logo

Security of The Cyber Database

   

Added on  2022-09-16

4 Pages774 Words17 Views
 | 
 | 
 | 
Running head: ORGANIZATIONAL ETHICS
Organizational Ethics
Name of the Student:
Name of University
Author Name
Security of The Cyber Database_1

1ORGANIZATIONAL ETHICS
1. Overview of Ethics
The case study reference that we get in the first section demonstrates various aspects of
moral behavior. These are moral sensitivity, moral judgment as well as moral motivation and
moral character. After understanding these aspects I learned the basic purpose behind
implementation of business ethics and how they occur in the workplaces. The case study helped
me to understand that in order to make moral assessments, the intention behind any action
needed to accomplish something needs to be understood. In fact, from the case study, it is also
evident that the possible consequences should also be clearly apprehended.
There is specific influence of definite skill sets that have a decisive role to play in
exercising the moral expertise. As identified from the case study, some of the important skill sets
are moral imagination, moral creativity, reasonableness, as well as perseverance (Ferrell 2016).
Lastly, in terms of basic understanding of ethics, it can be highlighted that there should be a
sense of awareness among the moral as well as ethical values, which helps the organizational
stakeholders to see through the issues as well as dilemmas. In order to avoid the ethical
dilemmas in the workplaces, the perception to think objectively as well as rationally is also
required. The case study also highlights that this needs a level of emotional intelligence.
2. Ethics for IT Workers and IT Users
The governments’ collects massive amount of data based on individuals as well as
organizations, and this information is collected for a variety of reasons. The IT professionals
need to do the same for a variety of reasons like national security, demographic data exchange,
strategic analysis, geopolitical analysis, and accuracy of tax collection and so on. However,
ethical issues arises as the IT professionals has the potential to use this data for fulfilling the
Security of The Cyber Database_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents