.

Wednesday, April 3, 2019

Misuse of Information Technology

Mis accustom of information TechnologyINTRODUCTIONThe word IT stands for randomness Technology and it is defined as a plane section of contribute that contributes in creating and studying computing device agreements and figurer application as hale as being part of telecommunication, admirering to retrieve, store and transmit data. In this current era numerous impossible things has been made possible with the help of Information Technology. In fact, many organizations argon ready reckonerized and they use development engineering science in many managements in their day-to-day routine. The use of IT has becomes part of everybodys life. Information engineering science has many norms and rules that one should follow and love. This is w present the ethics of information applied science comes into action. Ethic is the reflective study of the frequent nature of object lesson values, legal and affectionate issues. There are some rules to be followed and monetary standa rd to direct and control broadcast of an individual at tradeal level. nigh of the professional organizations which deal with computing pass on published their mark of ethics. objective lensOne should study computer ethics because doing so depart puzzle individuals be ache like responsible people. One should as headspring as study computer ethics as it allow keep the latter away from computer abuse and catastrophes. These can be done by studying the incompatible code of ethics. A code of ethics is defined as a means to promote a variety of purposes and goals, in a nonher(prenominal) words, it is a way to promote many motives.Misuse of Information Technology computing machine crime is a very vast topic. It includes many mal functions by computer users. It is all about making bad use of information technology for personal interest or in order to pee hard situation for others.Plagiarism is one aspect. It is passing off the survey of other people as your own without giving any character to them. plagiarization is another topic price thinking about because people run into a lot of effort and spend lot of money to create or make something where other just make a counterpart of them instant of buying the original one. Crackers are basically financial aid who break into computer system and make illegitimate use of them. With the quick evolution in Information Technology, the numbers of crackers are too growing. It is very difficult to get hold of all these issues that is why we have some association running, aiming to reduce and stop these concerns. ethics from different sideWhen talking about ethics in information Technology, on that point are different issues that come in our mind. In order to deal with these problems, there are many associations that have been created and some of them have been mention below. umpteen professions have established professional societies which have adopted codes of conduct. For example, the medical profession est ablished the AMA (American Medical Association), and the legal profession established the ABA (American Bar Association) (Tavani 2007, p.100). These devil associations deal with code of conducts of their fellow particles. The Association for Computing Machinery (ACM) and the Institute for Electrical and Electronics Engineers-computer hostel (IEEE-CS) are examples of professional societies recognized by the computing profession. The Association of Information Technology Professional (AITP) deals with level of conduct for professional.Institute of Electrical and Electronics Engineers (IEEE) here(predicate) we exit be sounding at the Institute of Electrical and Electronics Engineers code of ethics. The IEEE code of ethics contains ten general directives. The first four con members to accept responsibility in making engineering decisions legitimate with the gumshoe, wellness and welfare of the public. The second command is to let alone difference of whimsey wherever possible. The third instruction is to be honest and the fourth is not to accept bribery. These four commands are same for both ACM and the IEEE code of ethics.The member of the IEEE exacts to accept responsibility in making engineering consistent with the safety, health and welfare of the public. They also bespeak to avoid real passage of arms of interest wherever possible. They need to be honest in their work and while handling the organizations data. A member of IEEE should support colleagues and subordinates in their hap and achievements.The IEEE code gives a list of categories for nondiscrimination, but does include anything that might be interpreted to include sexual preference (Bowyer 2001, p56).The Association of Computing MachineryIn 1992, the ACM adopted a new code of ethic and professional conduct with supplemental explanation and guidelines. The ACM code of ethics consists of eighter general imperatives, eight specific professional responsibilities, six organizational imperati ves and cardinal elements for compliance (Bowyer 2001, p.50).hither we are looking at a scenario where a member of the ACM has to go across general moral. He will have to contribute to the society. He will have to avoid harm to others he will need to be honest and trustworthy. He will have to be fare in his decision making and fair judgment. He will also need to respect rightty rights including copyrights and patents. He will have to give proper credit for knowledgeable property. He will need to respect the retirement of others, and he will also need to keep confidentiality.Now, we are looking at some more qualified duties, as an ACM computing professional, a member will have to work hard to achieve the highest level in both the development and outcomes of masterful works. He will need to obtain expert skills, which means that he will need to build that he can perform skillfully. The member needs to know and respect the laws belonging to the appropriate profession. He will nee d to give process review of computer systems and their impacts together with the analysis of possible risks as well as respect arrangement made and the given responsibilities. He will need to improve good understanding of computing. And finally he will get the opportunity to use computer and communicating resources but with authorization.Regarding the organisational Leadership Imperatives, a member of the ACM will need to handle social duties of the members of an organizational unit and fully confine over his responsibilities. The member also needs to practice personnel and resources to design and build information system that will raise the self respect of the member. He must check out that the members, who are getting access to the computer system and those who will be affected, will have their needs clearly stated during the assessment. Afterwards the system must be formalized to such a level so that it satisfies all the needs. The ACM member should also create favorable circu mstances for others in the organization to absorb notion and bound of computer systems.There should be accordance with the code. The member of the Association of the Computing Machinery has to retain and boost the rules of the code. The member will also have to treat violation of this code liquid with membership in the ACM.The bundle program Engineering Code of EthicsThe packet Engineering code of ethics starts with a summary of eight general ethical rules. The eight views represent different areas of concern for the software engineer public, employer, product, judgment, management, profession, colleagues and self (Bowyer 2001, p.51). Computers have a role in industry, government, medicine, education and many more. Software engineers role start with the implementation part in the software life cycle where they deal with coding of the software systems. Software engineers have relative chances to perform well without causing harm. Together with the commitment, software engineers shall drum to the following code of ethics and professional procedure.The code contains definite rules colligate to the behavior of and decisions made. It is not expected that the individual parts of the code is to be used in isolation to justify errors. The code prescribes these as duties of anyone targeting to be or aiming to be a software engineer. The code is not a simple ethical procedure that brings ethical decisions. In some instances, the level could be in conflict with each other. honourable conflicts can vanquish be reported by considerate consideration of important rules, instead than blind confidence on guidelines. These rules should make a difference to software engineers to consider who is altered by their performance. In all these decisions, concern for health, safety and welfare of the public comes first, which means that the public interest is the most important.Software engineers shall perform reliably with the public interest. In other words, software enginee rs should be very trustworthy to their job. Software engineers shall act in a way that is best for their client and employer. Software engineers should also ensure that their outcomes meet the highest skilled standards possible.Association of Information Technology Professionals (AITP)The AITP code of ethics comes in two parts. One of which is the code of ethics and the second one is the standards of conduct. Sections of the standard of conduct are related to the members obligations to management.A member of the AITP code of ethics should be honest in all professional relations. He should be loyal and there should not be any kind of whistle blowing at any point in the organization. He should be ready to donation his experience and knowledge with the other members. He should not take credit for work that he has not done, unless given permission. He should not take advantage of other members who lack experience or knowledge. The member should be up to date and he should have the ski lls required. Members should not make use of computer system for personal use.ConclusionThe whole idea here was to see how ethics have become part of information technology and what the implementations of those ethical codes are. The code of ethics discussed here are more of impulsive kind in other word there is no communion against disobedience. Discrimination based on sexual preference is still a major concern in the community these days. Licensing is another issue worth talking about because companies or individual tend to buy a computer program and then have it installed on different systems. This knock over will never come to an end until your internal moral scent out guide you to take a step forward for the welfare of the Information Technology society, as it is always said lead by example.ReferencesTavani,H. T., 2007. Ethics and Technology Ethical Issues in an Age of Information and Communication Technology. second ed. United States of America Bruce Spatz.Bowyer,K. W. ed. , 2001. Ethics and Computing Living Responsibly in a Computerised World. 2ne ed. New York The Institute of Electrical and Eletronics Engineers.Quinn, J.M. 2006., Ethics for the Information Age. second ed. New York Pearson Education.BibliographyAdams A., McCrindle J. R., 2008, Pandoras Box Social and Professional Issues of the Information Age. West Sussex, England privy Wiley.Baase S, 2009, A Gift of Fire Social, Legal, and Ethical Issues for Computing and the Internet. New Jersy Pearson Education.Spindello A. R., 1995, Ethical Aspects of Information Technology. New Jersy Prentice-Hall.Johson.D.G., 2009, Computer Ethics, 4th ed. New Jersy Pearson Education.Online Resourceshttp//www.cs.bgsu.edu/maner/ethicomp95/keynote3.pdf (last accessed 06.02.2010)http//www.bcs.org/server.php?show=ConWebDoc.2914 (last accessed 06.02.2010)http//www.southernct.edu/organizations/rccs/resources/ teach/teaching_mono/moor/moor_definition.html (last accessed 08.02.2010)

No comments:

Post a Comment