StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Ethics in Information Technology - Case Study Example

Comments (0) Cite this document
Summary
The moral issue at hand is the question of privacy - on both the sides of employers and employees. Employers have the right to privacy so as actual events that transpire inside the work area - especially the negative ones be not broadcast in the open so that it ruins the its reputation…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Ethics in Information Technology
Read TextPreview

Extract of sample "Ethics in Information Technology"

Download file to see previous pages For this case analysis, we will be employing Reynolds' seven-step process (Reynolds). But we will be starting from the options and analyze them one by one. The plausible courses of action that we're going to analyze are:
b. The government to directly pass a law prohibiting the uploading of files, videos, photos and anything by employees that tarnish the credibility of its current employers while prohibiting employers to use the internet as a basis for hiring.
The cases mentioned can be simply summarized to the use of the internet specifically the social networking sites such as Face book, YouTube and MySpace to publish videos that have tarnished the credibility of the companies. Now the question is are employers justified in monitoring their employees' posts in the social networking sites and make decisions about hiring, disciplining and discharging based on these posts
The stakeholders in this case are current employers, current employees, potential employees and potential employers. In the case of hiring, the people at stake are potential employers and employees. On the part of potential employers, this will give the much needed information more than what interviews and resumes can provide. Here the truth about the potential employee can be mined. Option #3 then would not be good. On the part of the employers this is like an invasion into their privacy and their personal life. Hiring on the basis of facts gathered from networking sites can then be negative. They would support option #3.
On the issue of employers uploading files that ruin he credibility or salability of the employers and their products, there are two options. Either that the government makes a direct law against that would be observed in all institutions(Options#2) or they allow the employers to make their specific rules (option #1) regarding this. The employers would find option #1 more favorable while the employees would most probably be indifferent between the two, depending on the weight of the rules and the weight of the consequences.
Considering the Consequences of Your Decision
Option #1 would profoundly benefit the employers. It will help them design rules that specifically fit their situation. If the government allows them to make their own rules and gets approved by the government, it means that whatever decisions they have, it will be backed by the latter. Negative publicities that actually ruin both the employers and other employees will now be eliminated thus contributing to the common good. Option #2 will also benefit the employers although the rules set by the government may not suit their specific needs. Thus, employers are better off with Option #1. On both options, the employees will feel restricted or may even feel violated although those who really do not intend violate it will be indifferent. As to option #3, potential employees will greatly be benefitted as they will have the right not to disclose information about themselves to their employers. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics in Information Technology Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Ethics in Information Technology Case Study Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1529586-ethics-in-information-technology
(Ethics in Information Technology Case Study Example | Topics and Well Written Essays - 1250 Words)
Ethics in Information Technology Case Study Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1529586-ethics-in-information-technology.
“Ethics in Information Technology Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1529586-ethics-in-information-technology.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethics in Information Technology

Sample Exam Solution in IT and Ethics

... real teeth to the IT professional’s codes of ethics: the code disciplinary provisions are merely as binding as the codes are, and these codes are not legally binding. As the environment of commerce produces ever further multifarious, especially in the development and provision of information technology, and more global, the need for one comprehensive code of ethics for IT professionals becomes even more advisable. With the Advent of more than a few formal codes of ethics ready by various IT professionals’ relations, a more harmonized approach seems to be called for (Allmon, 1990). Over the past two decades, the Information Technology (IT) field has gone through a transformation from simple number crunching activities, to centralized...
13 Pages(3250 words)Assignment

Business Ethics in the Case of Timberland-City Year

The purpose of this study is to focus on the ethical considerations and dilemmas faced by the organization Timberland in terms of its coalition to City-Year and the steps that are taken and should be taken for the solution of those ethical issues.

In the merger of the two organizations, Timberland and City Year, there are many ethical considerations. To develop legal business relationships between Timberland and City Year and to consider the stipulations of the required business laws, the following ethical considerations should be deemed:
  • None of City Year’s earnings should be incurred to any private shareholder or an individual.
  • City Year cannot participate in any political campaign or...
6 Pages(1500 words)Case Study

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Business Information Systems

...Club IT - Part Three of Phoenix BIS 219 Introduction to Business Information Systems Club IT – Part Three _________ _________ DATE ________ Table of Contents Table of Contents 2 Abstract 3 Overview 3 Business background 4 Current Technology Structure of Club IT 5 Problem Assessment 5 Club IT Business Goal and Strategy 6 Assessment of Needs 7 IT Solutions for Club IT 8 Decision Support Systems/ DSS 8 Customer Information System 8 Data Mining for Business Performance 9 Enterprise Resource Planning 10 Supply Chain Management 11 Customer Relationship Management 11 Conclusion 11 Bibliography 12 Abstract Club IT is a nightclub that is currently operating with the traditional technology structure. Club IT nightclub is most popular club in its...
8 Pages(2000 words)Case Study

Ethics in the Manufacturing Environment

An ethical scenario arose during my first six months in this management role involving a 21-year-old employee who I witnessed smoking pot in the parking lot over lunch break. This scenario demanded that I consider the needs of the employee, as well as satisfying my obligations for enforcing the strict drug use policy administered at the senior levels of the company. This project describes the ethical scenario in detail, offering personal reflections on the incident as well as suggesting an ethical framework for handling situations like this in the future.
The situation which occurred had a young worker smoking pot on his lunch break on the company grounds. This, according to policy, is a termination offense and it is expected...
7 Pages(1750 words)Case Study

Global Employee Information and Consultation: Replicating the European Model

...Global Employee Information and Consultation: Replicating the European Model INTRODUCTION The only way for the employees and their representatives to reach the level of multinational corporations is to create an effective transnational mechanism that facilitates consultation and information disclosure. The European model (EWC) is an example of an institution that intends to provide employees voice in the transnational arena. The information dissemination and consultation arrangement enable employee representatives to participate in discussing issues that pertains to their employment. However, there is a need to analyze whether EU style of legislating a mechanism shall be effective if replicated globally. The answer in part depends...
9 Pages(2250 words)Coursework

Conflict Between Researh and Ethics on the Tuskegee Syphilis Study

The Declaration of Helsinki by the WHO clearly states that in clinical trials involving humans the wellbeing of the subject should be of prime importance than the interest of science or society. This has been stated because at times in order to achieve the objectives of a study the investigators might overlook the welfare of the trial subjects thus jeopardizing their health in the process. According to ethical rules while comparing two treatment options the control group of the study must receive the best-known treatment available while the study subjects are given a potential newer treatment. Only when there is no effective treatment available a placebo-controlled group can be used for the study. There have been several trials th...
7 Pages(1750 words)Essay

Technology Flow

Technology flow has been facilitated by increased globalization and thus we can now import new machinery from anywhere in the world.
When productivity increases, companies are able to decrease the prices of their products which helps them gain a competitive advantage. This way other companies are threatened as their sales can decrease and thus their profits.
Therefore using new technology has become a hardcore requirement for every organization in order to compete. Quality of course matters and not just the prices, but with improved methods of production, companies can offer better quality with reduced prices. China is a great example to prove this thing. China with its improved methods and technology along with its chea...
6 Pages(1500 words)Assignment

Professional Ethics: Chemically-impaired Nurse

The outcome of the issue shall then be presented, and then followed by a presentation of an alternative resolution of this issue. A substantive conclusion shall be drawn from this discussion and evaluation.

The chemically-impaired nurse is a nurse who has a substance-addiction problem. These substances include drugs and/or alcohol. These nurses usually have impaired functions because of their addiction to drugs or alcohol and their nursing practice is often compromised as a result of their addiction (Ellis & Hartley, 2004). A study conducted by Sullivan and colleagues in the 1980s revealed that substance addiction problems are about as great as the percentage for substance addiction in the general population (as cit...
7 Pages(1750 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Ethics in Information Technology for FREE!

Contact Us