Wednesday, June 5, 2019

Misuse of Information Technology

Misuse of Information TechnologyINTRODUCTIONThe word IT stands for Information Technology and it is defined as a helping of engineering that contri butes in creating and playing fielding estimator systems and computer application as well as being part of telecommunication, helping to retrieve, store and transmit data. In this current term many a(prenominal) impossible things has been made possible with the help of Information Technology. In fact, many organizations argon computerized and they use information technology in many ways in their day-to-day routine. The use of IT has becomes part of everybodys life. Information technology has many norms and rules that one should follow and respect. This is where the ethical motive of information technology comes into action. Ethic is the reflective study of the general nature of moral values, sub judice and social issues. There are some rules to be followed and standard to direct and control conduct of an individual at professional level. Most of the professional organizations which deal with computing admit published their code of ethics.OBJECTIVEOne should study computer ethics because doing so allow shew individuals be rescue like responsible people. One should similarly study computer ethics as it testament keep the latter away from computer abuse and catastrophes. These can be done by studying the different code of ethics. A code of ethics is defined as a fashion to promote a variety of purposes and goals, in other words, it is a way to promote many motives.Misuse of Information TechnologyComputer crime is a very vast topic. It includes many mal functions by computer users. It is all about making bad use of information technology for personal bet or in order to create troublesome situation for others.Plagiarism is one aspect. It is passing off the work of other people as your own without fine-looking any credit to them. Piracy is a nonher topic deserving thinking about because people make a circ umstances of effort and spend lot of money to create or make something where other just make a copy of them instant of buying the original one. Crackers are basically attention who break into computer system and make illegitimate use of them. With the rapid evolution in Information Technology, the numbers of crackers are besides growing. It is very difficult to get hold of all these issues that is why we have some association running, aiming to reduce and stop these concerns.ethical motive from different perspectiveWhen lecture about ethics in information Technology, there are different issues that come in our mind. In order to deal with these problems, there are many associations that have been created and some of them have been mention below.Many professions have established professional societies which have adopted codes of conduct. For example, the medical profession established the AMA (American Medical Association), and the legal profession established the ABA (American Bar Association) (Tavani 2007, p.100). These both associations deal with code of conducts of their members. The Association for Computing Machinery (ACM) and the convey for Electrical and Electronics Engineers-computer society (IEEE-CS) are examples of professional societies recognized by the computing profession. The Association of Information Technology headmaster (AITP) deals with level of conduct for professional.Institute of Electrical and Electronics Engineers (IEEE)Here we leave behind be looking at the Institute of Electrical and Electronics Engineers code of ethics. The IEEE code of ethics contains ten general directives. The first four teach members to accept responsibility in making engineering decisions arranged with the safety, wellness and welfare of the public. The second command is to let alone difference of opinion wherever possible. The third instruction is to be fair(a) and the fourth is not to accept bribery. These four commands are same for both ACM and the I EEE code of ethics.The member of the IEEE packs to accept responsibility in making engineering consistent with the safety, health and welfare of the public. They also shoot to avoid real remainder of interest wherever possible. They need to be honest in their work and while handling the organizations data. A member of IEEE should support colleagues and subordinates in their happening and achievements.The IEEE code gives a list of categories for nondiscrimination, but does include anything that might be interpreted to include inner preference (Bowyer 2001, p56).The Association of Computing MachineryIn 1992, the ACM adopted a new code of ethic and professional conduct with supplemental explanation and guidelines. The ACM code of ethics consists of eight general imperatives, eight specific professional responsibilities, six organizational imperatives and two elements for compliance (Bowyer 2001, p.50).Here we are looking at a scenario where a member of the ACM has to implement gen eral moral. He get out have to contribute to the society. He will have to avoid harm to others he will need to be honest and trustworthy. He will have to be fare in his decision making and fair judgment. He will also need to respect property rights including copyrights and patents. He will have to give proper credit for knowledgeable property. He will need to respect the privacy of others, and he will also need to keep confidentiality.Now, we are looking at some more qualified duties, as an ACM computing professional, a member will have to work hard to achieve the highest level in both the development and outcomes of skilled works. He will need to obtain expert skills, which nub that he will need to show that he can perform skillfully. The member needs to know and respect the laws belonging to the appropriate profession. He will need to give performance review of computer systems and their impacts together with the analysis of possible risks as well as respect arrangement made and the inclined responsibilities. He will need to improve good understanding of computing. And finally he will get the opportunity to use computer and communicating resources but with authorization.Regarding the Organizational Leadership Imperatives, a member of the ACM will need to handle social duties of the members of an organizational unit and fully take over his responsibilities. The member also needs to practice personnel and resources to design and build information system that will raise the self respect of the member. He must ensure that the members, who are getting access to the computer system and those who will be affected, will have their needs clearly stated during the assessment. Afterwards the system must be formalized to such a level so that it satisfies all the needs. The ACM member should also create favorable circumstances for others in the organization to absorb conceit and bound of computer systems.There should be accordance with the code. The member of the Ass ociation of the Computing Machinery has to retain and boost the rules of the code. The member will also have to discreetness violation of this code unstable with membership in the ACM.The Software Engineering Code of EthicsThe Software Engineering code of ethics starts with a synopsis of eight general ethical rules. The eight views represent different areas of concern for the software engineer public, employer, product, judgment, management, profession, colleagues and self (Bowyer 2001, p.51). Computers have a role in industry, government, medicine, fostering and many more. Software engineers role start with the implementation part in the software life cycle where they deal with coding of the software systems. Software engineers have relative chances to perform well without causing harm. Together with the commitment, software engineers shall stick to the following code of ethics and professional procedure.The code contains definite rules related to the look of and decisions made. It is not expected that the individual parts of the code is to be used in isolation to justify errors. The code prescribes these as duties of anyone targeting to be or aiming to be a software engineer. The code is not a simple ethical procedure that brings ethical decisions. In some instances, the level could be in conflict with each other. Ethical conflicts can best be reported by considerate consideration of important rules, rather than blind confidence on guidelines. These rules should make a difference to software engineers to consider who is altered by their performance. In all these decisions, concern for health, safety and welfare of the public comes first, which means that the public interest is the most important.Software engineers shall perform reliably with the public interest. In other words, software engineers should be very loyal to their job. Software engineers shall act in a way that is best for their client and employer. Software engineers should also ensure that t heir outcomes meet the highest skilled standards possible.Association of Information Technology Professionals (AITP)The AITP code of ethics comes in two parts. One of which is the code of ethics and the second one is the standards of conduct. Sections of the standard of conduct are related to the members obligations to management.A member of the AITP code of ethics should be honest in all professional relations. He should be loyal and there should not be any kind of whistle blowing at any transmit in the organization. He should be ready to share his experience and knowledge with the other members. He should not take credit for work that he has not done, unless given permission. He should not take advantage of other members who lack experience or knowledge. The member should be up to date and he should have the skills required. Members should not make use of computer system for personal use.ConclusionThe whole idea here was to see how ethics have become part of information technolog y and what the implementations of those ethical codes are. The code of ethics discussed here are more of voluntary kind in other word there is no observance against disobedience. Discrimination based on sexual preference is still a major concern in the community these days. Licensing is another issue worth talking about because companies or individual tend to buy a computer program and then have it installed on different systems. This debate will never come to an end until your internal moral sense guide you to take a step forward for the welfare of the Information Technology society, as it is always said lead by example.ReferencesTavani,H. T., 2007. Ethics and Technology Ethical Issues in an Age of Information and Communication Technology. 2nd ed. United States of America Bruce Spatz.Bowyer,K. W. ed., 2001. Ethics and Computing Living Responsibly in a Computerised World. 2ne ed. newborn York The Institute of Electrical and Eletronics Engineers.Quinn, J.M. 2006., Ethics for the Inf ormation Age. 2nd ed. New York Pearson Education.BibliographyAdams A., McCrindle J. R., 2008, Pandoras Box Social and Professional Issues of the Information Age. West Sussex, England John Wiley.Baase S, 2009, A Gift of Fire Social, Legal, and Ethical Issues for Computing and the Internet. New Jersy Pearson Education.Spindello A. R., 1995, Ethical Aspects of Information Technology. New Jersy Prentice-Hall.Johson.D.G., 2009, Computer Ethics, 4th ed. New Jersy Pearson Education.Online Resourceshttp//www.cs.bgsu.edu/maner/ethicomp95/keynote3.pdf (last accessed 06.02.2010)http//www.bcs.org/server.php?show=ConWebDoc.2914 (last accessed 06.02.2010)http//www.southernct.edu/organizations/rccs/resources/teaching/teaching_mono/moor/moor_definition.html (last accessed 08.02.2010)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.