The industrial professionals have to be educated and trained in terms of technical capabilities and skills. They are trained of performing different tasks but generally the skills can be abused. Lots of times ICT professionals have to approach to their job with the hackers’ point of view (Becker and Becker, 2001). They have to keep in mind what can be done online there and tighter to do or not. In this report of the word have a lies in the general scenario which means “black hat or hackers and utilise their abilities to crack the systems and get accessibility to programming and information without any consent from the system owner.
ICT is an influential requirement of all individuals for the accumulation of data and information, and accordingly, has to be warranted as an essential right to every person. Universally, rights those are now lawfully apparent are everyday being spoiled, regardless of campaign for the sake of financial headway, political steadiness, devout motives, the crusade in opposition to psychological warfare, or for individual ravenousness and interests (Wankel and Malleck, 2012). Encroachment of these rights have made fresh concerns in human social structures, for example, the digital division, cybercrime, automated security and defence matters, each of these have persuaded individuals’ lives either exclusively or in a roundabout manner.
ICT ethics are not outstanding from the previously mentioned perspective of ethics. On this earth, where data and correspondence innovation has come to distinguish how persons live and work, and has fundamentally persuaded culture and morals, it is essential for us to audit ethical issues, and in addition communal duty. This is a worrying job because of the assorted qualities in belief, class, station, vernacular, dialect, culture and race. Besides, the problem of ICT ethics goes up against improved importance as the area fights back with the elements of globalization and the present political condition subsequent to the September 11 occurrence (Boettcher, Cavanagh and Xu, 2014).
There are white hat hackers also, who utilise their capabilities to assist the businesses and people for protecting against them blackhead happens. Rather lots of ICT professionals don’t even come to know that their jobs include ethical and professional issues. Lots of ethical concerns faced by ICT professionals include the subject of privacy. I sent one example for this is whether one should read the private email of the network utilises only because it can be read?
Should a log of all the visited sites be maintained or is it okay to neglect the Internet usages?
It is not only the legal issue but this report discusses the professional ethical and social concerns. Being a network admin or security person, there are different facilities, rights which allow the ICT professionals to get accessibility to large scale of information on the networks and systems. These professionals might be capable of accessing the in cryptic details also in case there is accessible to the recovery agent account (Vaccaro and Madsen, 2009). It is dependent on the ethics of the professional, what he does with those rights. For example in case The monitoring of staff members email is part of job role of the person then it is alright to go ahead with reading the mails. Also depends on the personal ethics of the professional.
This kind of situation in ethical concerns is termed as “slippery slope court. This means the convenience with which an individual can carry out any task which doesn’t actually looks as unethical, for example scanning of emails of the staff members only for fun sake or doing stuff which is electrical in nature like making someone amendments to the email messages or diversion of the emails to the incorrect receiver (Gasson, Kosta and Bowman, 2012).
While considering the privacy concerns as discussed above, it is simple to give justification for all of these activities however it can also be simply seen how all of these activities can lead to unethical behaviours (Tavani, 2013). Taking an example of this, the information that ICT professional has got from reading the co-workers email could be utilised for embarrassing that homework are all for getting any benefit inside the business or for making others getting fired on getting any disciplinary action against him or even for blackmailing (Tavani, 2010).
The slippery slope is a concept which can be far ahead of utilising the ICT skills. This all depends on the ethics of the professional. In case if he finds that reading other co-worker’s email is acceptable then he might also find opening of drawers of that person in his absence to be acceptable.
The ICT professionals who work for different businesses have lots of ethical issues which they have to handle. There are monetary issues as well. The network attacks, hacking, virus attacks and other risks to ICT infrastructure have brought in lots of companies in the situation of being “very very afraid” (Halimahton Shaari and Ismail Sualman, n.d.).
Being a professional in this industry, it might be simple to take benefit from those fears and convince the businesses to spend much more than they actually require to. One more ethical issue includes promising beyond what can be delivered or manipulation of data for getting more fees. The ICT professionals can install technicalities and make configurations so that the client gets a more secure network, still it can never be fully secured (Suau-Jime?nez and Pennock-Speck, 2011).
Ethics is very important for businesses as whatever is done by ICT professionals must not be harmful for other people working with them. Ethics is something that can be filled but not something that can be thought off. In case the ICT professional is a disciplined one then he would be able to practice that takes in a better way. That ethics are very significant in the governance of behaviour in order that so ICT can sustain but the major issue is that usually there is no clear description of ethics (Hercheui, 2012).
Therefore in context of designing an application, the ICT professionals have to keep in mind that clients’ privacy is intact and Business is at no risk. This is the information that has to be taken care of.
The computer ethics is the amendment of studies which includes realities, values, strategies and fundamentals getting changed because of firstly converting computer technologies (Oppenheim and Pollecutt, 2000). Therefore ethics is the major fundamental that individuals have to follow or carry out for refraining themselves from any unethical activities like stealing, fraudulent activities, slaughtering (Soraj Hongladarom and Ess, 2007). The great thing regarding ethics is that individuals are responsible for the preferences and decisions made by them. How are ever there is a bad aspect also because people might miss use their power and carry out wrong activities because of their rights and because of their wrong choices. ICT is useful in making the people capable of capturing, understanding, holding and destroying the information at a fast pace and data high-level. There are major professional and ethical issues caused by ICT which are discussed as below:
The professional concerns involve concerns with respect to researching, education and training because many times the ICT professionals have to experience hardships. With the start of every ICT professionals journey into this industry, there is expectation that social or professional or ethical issues will be there which has to be professionally handled. The highly concerning issue for businesses is of security and cyber crime is turning out to be a big threat for survival of businesses. As the cybercrime is rising sharply, the ICT professionals have to lay stress on prevention of security breaches. This can be done by working in collaboration with risk management teams. There are chances that manipulation of technology is in such a manner that it is difficult to access the information or utilise it.
Similar to the past professions like medicine, law and other professions, most of the ethical issues faced by ICT professionals have not been turned into legalities and neither there are standard regulating bodies. Therefore there are very few laws pertaining to ethics. Still it can be said that the issue of ethical behaviour in ICT industry has started to be addressed. It is significant that the major element of this industry is under store which is the interest of the public.
In case, the code of ethics is kept up-to-date then the businesses can benefit by following these quotes. Almost each of the professional communities has defined code of ethics which is also termed as a code of professional conduct (Langford, 1997). In each and every circumstance, it is the benchmark which has to be followed by individuals of that industry. Similarly in the ICT industry, there are a few professional community is that even don’t have these cords so there have been questions raised regarding their efficiency.
The ethical issues are linked with filling the gaps which have been left by the regulatory bodies are legal bodies (Langford, 2007). Therefore ethical codes can be used as guiding principles for helping out the professionals to carry out their job in an ethical manner. The existence of the regulatory bodies is important because IT professionals might not necessarily respect ethics in general. The typical considerations are not dependent on one profession however these bodies can at least in force different laws for avoiding the ethical violations. Therefore a simple difference among laws and ethics is that laws have an authority of a governing body rather ethics don’t have such authority. This ethics are created on the basis of moral and cultural values. A few of the ethical standards are globally accepted. Similarly in case of ICT, it is globally accepted that piracy, hacking, theft of information on all unethical in nature.
Conclusion and recommendation
The ethical issues can be summarised as unemployment caused by innovation of ICT in different industries as many industries are becoming atomised and lay off has been happening. Government are encouraging people to get jobs however jobs are not getting created any further. These days there is Internet projection which takes care of ICT users so that computers get protected from getting hurt. The software safeguards the computer users when they are browsing the World Wide Web and prevention is necessary for them. There is a lot of knowledge being spread to people for not clicking the pop-ups because this can lead to hacking of their computer. The Michael Calce, the boy which has been discussed in the report was known as mafia boy because he was capable of hacking. However he wrote a book on how computer is so and secure despite of this Internet protection. There have been strict laws created against piracy and other issues linked with ICT. S seen in this report ICT can be utilised for ethical uses and it unethical uses. This is due to the risk of ICT being utilised for harming the people is a reality (Llorens-Garcia, Llinas-Audet and Sabate, 2009).
Ethical issues in ICT has existed in sex, criminal acts, or hacking, and it is also there in another regions of life (amusement, training, and so forth) It is hard to experience these awful ethical issues, however there are some approaches to avoid the awful effect, for example, Making the awareness among the ICT clients [esp. for kids below age of 18 years] by locking of the un-ethical behaviours’ websites.
References
Becker, L. and Becker, C. (2001). Encyclopedia of ethics. New York: Routledge.
Boettcher, J., Cavanagh, G. and Xu, M. (2014). Ethical Issues that arise in Bankruptcy. Business and Society Review, 119(4), pp.473-496.
Gasson, M., Kosta, E. and Bowman, D. (2012). Human ICT implants. Hague, The Netherlands: T.M.C. Asser Press.
Halimahton Shaari and Ismail Sualman (n.d.). Issues in media and communication.
Hercheui, M. (2012). ICT critical infrastructures and society. Berlin: Springer.
Išorait?, M. (2014). ICT and entrepreneurship: social network marketing. Entrepreneurship and Sustainability Issues, pp.19-29.
Kelsay, J. (1992). Book Review: A Bibliographic Guide to the Comparative Study of EthicsA Bibliographic Guide to the Comparative Study of Ethics. Edited by CarmanJohn and JuergensmeyerMark. New York: Cambridge University, 1991. pp. viii + 811. $100. Theological Studies, 53(3), pp.576-578.
Langford, D. (1997). Ethical Issues in Network System Design. Australasian Journal of Information Systems, 4(2).
Langford, D. (2007). Ethical Issues in Network System Design. Australasian Journal of Information Systems, 4(2).
Llorens-Garcia, A., Llinas-Audet, X. and Sabate, F. (2009). Professional and Interpersonal Skills for ICT Specialists. IT Professional, 11(6), pp.23-30.
McDermid, D. (2008). Ethics in ICT. Frenchs Forest, N.S.W.: Pearson Education Australia.
Oppenheim, C. and Pollecutt, N. (2000). Professional associations and ethical issues in LIS. Journal of Librarianship and Information Science, 32(4), pp.187-203.
Patton, K. (2010). Sociocultural intelligence. London: Continuum.
Quigley, M. (2008). Encyclopedia of information ethics and security. Hershey [Pa.]: Information Science Reference.
Soraj Hongladarom and Ess, C. (2007). Information technology ethics. Hershey: Idea Group Reference.
Suau-Jime?nez, F. and Pennock-Speck, B. (2011). Interdisciplinarity and languages. Oxford [etc.]: P. Lang.
Tavani, H. (2010). ICT ethics bibliography 2009–2011: a select list of recent books. Ethics and Information Technology, 12(4), pp.379-382.
Tavani, H. (2013). ICT ethics bibliography 2012–2014: a select list of recent books. Ethics and Information Technology, 15(3), pp.243-247.
Vaccaro, A. and Madsen, P. (2009). Corporate dynamic transparency: the new ICT-driven ethics?. Ethics and Information Technology, 11(2), pp.113-122.
Wankel, C. and Malleck, S. (2012). Ethical models and applications of globalization. Hershey, PA: Information Science Reference.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download