We are living in the digital age, all the data’s and information are kept digital and with the development of advance communication system, the accessibility of information has become global in a very short span of time. With the facility and convenience at work places this form of information has also raised a very serious issue for the Ethics in Intellectual rights of an individual or an organization. The most serious matter of ethics is about the data that is uploaded on the internet. An Individual puts a lot of effort and hard work in developing the digital work either it be Technical work such as codes for the software , technical artefacts, Literary work such as books, Research paper and Training material, Images, Legal documents, Organization’s Documents and other work. It is ethical to be made aware the owner about the copy, alterations, downloads and other inputs in their work. With this the uninformed access also arises the risks of misuse of the data .
The Computer Ethics or Information ethics was developed by the Norbert Weiner , the professor at MIT along with his colleagues at America and Great Britain. They developed a new branch in computing known as Cybernetics. He in his book “Cybernetics “ ( 1948) has elaborated various topics including Cyber Ethics along with the computer and security, computer and unemployment, computer and professionalism and several other topics still significant in digital Information system
The professionals who develop their intellectual work for the analysis, research, design, development , specification, certification and maintenance have a significant social impact. In Information Technology it is required to develop the professional ethics at workplaces , the code of conduct is very well required in this area.
The aim of this paper is to highlight the impacts of security failures, unprofessional and unethical approach of the professionals as well the general public on the intellectual work of an Individual as well Organization. It will also present the techniques and practices available for providing the assistance in this area and the limitation of present techniques also. With this it will also present the scope of research in this topic. The main aim of this paper is to present the proposal for research in this field.
Overview of Intellectual property rights at the work places
The Intellectual work or property refers to the own brain work done by the Individual or an Organization, their document and other papers. The intellectual property ethics refers to the practices consisting of legal rights too for restricting the uses of the created data with the help of copyright notices, software’s , trade , patents and other techniques.
The most serious concern in this domain is that we are living in the Internet age , through internet it takes very short time for circulating the information globally. Along with the data restricted for work place it is also required to have intellectual right policies for the data available free for learning as well community services.
A major issue in the area of Intellectual rights in the digital work are also connected with the software ownership too. Along with software’s other work such as digital content of the book, organization documents, images, information related to certain person, place or organization and several other work too.
In the study of the Intellectual property rights at the work places the key issues are as follows-
The implementation of Engineering and research practices rely on both engineering and ethical principles. In order to make engineering and research ethical it is suggested to introduce the professionalism ethics as a compulsory part in the training and course curriculum. There are several university considering this matter has already introduced in their course. Some example are now included in theComputer Science, Software Engineering and Inter-active Computing Curriculum at Mälardalen Uni-versity (MdH), (Dodig-Crnkovic 2005) too”.
There is no section where there is no risk of unauthorised use is not there but it is required to introduce the ethical study for it. It is very important to study in depth the impact and ways of violations to control these activities. Not only theoretical but also practical implementation of serious ethical methods should be implemented.
The ethics in computing refers to the analysis of the nature and impact on the social level of the software’s , either software packages or the software’s used for storing this digital information, the technology and the justification provided by the formulation polices for the implementation of the ethical principles. The problem in ethical principle arises due to differences in the judgement and practices to the expected results. In order to develop the effective ethical policies a deep research with considering the technical, social, legal, economical and the impacts in future should be designed.
Along with long term considerations at the level of work place its necessary that the employee at the work place could able to develop the rationale about the moral dilemma of practicing the particular activity or not. The most important factor in this concern is about the fixed or constant principles. Several questions also arise in this domain such as does copying the data is termed as stealing , the digital crimes are not same as human crimes , does viewing the information stored in individual computer is crime and attacking in the privacy of the individual’s right.
The Software have a great impact on the ethical practicing of the computer or digital work. According to the properties of the Software the software is broadly divided into two categories – the first category is Proprietary software and second category is the FLOSS software which is further categorized into the Free software , second it is Libre and third one is Open Software.
The proprietary Software’s are those software’s which are restricted for private company through their ownership, its software is protected by the legal privacy laws and regimes. Here the main focus is the security of the source code of the software as it is the code that makes the software valuable and has capability to transform the features and functionalities of the software. In order to restrict the violation certain End User Licence are created.
The Floss software’s are those software’s that provide the open or free access to the code of their software. In this category the Software’s come are as follows-
Free Software
According to the European council of Information Technology the characteristics of the free software’s are as follows-
Open Source Software
For the software’s following practices are followed –
Through this technique the making the copy of the data or software without the consent of the owner of the data or software is made legally prohibited. The users can view data but cannot use them for their personal use. According the USA IT council the Copy right protection and restriction can be defined as follows-
The copyright policy is not enough powerful to protect an idea, method, task, system , the operation method, view, principle , discovery and creation. It can be proclaimed that the functions and method of any programming language such as java can be different in each programs.
In this method like copy right protection the making the copy of the data or software without the consent of the owner of the data or software is made legally prohibited. In case of use or violation of the patent protection act the violator will be required to pay the violation fine to the owner.
In order to answer the research questions a well defined methodology is required to be developed. A good methodology play a pivotal role in the success of the research. To develop the methodology the different types of qualitative as well quantitative technique are used (Berndtsson et al., 2008) consisting questionnaires (Dawson, 2009), interviews, and surveys (Yi et al., 2009). Each and every approach has its own features and usability.
Interviews are the common and most useful method to design the methodology for the research, it helps in gaining the real life observation through practical opinion of the users. With the help of Interviews the researcher can gain in depth information about the topic by asking the open ended and detailed questions to the participants. The method of conducting Interviews can be categorised into the three types , the first type is structured Interview, semi structured and unstructured Interview type. (Oates, 2006).
Though Interview is the best method for gaining information but in several cases it creates the confusion and somehow this is very time consuming also.
Designing the questionnaire comes under the quantitate research method and it is useful method for collecting the opinion of several peoples in a short time. In this method the pattern of questions are pre-decided mostly they are open questions and simple to answer. (Dawson, 2009). This method helps the researcher to ask the questions to the participants without confusion in open answering method, it is less time consuming and in very small time opinion of many participant can be gained. It can be done even on not availability of the researcher at the time of response too.
The survey is also a major quantitate research method to collect the opinion of huge group. In this method the same questions are asked to large group of people , according to their response statistical analysis is done. This is most widely used method in several fields. These Questions can be asked through internet with the help of mails or polls and directly the opinion can analysed.
The main advantage of this technique is that in the short span of time the response of the or participants can be achieved and maximum response can be gained and analysed.
This method is also widely used, as the name the main concentration is to focus on the opinion to the majority of people. Here like an interview instead of taking interview of single person the interview is conducted of the group. And accordingly result is determined. The main advantage of this method it enables to interview the complete group rather than individual and can collectively put the opinion.
The case studies are also the best method for gaining the information detail of the research topic. By studying the case studies one can gain the opinion of other expert and well accomplished researchers. The case study can be conducted in several categories and in different ways.
This method is selected because it will help in gaining the practical opinion and to gain the vast detail about the research topic. Most importantly our selected topic Intellectual property rights require active participation of the employees and other people as it will help to determine the effectiveness of the ethical principles and techniques. It will also give us the facility to get the information in the natural environment so that better analysis can be performed. It will provide direct communication with the participant and will help in gaining the other required information too. Will also take consideration to related areas that are not considered before doing interview.
A survey is also the method selected for conducting the research. The survey will help to get the information from several peoples in less time and the information gained will be more trusted and analytical. The information can be analysed through various statistical techniques and approaches for better understanding. The survey can be done through emails and other techniques easily.
Conclusion
The problem of Ethics and professionalism in Intellectual rights of an Individual is the biggest issue in the Research, Ethics, and Professionalism in Computing. The most serious matter of ethics is about the data that is uploaded on the internet. An Individual puts a lot of effort and hard work in developing the digital work either it be Technical work such as codes for the software , technical artefacts, Literary work such as books, Research paper and Training material, Images, Legal documents, Organization’s Documents and other work. It is ethical to be made aware the owner about the copy, alterations, downloads and other inputs in their work. With this the uninformed access also arises the risks of misuse of the data. It is a wider field of research and study. If I will be given the opportunity to perform the research, I will give my best effort in this area.
For the project plan please view the details given in the Appendix A. Here the information for project planning is given through Gantt chart. Here each activity proposed to be performed is given in detail with logical breakdown of the tasks.
The ethical issues to be consider are given in the Appendix B.in this procedure to achieve the ethical prespective the human participant are involved.
Consent Form
The consent form is used to present the consent or approval of the participant for conducting the interview and survey.
References
Achaean, P., Jafri, M., & Ali-Hamada, A.R. Exploring the interdependency technology by developing a conceptual between reengineering and information model. Business Process Management Journal, 12(4), 517. Retrieved 20-5-17, from ABI/INFORM Global.
BERNDTSSON, M. et al. (2008) ,Thesis projects a guide for students in Computer Science and Information Systems. 2nd Edition. London, Springer-Verilog.
CHINYERE, I. and CHIEMELA, I. (2014) Workplace E-Monitoring and Surveillance of Employees: Indirect Tool of Information Gathering. International Journal of Science and Research (IJSR). 3 (10), pp. 2349-2353.
CONKLIN, J. and HAYHOE, G. (2010) Focus Group Workshop. In: 2010 IEEE International Professional Communication Conference (IPCC). Enscheda, Netherlands, 7-9 July 2010. Netherlands, IEEE, pp. 273-274.
Drake, D., Satterfield, J., & Nassau, C., The revolution of Six-Sigma: An analysis of its theory and application. Academy of Information and Management Sciences Journal. 11(1). 29-44. Retrieved November 21, 2010, from ABI/INFORM Global. .
Frank Tzu, Rolando Karma, Barbara Bernal, Essentials of Software Engineering, Jones & Bartlett Publishers, 2010
Lotfollah N, Ziaul H, Seyed-mahmoud A, Saeedreza H, Impact of IT on Process Improvement, Journal of Emerging Trends in Computing and Information Sciences , VOL. 3, NO. 1, ISSN 2079-8407 ,January 2011
Pankaj Jalote, (2000), A Concise Introduction to Software Engineering, Springer Publication
Roger.S.Pressman,(2010), Practicing Software Engineering, Prentice Hall
Ian Somerville, (2011), Software Engineering, Pearson Publication
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download