It has been assumed that computer technology causes most of the ethical issues in the computing society. Due to lack of ethical aspects most of the computing industries are currently facing major challenges throughout. In order to resolve those issues proper implementation of set of ethics are needed to be developed. A literature review background and selection of research methodologies are developed in this paper. In addition to this, a research planning schedule is also implemented to divide the entire workload in small segments.
According to Pearlson, Saunders and Galletta (2016) usages of traditional ethics are one of the important things that are strictly required to be considered by any computing organization. Both traditional as well as current ethical theories can be considered by the management authorities of the business organizations to resolve different sort of ethical issues. In order to serve accurate objectives and rationalist ethics proper mind set is needed must be arranged. However, consideration of policy vacuums and conceptual muddles are also needed.
The aim of this research proposal is to develop set of ethics considering the standards of ethics in computing operation. In order to minimize the operational issues ethics is referred to as one of the major factors that are strictly required to be considered.
In order to develop a set of ethical approaches in computing operation triple project constraints such as time, scope and cost are installed. It is determined that in order to complete the proposal 80 days are required and $40,000 are determined.
Ethics is referred to as the moral philosophy that helps to address the question about what is right and what is wrong. According to the computing committee administrator’s, globalization must be implemented throughout the curriculum of the computing operation. It is determined that different sorts of cultural differences are exiting in different computing society, but Pearlson, Saunders and Galletta (2016) stated that, all of the computing society are required to believe in some of the standard principle of ethics.
Information technology the branch of engineering deals with computer and its usage for transmitting, retrieving and storing data in the data server or data storage. This particular literature review depicts the importance of implementing set of professional ethics while dealing with different computing operations (Larson and Gray 2013). The necessity of ethical integrity set of standard ethics developed by the board of directors of different of different ethics developing society. In addition to this the role of ethics in information technology and the challenges associated to the code of ethics are also demonstrated in this literature review (Murthy 2013). Apart from the consideration of lack of ethical aspects both the commercial and computing workplace are facing major challenges throughout. Even the ways through which the ethical challenges could be mitigated are also elaborated in this literature review paper.
In the year of 1980 the Atomic Energy of Canada Limited (AECL) discovered radiation treatment machine for cancer named as Therac 25 and it was completely based on computing operation and the operation of the system were also controlled by the computing operation (Lewis and Westlund 2015). However, during the usage of this technical solution many patients faced serious health issues. Though after investigation it was determined that the issues occurred due to improper system testing and serious computing errors.
Computer ethics is a part of practical philosophy that is concerned about the ways through which the professionals might make proper decision regarding professional as well as social conduct (Russell, Dewey and Tegmark 2015). In the history of civilization, computing and communication is referred to as one of the most important tools that enables. Data quality maintains the accuracy and consistency of data over the life cycle (Murthy 2013). If any data get hijacked or accessed by the external users then the confidentiality of the data server will be diminished (Bowen Hung-Baesecke and Chen 2016). The broad overview of different types of data integrity should be developed considering the ethical approaches.
Each and every advanced in the information technology are accompanied with at least one ethical quandary. The software developers, business and individual must think about the rights and wrong of the information technology every day (Hughes, Cox and Akhir 2016). After considering the information technology and application of the information technology information ethics are needed to be investigated properly.
There are several challenges of ethics related to computing operations that must be solved at any cost in order to main data integrity and the consistency of IT systems (Budiono and Sawitri 2017). The main challenge of ethics in computing arises from the development of technology in the hands of unethical users that mainly use IT systems for negative and unethical purposes including hacking into other systems, online fraud and others. Some other challenges of ethics include inappropriate use of IT systems, use of the systems for personal gain, phishing on other people’s profiles and others (Pearson 2013). These challenges can seriously affect the daily operations and reputation of an organization or even the privacy of a particular user.
Various organizations around the world have devised and implemented several codes of professional ethics in order to ensure there is a fair usage of IT systems. Most of the challenges in IT systems arise from unfair usage of the systems for personal gain and harming other individuals or organizations (Alexander, Walker and Naim 2014). By implementing code of professional ethics, the organizations are trying to ensure the IT systems are used fairly and the privacy of confidential information is not breached by any means (Pearlson, Saunders and Galletta 2016). Moreover, IT employees are trained to use professional and technical skills at work rather than using the IT systems with unfair means and purposes
Conclusion
From the overall discussion it can be concluded that due to lack of ethical approaches most of the computing societies are currently facing major challenges. In order to mitigate those challenges implementation of proper code of ethics considering the standard principles are required (Agarwal and Dhar2014). Not only this but also the challenges of computing operation and the challenge mitigation approaches are also demonstrated in this literature review.
Research methodology helps the researchers to define the most valuable and appropriate approaches those are necessary to make successful completion of resultant processes. In this section the research philosophy, research approaches, research design methods, data collection and data techniques are elaborated precisely.
With the help of research philosophy appropriate manner to gain details of the research topics become easier to the viewers rather consumers. Whether the assumption process is correct or not can be easily determined with the research philosophy. There are three different kinds of research philosophy such as realism, positivism and interpretivism are available. Based on the type of research topic the accurate philosophy should be selected.
For developing set of professional ethics in computing operation instead of positivism and interpretivism approaches a mixed approach like realism is required to be adopted by the researchers. The hidden facts and the need necessity of the consumers of computing committees become revealed to the researchers. However the realism research approach describes the human belief application to establish relationship between human and tough reality.
In order to reveal the study material and to conduct an error free research works two different kinds of research approaches such as deductive and inductive are highlighted by the researchers. For studying the research topic, accurate data for the chosen are available however the mount is not enough to conduct the research work. However, with the help of inductive research approaches all the information relevant to the professional ethics could be determine easily.
Deductive research approach demonstrates the practical application of the collected theories those are studied to gain the access of the content of the research topic. It has been determined that in order to the make application of the theories research work properly specified. Thus, for this particular topic, research approach selection and for better topic analysis deductive research approach is needed to be selected.
Three different research design approaches are there such as explanatory, exploratory and descriptive. The outline and framework of the research topic could be critically analyzed with the help of the research design approach. Not only this but also the selection of data collection and the analysis patterns are also determined with the help of research design. For a better description of research design particular kind of data collection is needed to be applied by the researcher.
For acknowledging different kinds of critical ideas and thoughts explanatory research design found to be the most suitable one. The descriptive aim of the research and to gain details of the research topic it is necessary to use proper need and description of the research topic. For this particular research topic the explanatory design is completely avoided because in most of the cases the longitudinal studies become difficult to demonstrate any particular topic. In order to make accurate decision regarding the professional set of ethics, descriptive design approach is suggested to be selected by the research developer.
For studying any sort of research topics, it is necessary to make proper data collection approaches such as primary data collection, secondary data collection. In order to gain details of the research topic, both the primary and secondary data collections are helpful however for this particular topic, secondary data are needed to be collected from the journals and articles. However, the first hand data collection approach requires proper validity and reliability as well.
For this particular research proposal secondary data collection is much appreciable instead of primary data collection. The importance of professional ethics cannot be demonstrated by the survey questionnaires but from previous study of journals and articles the secondary data could be collected relevant to professional ethics in computing operation. Apart from the literature sources the other tools related to this topic include websites, books, websites, blogs and even online resources also.
For this particular research topic both the qualitative and quantitative data are needed. Thus mixed data collection process is required to be applied for collecting and applying data. In order to collect narrative form of data qualitative data are very much helpful. On the other hand for adding theoretical concepts with the existing information quantitative data technique is needed.
During the research ongoing phase certain ethical aspects are needed to be considered by the researchers. With the help of ethical approaches the researcher will be able to able to discriminate the right and wrong application sets. In order to analyze the research topic properly and to make accurate decision on certain standardization of ethics are needed to be implemented. The ethical aspects are as follows:
Data application: In order to understand the current trend of ethics in the practical field and computational operation it is necessary to consider the behaviour of both the organizational owners and the consumers. For making proper decision regarding which components of code of ethics should be installed, data application is required.
Involvement of articles and other respondents: While including the details of application and ethical consideration it is necessary to understand the trend of ethics in terms of both commercial and non commercial application. Though, the data application should be avoided to make the findings limited to the academic purposes only.
Respondent’s Anonymity: While collecting data from the primary and secondary research it is important to consider the mental and physical status of the respondents. It means that the participants must not be harassed anyway.
A list of limitation could be highlighted by the researchers while developing the research proposal. The restricted scope of the research work can be easily identified if the with the research limitation. The lists of limitations are as follows:
Reliability: It is necessary to maintain that none of the involved processes are generated from pressure or external influence. However, the ethical approach developers are completely biased towards the computing operations those have the power to affect the outcome the research topic. Therefore, certain issues associated to reliability are identified in this study.
Time constraints: In order to lead the study towards successful outcome and even towards the expected outcome, time limitation is found to be as one of the most affective issues of this cross sectional study. For the cross sectional study many important section of the research work were not analyzed properly.
Budget constraints: Budget is another limitation identified in this research proposal. According to the proposed study it is necessary to use proper tools and technologies to implement the qualitative as well as quantitative analysis.
Task Name |
Duration |
Start |
Finish |
Predecessors |
Schedule development for Ethics and computing |
79 days |
Thu 7/27/17 |
Tue 11/14/17 |
|
Research initiation phase |
11 days |
Thu 7/27/17 |
Thu 8/10/17 |
|
Understanding all the related issues |
2 days |
Thu 7/27/17 |
Fri 7/28/17 |
|
Identification of the issues |
3 days |
Mon 7/31/17 |
Wed 8/2/17 |
2 |
Analysis of the issues |
3 days |
Thu 8/3/17 |
Mon 8/7/17 |
3 |
Ethical issues associated to advanced computing |
3 days |
Tue 8/8/17 |
Thu 8/10/17 |
2,4 |
Feasibility study |
3 days |
Mon 7/31/17 |
Wed 8/2/17 |
2 |
Research Planning phase |
33 days |
Fri 8/11/17 |
Tue 9/26/17 |
|
Collection of data |
4 days |
Fri 8/11/17 |
Wed 8/16/17 |
5 |
Analyzing collected data |
5 days |
Thu 8/17/17 |
Wed 8/23/17 |
8 |
Selection of data collection method |
5 days |
Thu 8/24/17 |
Wed 8/30/17 |
6,9 |
Selection of research method |
5 days |
Thu 8/31/17 |
Wed 9/6/17 |
10 |
Analyzing the research methods |
4 days |
Thu 9/7/17 |
Tue 9/12/17 |
11 |
Addition of required suggestion for the improvement |
4 days |
Wed 9/13/17 |
Mon 9/18/17 |
12 |
Developing valid questionnaires |
5 days |
Tue 9/19/17 |
Mon 9/25/17 |
13 |
Modification of the question sets |
1 day |
Tue 9/26/17 |
Tue 9/26/17 |
14 |
Execution of the chosen methodologies |
31 days |
Wed 9/27/17 |
Wed 11/8/17 |
|
Administrative level survey considering the employees of the organization |
5 days |
Wed 9/27/17 |
Tue 10/3/17 |
15 |
Interviewing 12 employees from different workplace |
6 days |
Wed 10/4/17 |
Wed 10/11/17 |
17,2 |
Interviewing 10 employees from computing society |
5 days |
Thu 10/12/17 |
Wed 10/18/17 |
12,18 |
Analysis of the collected data |
5 days |
Thu 10/19/17 |
Wed 10/25/17 |
19 |
Analyzing resultants generated from first computing company |
5 days |
Thu 10/26/17 |
Wed 11/1/17 |
20 |
Analyzing resultants generated from second computing company |
4 days |
Thu 11/2/17 |
Tue 11/7/17 |
21 |
Analyzing resultants generated from third computing company |
1 day |
Wed 11/8/17 |
Wed 11/8/17 |
22 |
Critical evaluation of the data collected from different resources |
4 days |
Thu 11/9/17 |
Tue 11/14/17 |
|
Final documentation of the collected data |
4 days |
Thu 11/9/17 |
Tue 11/14/17 |
23 |
Conclusion
From the overall discussion it can be concluded that development of professional set of ethics are very much important to resolve the issues facing by the computing society. However, for developing the ethical aspects accurate research methodologies in terms of research approaches, research philosophy, data collection and data types are also considered. In addition to this, the way through which the research work will be conducted is also scheduled accurately. The ethical actions effect the entire situation of the workplaces. A successful business organization completely depends upon the rust level coming from different parties such as employees, managers, suppliers, buyers or consumers and executives. Sets of ethics are nothing different but set of a regulation that describes acceptable conduct in the society. In order to complete the desired objectives by meeting the requirement of the consumers the companies must serve guidelines. The behaviour of the employees and the owners could be critical analyzed with the help of set of ethics. The main factors those are considered for developing the ethical sets include fairness, honesty, equality and trust. Professional code of ethics and standards are needed to maintain the client patient confidentiality. In order to develop the code of ethics accurate research work is required to be done and only based on that the proposal should be prepared.
References
Agarwal, R. and Dhar, V., 2014. Big data, data science, and analytics: The opportunity and challenge for IS research.
Alexander, A., Walker, H. and Naim, M., 2014. Decision theory in sustainable supply chain management: a literature review. Supply Chain Management: An International Journal, 19(5/6), pp.504-522.
Bin-Abbas, H. and Bakry, S.H., 2014. Assessment of IT governance in organizations: A simple integrated approach. Computers in Human Behavior, 32, pp.261-267.
Bowen, S.A., Hung-Baesecke, C.J.F. and Chen, Y.R.R., 2016. Ethics as a precursor to organization–public relationships: Building trust before and during the OPR model. Cogent Social Sciences, 2(1), p.1141467.
Budiono, G.L. and Sawitri, N.N., 2017. Strategic Business Espionage: An Ethics and Business Practices to Gain Opportunity or Community Problems. Studies in Business and Economics, 12(1), pp.29-39.
Dove, E.S., Joly, Y., Tassé, A.M., in Genomics, P.P.P., Committee, S.P.I.S., Knoppers, B.M., International Cancer Genome Consortium and Ethics and Policy Committee, 2015. Genomic cloud computing: legal and ethical points to consider. European Journal of Human Genetics, 23(10), p.1271.
El-Gazzar, R.F., 2014, June. A literature review on cloud computing adoption issues in enterprises. In International Working Conference on Transfer and Diffusion of IT (pp. 214-242). Springer, Berlin, Heidelberg.
Fu, W. and Deshpande, S.P., 2014. The impact of caring climate, job satisfaction, and organizational commitment on job performance of employees in a China’s insurance company. Journal of Business Ethics, 124(2), pp.339-349.
Hughes, R.T., Cox, K. and Akhir, E.P., 2016. Modelling the alignment of information systems and business strategy: an example from sustainable procurement. In the 24th International Software Quality Management (SQM) and INSPIRE Conference. Bournemouth: SQM/INSPIRE.
Kerzner, H., 2013. Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons. Michaelson, C., Pratt, M.G., Grant, A.M. and Dunn, C.P., 2014. Meaningful work: Connecting business ethics and organization studies. Journal of Business Ethics, 121(1), pp.77-90.
Larson, E.W. and Gray, C., 2013. Project Management: The Managerial Process with MS Project. McGraw-Hill.
Lewis, S.C. and Westlund, O., 2015. Big data and journalism: Epistemology, expertise, economics, and ethics. Digital Journalism, 3(3), pp.447-466.
Meyer, C.K., Kurovski, S. and Clapham, S.E., 2014. Talking Trash: Ethics, Sustainability, And Organizational Trust. Journal of Sustainability Management, 2(2), p.43.
Mir, F.A. and Pinnington, A.H., 2014. Exploring the value of project management: linking project management performance and project success. International journal of project management, 32(2), pp.202-217.
Murthy, D., 2013. Ethnographic Research 2.0: The potentialities of emergent digital technologies for qualitative organizational research. Journal of Organizational Ethnography, 2(1), pp.23-36.
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Pearson, S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer London.
Russell, S., Dewey, D. and Tegmark, M., 2015. Research priorities for robust and beneficial artificial intelligence. Ai Magazine, 36(4), pp.105-114.
Schwalbe, K., 2015. Information technology project management. Cengage Learning.
Sharif, M.M. and Scandura, T.A., 2014. Do perceptions of ethical conduct matter during organizational change? Ethical leadership and employee involvement. Journal of Business Ethics, 124(2), pp.185-196.
Sultan, N., 2013. Knowledge management in the age of cloud computing and Web 2.0: Experiencing the power of disruptive innovations. International journal of information management, 33(1), pp.160-165.
Verzuh, E., 2015. The fast forward MBA in project management. John Wiley & Sons.
Walker, A., 2015. Project management in construction. John Wiley & Sons.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download