logo

Professional and Ethical Practise in Information Technology

Students are required to write a reflective journal based on the previous classes, including what they've learned, relevant concepts and theories, and how they will use the knowledge in the future as an IT professional.

4 Pages821 Words349 Views
   

Added on  2023-06-10

About This Document

This article discusses the importance of ethics in information technology and the ethical issues between IT workers and their employers and clients. It also highlights the need for security policies and procedures to protect against internet crimes.

Professional and Ethical Practise in Information Technology

Students are required to write a reflective journal based on the previous classes, including what they've learned, relevant concepts and theories, and how they will use the knowledge in the future as an IT professional.

   Added on 2023-06-10

ShareRelated Documents
Ethical Practises 1
PROFESSIONAL AND ETHICAL PRACTISE
by (Name)
Course Name
Professor Name
Institution
Institution Location
Date
Professional and Ethical Practise in Information Technology_1
Ethical Practises 2
According to the 4 weeks study, ethics are the moral principles, which guide and
determine how people execute their duties, relate with each other as well as with the
environment. They are the rights and wrongs firms or people must put into consideration,
when operating to avoid conflicts of interest. Therefore, it is clear that all firms stakeholders
for example managers, corporate ethics officers, employees must be ethical in their
operations and decision making process to ensure ethical programs are implemented
((Markham and Buchanan 2015).
Information Technology entails the use of systems such as computers to store, retrieve
and be able to send information from one person to another. However, there is increased
internet crimes globally aimed at enabling unauthorised people access certain information.
The perpetrators of these crimes include criminal doing it for financial gain, thrill seekers
wanting challenge, terrorist seeking to cause harm to the people or industries spies aiming at
getting competitive advantage in the market. The internet crimes such as cyber bullying,
identity theft, attack on computer systems, hacking, email spam and phishing, online frauds
have been on the rise increasing vulnerability of the users. Therefore, firms and people must
institute security policies and procedures such as install corporate firewall, antivirus software
and intrusion detection systems to protect both software and hardware from security breaches
by criminals.
Since the systems, deal with confidential and private information of the parties
involves, ethics for workers, and users are essential for regulation. The workers include the
programmers, database administrators, software engineers, local area network administrators,
chief information officers, who ensure that the systems are in the best working conditions.
They provide the software, hardware and services to the systems users at a certain cost. The
users include students, firms’ employees, and governments among other parties give the IT
workers their terms and afterwards compensate them for their goods and services.
Professional and Ethical Practise in Information Technology_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Issues in Information Technology
|4
|653
|74

Professional and Ethical Practice in the Workplace
|4
|729
|223

Development and Impact of Cyber Crime in Australia
|18
|2032
|273

Malicious Cyber Activities and Security Defences
|11
|3046
|39

Introduction to Cyber Crime Week 5
|6
|843
|323

Business Law Act Assignment
|12
|4119
|35