StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Ethics: Some Dilemmas and Solutions for the Workplace - Research Paper Example

Cite this document
Summary
This paper aims to critically understand computer ethics in theory and in practice. As such, it will be divided into three parts. The first part will investigate the evolving nature of computer from being a tool of communication to being a venue for data generation, processing, and storage…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Computer Ethics: Some Dilemmas and Solutions for the Workplace
Read Text Preview

Extract of sample "Computer Ethics: Some Dilemmas and Solutions for the Workplace"

Introduction The rise of ‘information revolution’ has indeed altered various aspects of human life, from technological to socio-cultural. As highlighted in an online article entitled Computer and Information Ethics, the changes brought about by the Internet on commerce, employment, medicine, security, transportation and popular culture have consequently affected— in both good ways and bad ways — the interpersonal engagements and relations of people (Bynum 1). The emergence and continued development of computer ethics as a branch of applied ethics has been viewed as a response to the socio-cultural impacts of the Internet. By examining the nature and effects of the use of the Internet in familial relations, business transactions, and cultural formations, computer ethics hopes to provide specific guidelines on the proper utilization of the Internet based on philosophical and ethical tenets. Looking closely at the conceptual foundations of computer ethics, the same online article entitled Computer and Information Ethics stated that computer ethics has been used to refer to “applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks” (Bynum 1). In this light, this paper aims to critically understand computer ethics in theory and in practice. As such, it will be divided into three parts. The first part will investigate the evolving nature of computer from being a tool of communication to being a venue for data generation, processing, and storage. This will be followed by a concise review of the different definitions of computer ethics. The second part will summarize and analyze the six critical issues attributed to cyber ethics, and expose some practices that are being done to alleviate cyber ethics problems in the workplace. The last part will conclude the discussion by offering some insights on the future of cyber ethics in the professional set-up. In the end, this paper aims to reinforce its thesis that the key to solving computer ethics issues at the workplace lies on a proper understanding of the evolving nature of computer and the characteristics of problems being encountered. A. The Evolving Nature of Computer and Computer Ethics Definitions 1. Evolving Nature of Computer Studying the nature of computer from a functional perspective is helpful in attaining a holistic understanding of its purpose in human life. In this regard, another online article entitled Reason, Relativity, and Responsibility in Computer Ethics, identified two major characteristics of a computer: logically malleable and ‘informationally’ enriching (Moor 23). Firstly, computers are deemed logically malleable as they can be “manipulated to do any activity that can be characterized in terms of inputs, outputs, and connecting logical operations (Moor 23)”. Such manipulation, as the same article opined, can come either as syntactic or semantic: syntactically, the actions of a computer can be changed by rectifying its programs; semantically, the various states of a computer can be used to represent any happening (Moor 23). Secondly, computers are also deemed ‘informationally’ enriching because of the many users that the computer is able to provide to its users. Once in place and fully functional, a computer can be used to enhance the capabilities and improve the performance of a given program (Maner 2). As such, “computerized activities become informationalized, that is, the processing of information becomes a crucial ingredient in performing and understanding the activities themselves” (Moor 24). Such characteristic of being ‘informationally’ enriching reinforces the idea that the Internet and other computer technologies have indeed transcended its functional properties by being a vital part of performing an activity. This, later on, led to the acknowledgement of ICT as an informational phenomenon (Moor 24). Thus, it can be claimed that the various enhancements in the Internet have provided a venue for data generation, processing, and storage which turned modern-day living more effective and efficient. 2. Computer Ethics Definitions The ‘creational’ and ‘transformational’ natures of ICT have influenced the development of computer ethics. As such, different definitions of computer ethics have arisen to stress—in varying degrees and in numerous circumstances—the importance of the proper use of the Internet. The previously mentioned online article entitled Relativity, and Responsibility in Computer Ethics has given varied yet individually significant definitions on the said topic. For the article’s author James Moor, “Computer ethics has two parts: (i) the analysis of the nature and social impact of computer technology and (ii) the corresponding formulation and justification of policies for the ethical use of such technology” (Moor 26). Such viewpoint that stressed on the vitality of linking responsible usage with computer functionalities has been echoed by another author named Debra Johnson. She opined that computer ethics is a field “which studies the way in which computers 'pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms” (Moor 17). Terrell Bynum, on a different light, foresaw the future of human interactions and engagements that will be mediated by ICT. This is why he regarded computer ethics as a discipline that “identifies and analyzes the impacts of information technology on such social and human values such as health, wealth, work, opportunity, freedom, democracy, knowledge, privacy, security, self-fulfillment, etc.” (Moor 19). Lastly, another famous researcher named Abdullah Kuzu defined computer ethics as a “dynamic and complicated field of study involving facts, concepts, policies and values regarding rapidly increasing computer technologies” (Kuzu 99). In all of these definitions, it could be pointed out that computer ethics has allowed for a clearer focus on human endeavors that are influenced or directed by the use ICT, as hinged on the premise that computers play a pivotal role in decision-making processes such as sending an e-mail, writing a program script, creating a database, generating graphics, and designing software (Kuzu 92). B. Common Issues Surrounding Computer Ethics at the Workplace Having discussed the evolving nature of ICT and its relation to the dynamic changes in computer ethics definitions, this part will now take a closer look at the various issues that surround computer ethics at the workplace. 1. Computer Crime Computer security has become a topic of concern in computer ethics given the number of computer ‘viruses’ and international spying by ‘hackers’. As highlighted in the online article entitled Introduction to Computer Ethics, computer crime problems could be divided into five aspects: privacy and confidentiality; integrity; unimpaired service; consistency; and controlling access to resources (Herold 1). In essence, it can be claimed that malicious kinds of software such as ‘viruses’ not only destroy computer systems but also post threat to the company’s overall security. ‘Worms’, for example, can disrupt certain operations by making the accompanying IT systems less efficient. Other known variations of ‘viruses’ include ‘Trojan horse’, ‘logic bombs’, and ‘rabbits’. ‘Hackers’ may also be regarded as a major risk to computer security as they usually break into the company’s IT system without permission to either steal confidential data or destroy its current operations (Herold 1). While some of these ‘hackers’ claim that they are merely ‘exploring’ the company’s systems, such activity is still an invasion of the company’s right to privacy, and therefore merits specific sanctions as stated by the law. 2. Privacy and Anonymity Another essential issue surrounding computer ethics at the workplace is privacy and anonymity. As captured in the same online article entitled Introduction to Computer Ethics, “the ease and efficiency with which computers and computer networks can be used to gather, store, search, compare, retrieve and share personal information make computer technology especially threatening to anyone who wishes to keep various kinds of “sensitive” information (e.g., medical records) out of the public domain or out of the hands of those who are perceived as potential threats” (Herold 1). This glaring issue on right to privacy is continually being hampered by the rapid commercialization of ‘invasive’ technology that can easily access confidential documents of companies. Indeed, the increasing ‘user-friendliness’ of potentially harmful software challenges the right to privacy of companies. As more practitioners and philosophers pondered on this issue, it became clear that companies are first and foremost responsible in determining its restriction policies on data accessing and gathering. As perfectly captured in the previously stated article, “an adequate definition of privacy, therefore, must take account of privacy in public” (Herold 1). In connection to the issue on privacy, it can be said that anonymity can also post harm to the company as virtually anyone can use the power of privacy to either obtain confidential company information or discuss sensitive companies without being tracked. For the worst part of it, anonymity can be used to facilitate unwanted and undesirable computer-aided activities in the Internet (Herold 1). 3. Intellectual Property The issue of intellectual property can be discussed in relation to software- or process- ownership. For its proponents, intellectual property in the form of software- or process- ownership is meant protect the company’s right in being able to solely benefit from their financial and operational investments. However, for its critics, information should be free for all, and software and other programs should be available for copying, studying or modifying by anyone who intends to do so (Herold 1). To address these two opposing schools of thought, practitioners have claimed that software should not be ownable, but ‘casually-copying’ parts of a personally-owned program could be. In the case of a company, while its software programs are provided (and therefore owned) by a third-party agency or firm, it can still have the right to certain aspects of the software program such as: “the “source code” which is written by the programmer(s) in a high-level computer language like Java or C++; the “object code”, which is a machine-language translation of the source code; the “algorithm”, which is the sequence of machine commands that the source code and object code represent; and the “look and feel” of a program, which is the way the program appears on the screen and interfaces with users” (Herold 1). 4. Professional Responsibility The issue of professional responsibility in the context of computer ethics talks about the expected conduct of computer professionals given their power to influence or alter the company’s business operations through the software they build. In this regard, given the number of professional relationships that computer professionals may find themselves part of, they have to be fully aware of conflicting interests and how to avoid them. In maintain professional integrity, “Professional organizations in the USA, like the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronic Engineers (IEEE), have established codes of ethics, curriculum guidelines and accreditation requirements to help computer professionals understand and manage ethical responsibilities” (Herold 1). 5. Globalization The continued rise of globalized networks like the Internet has reinforced the need for a timely and highly relevant computer ethics, one that not only develops mutually agreed standards of conducts, but also advances and defends human values in a more globalized context (Herold 1). In ‘globalized computer ethics’, some of the basic topics being confronted are, firstly, the possible creation of global laws that will not only protect people’s freedom of speech, but would also alleviate certain acts that intend to abuse it such as pornography, cyber-bullying, and identity theft. Secondly, global cyber businesses are also being enhanced and protected through the launch of technological infrastructure that caters to both entrepreneurs and customers. C. Some Solutions of Resolve Issues on Computer Ethics At this point, it is now vital to focus the discussion on some of the proposed solutions in managing issues on computer ethics. Specifically, this part aims to explain the proposed solutions in connection to specific problems concerning computer ethics. Firstly, as regards intellectual property problems, the online article entitled Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions claimed that they can be solved by legal sanctions or by individual precautions. As for the legal sanctions, strict implementation of intellectual property rights and buying of copyrights are deemed as possible solutions. As for individual precautions, some of the solutions include generating a mutual structure, using digital signatures, using hardware and software security applications with precaution, and acknowledging the source of the information (Kuzu 99). Secondly, as regards accuracy problems, the same article claimed that since incorrect information are common in the Internet as caused by the ease of information publishing and insufficient control, some of the solutions forwarded involve: (1) adopting a critical and interrogating perspective to maintain control of data; (2) generating legal sanctions for dissemination of inaccurate or false data; and (3) advocating the use of trusted third party web designers and data analysts (Kuzu 101). Thirdly, as regards privacy problems, the same article purported that the unauthorized access to company information and uninformed surveillance of IP addresses can be resolved by security precautions such as: (1) using advanced ciphering methods; (2) using security software; and (3) eliminating the storage of personal information in the Internet. Lastly, as regards accessibility problems, the same articled stated that this could be resolved through: (1) economic precautions that tackle the development of freeware and free access to databases; and (2) institutional solutions that support for access through increase in bandwidth and the improvement of IT infrastructures. Conclusion In conclusion, it can be said that computers are tools that could either be used for the benefit or disadvantage of a society. Given the massive influence of computers in influencing modern human affairs today, there is indeed a need to develop timely and highly relevant computer ethics that will properly monitor and evaluate all forms of cyber activity. In the end, the fostering of a healthy online environment lies on the hands of both the companies and their customers. As claimed in the article Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions, computer ethics must be viewed from both the customers’ and clients’ perspectives: “from the customers’ view, they should receive software which does not cause harm and has been used to meet the user's requirements”. Bibliography Bynum, Terrell. Computer and Information Ethics. Stanford Encyclopedia of Philosophy, Oct. 2008. Web. 1 Apr. 2013. . Herold, Rebecca. Introduction to Computer Ethics. Auerbach Publications, 2011. Web. 1 Apr. 2013. . Kuzu, Abdullah. Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. The Turkish Online Journal of Educational Technology, Apr. 2009. Web. 1 April 2013. . Maner, Walter. Unique Ethical Problems in Information Technology. Science and Engineering Ethics, Apr. 1996. Web. 1 April 2013. . Moor, James. Reason, Relativity, and Responsibility in Computer Ethics. Computers and Society, Mar. 1998. Web. 1 Apr. 2013. < http://www.blackwellpublishing.com/content/BPL_Images/Content_store/Sample_chapter/9781855548442/CEAC01.pdf>. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Ethics: Some Dilemmas and Solutions for the Workplace Research Paper”, n.d.)
Retrieved from https://studentshare.org/management/1403933-computer-ethics-some-dilemmas-and-solutions
(Computer Ethics: Some Dilemmas and Solutions for the Workplace Research Paper)
https://studentshare.org/management/1403933-computer-ethics-some-dilemmas-and-solutions.
“Computer Ethics: Some Dilemmas and Solutions for the Workplace Research Paper”, n.d. https://studentshare.org/management/1403933-computer-ethics-some-dilemmas-and-solutions.
  • Cited: 1 times

CHECK THESE SAMPLES OF Computer Ethics: Some Dilemmas and Solutions for the Workplace

The Good, the Bad, and Your Business

In the increasingly competitive business environment, managers are continually faced by tough situations and ethical dilemmas that need to be dissected with utmost caution if their businesses are to survive.... While ethical dilemmas remain unsolved, employee morale can plummet, productivity can drop off, business competitors can take a large proportion of your profits, and dissatisfied customers can free (Seglin, 1999).... Seglin wrote the book, The Good, the Bad, and Your Business to give business managers some useful insights on how to conduct their businesses more efficiently and navigate through their everyday moral business dilemmas....
13 Pages (3250 words) Essay

Training in ethics for management personnel

The dilemma for managers is how to balance the need to produce profits for shareholders with honest business practices, safety in the workplace, and environmental and social concerns.... The globalization of businesses and diversity in the workplace have also contributed to the complication of ethical issues because of different government laws that define the limits of criminal behavior.... An ethical workplace environment is characterized by properly exercised discretion, and ethics training is a step toward corporate compliance (Today's Marketer, 2008)....
5 Pages (1250 words) Essay

The Interaction of Modern Computer Technologies

otably, computer ethics is significant and interesting since computers play special roles in modern society.... Moor defines computer ethics as “the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology” (1).... In absence of computer technology, we would not have computer ethics in society.... Indeed, computer ethics focuses on personal and societal policies for the ethical use of computer technology....
6 Pages (1500 words) Essay

Ethical dilemmas in Workplace

If in case you are a sole proprietor without anyone to consult, try to look out for somebody whom you can trust from any business networking group, former employer or former college mate so as to get some insight from them.... The third condition is that no matter the choice of action, some ethical principles should be compromised i.... In order to determine what constitutes an ethical dilemma, it is important to make the necessary distinction between ethics, morals, values, laws, and policies....
6 Pages (1500 words) Assignment

Life Balance Ethical Dilemma

ver the last 20 years, the hour's people spend at the workplace has raised steadily.... nbsp; Traditionally, business ethics is focused on the morality of the action.... This paper 'Life Balance Ethical Dilemma" focuses on the fact that today most of the people have 50- and even 60-hour workweek and as a result, they spend less time at home with their families....
7 Pages (1750 words) Essay

Business Ethics - Ethical Theories and Their Application in Business

nbsp; Likewise, if we consider that an organization has done wrong, we need some real basis from which to argue our situation.... This paper under the headline "Business ethics - Ethical Theories and Their Application in Business" focuses on the fact that the study of business circumstances, actions, and resolutions where subject matters of right or wrong are dealt with (Crane and Matten, 2007, p.... The other one is ethical relativism, which claims that ethics is context-reliant and subjective....
11 Pages (2750 words) Case Study

Salama Company: Guide Safety and Environmental Issues at the Workplace

… The paper "Salama Company: Guide Safety and Environmental Issues at the workplace ' is a great example of a case study on environmental studies.... The paper "Salama Company: Guide Safety and Environmental Issues at the workplace ' is a great example of a case study on environmental studies.... However, at certain points of establishing projects aimed at reducing environmental hazards at the workplace, employees, as well as, management often presents resistance to professionals and government officials affiliated to the department of environmental health....
11 Pages (2750 words) Case Study

Study of Web Use and E-Mail Based on Ethics, Policy and Law in Information Security

bjectivesTo address information security component in terms of policies, Ethics, or LawsTo come up with technologies or research solutions.... Security, privacy, and ethical dilemmas dominate our daily lives.... This report "Study of Web Use and E-Mail Based on ethics, Policy and Law in Information Security" presents the rising issue of malicious digital risks basing on a legal and ethical perspective.... hellip; The aspect of information ethics in an organization and information is management depends on ethics....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us