logo

Understanding Professional IT Practice and Ethics

   

Added on  2023-01-10

10 Pages2870 Words94 Views
Running head: PROFESSIONAL IT PRACTICE AND ETHICS
Professional IT Practice And Ethics
Name of the student:
Name of the university:
Author Note

1
PROFESSIONAL IT PRACTICE AND ETHICSUnderstanding Professional IT Practice and Ethics:
1. Introduction:
Information technology has been affecting various challenges in business. It has included
various copyright protections, accountability security privacy and intellectual platform. The different
considerations about the information ethics have been influencing the public policies, professional
practices and personal decision makings.
The present topic is chosen to understand how it has been creating the culture of
responsibility, trust excellence and integrity for using the resources. Further, the study is also useful
to analyze how ethics can promote privacy, unauthorized access to computers and confidentiality of
data for various networks of the computer. This is useful to evaluate the dishonesty and conflict.
In this study the rights and virtues, relativist and objectivist, consequentiality and deontology
approaches are demonstrated. Here each theory is described. Then they are compared and contrasted.
Moreover, various professional code of ethics and the different connection between the ethics and
codes are assessed.
2. Understanding rights and virtues:
2.1. Defining rights and virtue:
The rights include the conscious avoidance of harmful activities. This is done by embodying
various higher ethical standards. This includes the clearance of articulating and broadly disseminating
of the guidelines and policies of the organizations. It has been guaranteeing the equitable type of
services for every constituency. This has been including commensuration of the various IT principles
and standards (Burk 2016). Moreover, it is involved in solving addressing issues and differences. This

2
PROFESSIONAL IT PRACTICE AND ETHICShas also been including the nurture of sustainable relationships. These are including transcending and
respecting transactions.
On the other hand, virtue ethics has been suited ideally for controlling the complicated,
unpredictable and novel landscapes. This type of landscape of the emerging technologies that are
present (Kakabadse and Kakabadse 2017). However, an exclusive Western approach for virtue that is
insufficient and provincial. Further, the present technologies in global issues need corrective actions
around the political and cultural lines.
2.2. Comparing and contrasting rights and virtue:
However, unlike the rights, virtue has been describing various aspects that are distinct from
the moral challenges. It has been revolving across the controls, access of information and production.
As an IT business comprises of the privilege of the exclusive access, production and controlling of
some natural resources. The virtue, through necessary prohibits has been providing from various
usage of resources. This is in spite of any consent of the exclusive owners (Rothlin and McCann
2016). However, this has not been with the rights of digital information. The digital transformation
has been nonexclusory. This indicates that the IT business is theoretically comprising of similar
digital data. This is excluding the use from the others. The reason is that the copy of the digital
information coming from one origin o other in virtue has never been eradicating the rights. Unlike the
rights, the IT business can comprise of a similar digital object as it is copied indefinitely with less of
fidelity (Mason 2017).
2.3. Professional code of ethics:
The agent-based approaches have been deriving the philosophical foundations. It has been
coming from the theory of virtue ethics. The theory has been attracting the rise of interest from
different IT business ethicists. Further, the virtue in virtue ethics has been defined as the intended trait
of characters. In this way, the virtuous agents have been including the constant quest for finding the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Ethics: Analyzing the Ethical Implications of Application Accessing Data Without Users' Consent
|7
|1643
|344

ASSIGNMENT ON PROFESSIONAL AND ETHICAL PRACTICE
|4
|739
|25

Reflective Journal on Ethics of Information Technology
|4
|731
|324

Access and Interpret Ethical Practice in Real Estate
|14
|4788
|151

Retail Reward Programs: What’s the Price of Loyalty?
|10
|2359
|54

Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack
|5
|828
|74