This document discusses the ethical issues in IT, focusing on a case study where a security hole in a database system is ignored by the manager. It explores the ACS Codes of Professional Conduct and analyzes the situation using ethical theories such as utilitarianism, deontology, virtue ethics, and contract theory.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.