Latest advances in the field of information technology have helped in improvising lifestyle of humans. On the other hand, it has also created several limitations and ethical issues. One of the important topics in the information technology field has been the ethical issues in the computing system at a workplace. As commented by Weckert (2017), the use of computers in business has been increased in recent years. The study of ethics in the computer system has helped in maintaining the digital world. The digital age has seen various changes in a technical field with implementations of artificial intelligence. The growth and development of Internet have helped in connecting with various people in the world.
The lack of scientific integrity in educational environments. Ethics are involved in decision making for deciding it good or bad. However, different people have different perceptions towards computer ethics issues as they have different individual backgrounds. However, several strategies has been made in order to maintain and mitigate these ethical issues in the computer at the workplace. As mentioned by Lazar, Feng and Hochheiser (2017), the ethical use of computers at the workplace has been an important element for the progress of the company. Security of data and information of the company is the main role of maintaining by the IT professional in an organization. The duty of the IT security professional is to minimize threats and risks involved in the company due to the unethical use of computers at the workplace. There are various laws and policies created by the government in order to minimize ethical issues of the computer at the workplace (Moore et al. 2017).
This paper discusses various ethical issues in the computing system at the workplace. The aims and objectives of the research have been initiated in the research paper. The literature review will discuss the concept of the ethical issues in the computing system. Various concepts and theories will be discussed in the literature section.
This paper talks about appropriate methodologies for proceeding in the research. A positivism research philosophy will be developed in the research paper. The research will use descriptive research design. A detailed project plan will be provided at end of the research paper.
Use of computers in the workplace has been increasing on a daily basis. The major problem with this research is the unethical use of the computer in a workplace. Computer ethics refers to ethical problems arising in the computer at the workplace. The misuse of the computer at the workplace has been highlighted in broader areas.
The aim of the research is to identify the ethical abuses in the information technology field.
The objectives of the research are as follows:
Following are the research questions:
Computer system misuse has been a crime in the world. Estimated costs of computer crime have been of millions of dollars. As mentioned by Kim et al. (2017), the misuse of the information technology resources at the workplace has been a common problem in various organizations. These illegal activities have increased the expenditure of the companies in the market. There have been various security issues prevailing in the computer at the workplace. These challenges are faced by the company as well as employees working in that company. As stated by Kern, Ware and Warschauer (2017), an unauthorized, illegal and deliberate use of computers in order to fulfil self-needs led to misuse of computers at the workplace. Various possible abuses are caused by hardware, software and other computer programs. However, this definition covers all insights of the computer system. Illegal activities including downloading copyrighted material, pornography, and employee sabotage and accessing illegal information about the company, these illegal activities create a chaos condition in the work environment.
As commented by Cardador, Northcraft and Whicker (2017), misuse of computers at work has been a common matter nowadays. The Internet misuse is one of the key areas for ethical issues in the computer. The misuse of the internet has reduced the productivity of the employees in the companies and created a risk factor for the development of the organization in the market. Various illegal activities including chatting, slacking, cybersex, pornography and security threats. Sexual harassment, pornography and cybersex have been classified as extreme negative behaviours due to their legal implications. As mentioned by Burton et al. (2017), the misuse of the computer system at the workplace has been creating serious issues for various companies in the market. Data loss has been a critical problem for organizations. Use of illegal and unauthorized websites has been inviting various dangerous worm and viruses to enter into a system of users. These virus damages systems and the server of the company. The use of the internet has given rise to these illegal activates at the workplace. Surfing and downloading from the internet has been increased at the workplace.
As commented by Burton et al. (2017), ethics refers to encouraging individuals for thinking through their attitudes and beliefs for decision-making approach in any company. The use of the ethical behaviour of the employees at the workplace has been maintained properly for developing the company in the market. However, complex things are difficult to maintain and monitor. As suggested by Goodman (2017), computer ethics in information technology has been considered major issues faced at the workplace. Computer ethics refers to a dynamic and complicated study that include facts, values and policies for developing computer technologies. It deals with practical concerns that arise in connection with the impact of communication and information technologies influencing technologies. Knowledge about computer ethics might help in increasing awareness of people in the society.
As commented by Goebel and Weißenberger (2017), the use of a computer at the workplace is also dependent on the gender of employees. The ratio between male and female illegal computer users at the workplace has been 4:1. The reason behind this ratio is that male culprit are bolder than that of the female. However, there is the difference in the way of using a computer by a male and female act towards the use of the computer. Boddy and Dominelli (2017) supported that men and women perceive different ethical and unethical attitudes. On the other hand, Välimäki et al. (2017) argued that there is no relationship of gender in unethical use of the computer system at the workplace. Both male and female are equally responsible for any kind of unethical use of the computer at the workplace. The attitude towards using the computer at the workplace by both men and women employees are equal. Therefore, there is no privacy in the unethical use of computers at the workplace. Employees are responsible for any unethical use of computers. The staff have the ability to identify various scenarios of unethical behaviour in the workplace related to internet and computer use.
As commented by Ruiz-Palomino and Bañón-Gomis (2017), an employee having the strong religious belief is significantly different towards ethics related to computer and internet. Various IT professional is ethical towards their work in the company. Religious belief helps in maintaining a core value for working at the workplace with an ethical behaviour and work. The misuse of internet and computer have been precisely developing in the workplace. However, several people have different approaches to their religious paradigm that allows them to provide ethical duties in the workplace.
Kohlberg’s Theory of Moral Development
As commented by Goodrich and Luke (2017), this theory aligns with the topic of the ethical use of the computers and information technology at the workplace. Workers are placed at a same level in order to perform an equal amount of work in the company. In order to perform at the workplace, employee use to provide ethical considerations. Therefore, various professionals in the company are depended on the moral development in their workplace or implementing proper services at the workplace. A significant role is performed by different employees that have helped n providing an extra edge to the performance level of the employees. In order to analyze the performance of employees in the workplace, this theory helps in maintaining a close look at the employees. However, this theory is directly proportional to the education profession. As commented by Friedman and Kahn Jr (2017), there are three levels of this theory including pre-conventional, Conventional and Post-conventional.
The pre-conventional level of moral reasoning that includes among children and other adults. The pre-conventional level consists of first and second stages of moral development. However, in first stage individuals focuses on direct consequences and their actions include different consequences. As mentioned by Priesemuth and Schminke (2017), the second stage deals with the right behaviour of employees at the workplace. Stage 2 reasoning shows a limited interest in the needs of others. As commented by Manca and Ranieri (2017), moral thinking deals with rewards and self-interest. However, children are habitual to obey their best hobbies. This helps in enhancing attitude among them. Conventional level includes good behaviour include various groups that helps in approval of decision-making approaches. Various moral judgments are based on values and laws. Emphasis is provided on upholding law, authority and order following social rules and regulations.
Figure 1: Kohlberg’s Theory of Moral Development
(Source: Gambrill 2017)
As argued by Zamansky et al. (2017), people do believe in their behaviour but external factors have caused different types of unethical behaviour at the workplace. The use of the internet has also helped in providing unethical sources for employees in an organization. Post-conventional level deals with morality, which is judged based on abstract principles and laws in the society. In this case, the use of the internet at the workplace have been continuously managing the development of the company in the market. As stated by Gambrill (2017), the use of computer and internet have been able to manage all the operations of the company that have helped in maintaining the growth of the company in the market. Therefore, this theory has helped in monitoring the ethical use of the computer at a workplace.
The 4-V model of ethical leadership
As commented by Sharples and Houghton (2017), ethical leadership is an important element for acquiring a manager for understanding core values and morals of the company in the market. This model comprises of frameworks involving internal and external factors. According to this model, leaders have ti make inner changes in the work environment of the company. The inner changes include ethics and moral values. Individuals have to discover their inner core values and inner voice to maintain the ethnicity of outer commitment. The duty of the IT security professional is to minimize threats and risks involved in the company due to the unethical use of computers at the workplace. There are various laws and policies created by the government in order to minimize ethical issues of the computer at the workplace. The goal of leadership is focused on shaping the world into a visionary inclusive that allows employees to meet their needs and potentials. As suggested by Brinkmann (2014), this model consists of four sides of ethical leadership including values, vision, voice and virtue.
Values focus on primary factor for developing ethical leadership among all employees of the company. This helps in maintaining ethical use of computers in the workplace. Vision deals with observing and executing values and actions required for maintaining ethical values in the workplace. Leader has to maintain a positive approach towards the work done by employees under certain ethical dilemmas. The third factor, voice refers to articulate the vision to other employees for motivating them to complete their work within deadline. The fourth factor includes virtue that deals with performing various virtues behavior for development of the company.
Figure 2: 4-V Model
(Source: Wolpaw, J. and Wolpaw 2012)
As commented by Quinn (2014), the first stage of this framework is to build trust with the group members at the workplace. The leader has to maintain a close relationship with followers and employees to build and maintain trust. Providing gifts and rewards to employees on their good performance helps in creating a relationship with them. Therefore, employee engagement might be increased. Employees are encouraged to work ethically with computers at workplace. As argued by van Erp, Lotte and Tangermann (2012), providing rewards and gifts might increase revenue pf the company and there is no need of such rewards for employees. Employees might be motivated without any investment. The second stage deals with sharing vision with employees that help in maintaining a proper approach to employees for proceeding towards work. As commented by Reamer (2013), any kind of confusion and misleading leads to unethical work by employees at workplace. The ethical use of computers at workplace totally depends on clarification of vision of employees at work. The use of the model can help in maintaining ethnicity during work. This framework focuses on putting ethics and values of employees first. As stated by Friedman et al. (2013), this shift in operation management help in maintaining ethical values among employees of company. This model have helped in providing a clear approach for mitigating ethical issues in computer at workplace. This model deals with various changes in the operational management of the company in order to minimize unethical work at workplace.
Unethical use of a computer at the workplace has created various problems for the company in the market. The unethical use of computers has created security issues for the company. As commented by Irani and Silberman (2013), the IT professionals have been facing an increase in security concerns including external threats to organizations. Unethical behaviour by IT professionals can be potentially illegal in the organizational context. The access to the database and other important files and information of the company creates security issues for the company in the market.
Organizational integrity
As commented by Ritchie et al. (2013), various organizations are concerned about their safety and security issues at the workplace. Information technology professional is using these policies and laws in organizations. However, various unethical issues are created at the workplace through the illegal use of a computer. The company used to hesitate in sharing their private information with its competitors. The misuse of computers at the workplace have increased illegal activities over the internet. Hackers have targeted loopholes and gaps in the security protocol of the company over the market. The firewall helps in restricting various viruses and malware. Security of data and information of the company is the main role of maintaining by the IT professional in an organization.
Industry Integrity
As mentioned by Simha and Cullen (2012), IT professionals belong to IT services and products under IT industry. Therefore, any unethical activities performed by any IT professional directly impact on the IT industry. However, any unethical practices by a hacker or IT professionals create opportunity to get access to important data and information. Many industries have their own backup plans that can be leaked out over the internet.
Cyber Attacks
Unethical use of computers at the workplace have triggered cyber-attacks over network server if various companies over the internet. As mentioned by Gunn and Taylor (2014), the wrong use of a computer at the workplace have created an opportunity for hackers and intruders to loop into the network and server of the company. The data loss has been a major problem for the companies being attacked online. IT professionals are responsible for the unethical use of computers in the workplace. The unethical practices because data security treats for the recognized organization.
This research will use primary data collection technique to collect data and information related to the unethical use of computers at the workplace. A positivism research philosophy will be used to acknowledge existing theories and models related to the research topic. As mentioned by Hartman, DesJardins and MacDonald (2014), the use deductive approach might help in clarifying important points and results from the theories and models related to the ethical issues of computers at the workplace. The data collection method has been an important point included in the research methodology. Data will be collected by organizing online survey with 55 participants of employees of different organizations. The survey questionnaires contain questions related to the ethical and unethical use of computers at the workplace. Questionnaires will be designed online and data has been analyzed using quantitative and qualitative data analysis method. As mentioned by Pimmer, Linxen and Gröhbiel (2012), outcomes and results of the online survey have been shown over Likert scale ranging from 1 to 5. The results will be shown using graphs and tables that might help in the simple and clear presentation of results. The interview has been conducted with three It experts of different companies for gathering views and data related to unethical norms of the computer at the workplace.
There might be some issues in data collection process for this research. The use of both primary and secondary method of data collection has collected a huge amount of data regarding ethical issues of computers at the workplace. Therefore, the timeline for this research will increase by solving all issues during data collection process. As mentioned by Baecker (2014), gathering participants for online survey might have been a problem for this research. Different participants might provide haphazard answers to questionnaires that might create a problem in collecting and validating data. However, this type of incomplete and haphazard data and information will not be taken as included data. It might create a problem in conducting interview sessions with IT experts and professionals, as they might be busy in their work. Therefore, taking an appointment with them become difficult for the researcher. However, many times telephonic interview might be organized. As commented by Deakin and Wakefield (204), this might create network problem and proper data are not collected. They might not be interested in providing correct data and information with respect to interview questions. IT professionals might not provide appropriate answers to interview questions due to various privacy concern.
This research will consider all the ethical norms for ensuring proper approach towards completion of the research. The data and information regarding the participants and interviewers will be kept secret and safe. As stated by Christianson (2014), the norms under the Data Protection Act 1998 will be strictly followed. The results and outcomes of the research will not be shared with anyone outside the research and kept secured and safe. Participants of the interview and online survey will not be forced to provide their answers related to the questions. The participants will be allowed to leave the research according to their will. The use of unethical means of data collection process will not be used in this research.
The project plan is a process that helps in planning and scheduling various tasks and elements included in the project. The Project plan includes various tasks that are assigned with mentioned deadline. The overall project is sub-divided into small elements and tasks. This strategy helps in completing project within deadline. As commented by Locke, Spirduso and Silverman (2014), a detailed project plan consists of various elements including Purpose of the project, Scope of the project, Approach, phases and Milestones and project schedule. In this case, the purpose of the project is to analyze the ethical issues in computer at workplace. The ethical issues have been prevailing in the workplace that have caused loss to various organization. The scope of the project deals with target audiences. In this project, employees of various organizations are the target audiences. The project scope has been bounded to discuss only the ethical issues in computers at workplace. Therefore, no other issues except ethical issues in computer will be discussed in this project. As commented by Earnshaw (2014), the project will follow a proper methodology that has been discussed earlier in the report. Online survey questionnaires and interview will be conducted for gathering data and information related to the project. A proper data analysis will be done to analyze the gathered data and information during data collection process. The output of this project will provide strategies for mitigating ethical issues in computer at workplace.
As commented by Kern, Ware and Warschauer (2017), a Gantt chart is an easy method to document various schedules for the project. There is various horizontal-bar schedule reflecting starting of activity, duration and completion. However, it helps in showing a connection between events and time and provides a graphical representation. The Gantt schedule helps in providing the relationship between events and their schedule of deadlines for maintaining a rote for completion of the project.
Figure 3: Tasks
(Source: Created by author)
Figure 4: Gantt Chart
(Source: Created by Author)
References
Baecker, R.M. ed., 2014. Readings in Human-Computer Interaction: toward the year 2000. Morgan Kaufmann.
Boddy, J. and Dominelli, L., 2017. Social Media and Social Work: The Challenges of a New Ethical Space. Australian Social Work, 70(2), pp.172-184.
Brinkmann, S., 2014. Interview. In Encyclopedia of Critical Psychology (pp. 1008-1010). Springer New York.
Burton, E., Goldsmith, J., Koenig, S., Kuipers, B., Mattei, N. and Walsh, T., 2017. Ethical considerations in artificial intelligence courses. arXiv preprint arXiv:1701.07769.
Cardador, M.T., Northcraft, G.B. and Whicker, J., 2017. A theory of work gamification: Something old, something new, something borrowed, something cool?. Human Resource Management Review, 27(2), pp.353-365.
Christianson, S.A., 2014. The handbook of emotion and memory: Research and theory. Psychology Press.
Deakin, H. and Wakefield, K., 2014. Skype interviewing: Reflections of two PhD researchers. Qualitative research, 14(5), pp.603-616.
Earnshaw, R.A. ed., 2014. Virtual reality systems. Academic press.
Friedman, B. and Kahn Jr, P.H., 2017. Human agency and responsible computing: Implications for computer system design. Computer Ethics.
Friedman, B., Kahn Jr, P.H., Borning, A. and Huldtgren, A., 2013. Value sensitive design and information systems. In Early engagement and new technologies: Opening up the laboratory (pp. 55-95). Springer Netherlands.
Gambrill, E. ed., 2017. Social work ethics. Routledge.
Goebel, S. and Weißenberger, B.E., 2017. The relationship between informal controls, ethical work climates, and organizational performance. Journal of Business Ethics, 141(3), pp.505-528.
Goodman, K.W., 2017. Introduction: Symposium on Ethical Issues in Data Science and Digital Medicine. Cambridge Quarterly of Healthcare Ethics, 26(2), pp.326-327.
Goodrich, K.M. and Luke, M., 2017. Ethical issues in the research of group work. The Journal for Specialists in Group Work, 42(1), pp.108-129.
Gunn, J. and Taylor, P., 2014. Forensic psychiatry: clinical, legal and ethical issues. CRC Press.
Hartman, L.P., DesJardins, J.R. and MacDonald, C., 2014. Business ethics: Decision making for personal integrity and social responsibility. New York: McGraw-Hill.
Irani, L.C. and Silberman, M., 2013, April. Turkopticon: Interrupting worker invisibility in amazon mechanical turk. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 611-620). ACM.
Kern, R., Ware, P. and Warschauer, M., 2017. Network-based language teaching. Second and Foreign Language Education, pp.197-209.
Kim, A., Kim, Y., Han, K., Jackson, S.E. and Ployhart, R.E., 2017. Multilevel influences on voluntary workplace green behavior: Individual differences, leader behavior, and coworker advocacy. Journal of Management, 43(5), pp.1335-1358.
Lazar, J., Feng, J.H. and Hochheiser, H., 2017. Research methods in human-computer interaction. Morgan Kaufmann.
Locke, L.F., Spirduso, W.W. and Silverman, S.J., 2014. Proposals that work. Sage.
Manca, S. and Ranieri, M., 2017. Implications of social network sites for teaching and learning. Where we are and where we want to go. Education and Information Technologies, 22(2), pp.605-622.
Moore, P., Moore, P., Piwek, L. and Piwek, L., 2017. Regulating wellbeing in the brave new quantified workplace. Employee Relations, 39(3), pp.308-316.
Pimmer, C., Linxen, S. and Gröhbiel, U., 2012. Facebook as a learning tool? A case study on the appropriation of social network sites from mobile phones in developing countries. British Journal of Educational Technology, 43(5), pp.726-738.
Priesemuth, M. and Schminke, M., 2017. Helping Thy Neighbor? Prosocial Reactions to Observed Abusive Supervision in the Workplace. Journal of Management, p.0149206317702219.
Quinn, M.J., 2014. Ethics for the information age. Pearson.
Reamer, F.G., 2013. Social work in a digital age: Ethical and risk management challenges. Social work, 58(2), pp.163-172.
Ritchie, J., Lewis, J., Nicholls, C.M. and Ormston, R. eds., 2013. Qualitative research practice: A guide for social science students and researchers. Sage.
Ruiz-Palomino, P. and Bañón-Gomis, A., 2017. The negative impact of chameleon-inducing personalities on employees’ ethical work intentions: The mediating role of Machiavellianism. European Management Journal, 35(1), pp.102-115.
Sharples, S. and Houghton, R.J., 2017. The field becomes the laboratory? The impact of the contextual digital footprint on the discipline of E/HF. Ergonomics, 60(2), pp.270-283.
Simha, A. and Cullen, J.B., 2012. Ethical climates and their effects on organizational outcomes: Implications from the past and prophecies for the future. The Academy of Management Perspectives, 26(4), pp.20-34.
Välimäki, M., Kuosmanen, L., Hätönen, H., Koivunen, M., Pitkänen, A., Athanasopoulou, C. and Anttila, M., 2017. connectivity to computers and the internet among patients with schizophrenia spectrum disorders: a cross-sectional study. Neuropsychiatric disease and treatment, 13, p.1201.
van Erp, J., Lotte, F. and Tangermann, M., 2012. Brain-computer interfaces: beyond medical applications. Computer, 45(4), pp.26-34.
Weckert, J. ed., 2017. Computer ethics. Routledge.
Wolpaw, J. and Wolpaw, E.W. eds., 2012. Brain-computer interfaces: principles and practice. OUP USA.
Zamansky, A., Roshier, A., Mancini, C., Collins, E.C., Hall, C., Grillaert, K., Morrison, A., North, S. and Wirman, H., 2017. A Report on the First International Workshop on Research Methods in Animal-Computer Interaction.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download