MGT7019+IT+Code+of+Ethics


 * Assignment:**

Critique the ethical Use of Information Technology:
Ethical challenges relate to environs like fraud, right to privacy for consumers, social responsibility, and trade restrictions. For Information Technology (IT) specifically, these ethical concerns can translate into considerations on how technology is used to violate people’s privacy, how automation leads to job reductions, or how management information and its corresponding systems are used and abused for personal gain.

Using the Brooks (2010, October), The Development of a Code of Ethics: An Online Classroom Approach to Making Connections Between Ethical Foundations and the Challenges Presented by Information Technology article, provide your academic opinion on the topics of societal ethical changes caused by information technology, the ethical usage of information technology, and the development of a code of ethics associative with these ethical issues. Your answers should not simply be your opinion. Provide at least two academic, peer-reviewed, citations and references that you can cite as academic research resources that validate your answer.

Initiate your paper with a problem statement; The problem to be investigated is _. Length: 5-7 pages


 * **MGT7019-8 ** ||  ||
 * **Ethics in Business ** || = **5 The Development of a Code-of-Ethics: IT Challenges** = ||
 * Stephen **
 * I am glad you found the discussion of plagiarism “the most fun.” You treated it in a very solid fashion and certainly raised a lot of issues about problems with paraphrasing and problems with copying information from internet sites. I have found that most students that I work with either don’t understand the serious ramifications of being charged with plagiarism or understand the issues from APA 6th generation involving “self plagiarism.” The other thing that is happening widely is that students are pulling assignments from other language sources (e.g. Spanish) on certain topics, saving these to English, and then submitting them. Turn It In and Safe Assign do not have these documents in their data base so the student’s paper comes back with a 0 or a very low % score. It is amazing what some people can think of to beat the system. **
 * I am not sure what you meant by asking “if I was testing your scholarship?” Believe it or not, I do like to do that because I have found I have always learned more or done better when I was “stretched” or “challenged” and had to really “knuckle down and work on something.” The funny thing is I was actually trying to give you a compliment about the nice job you had done on the Michael Novack assignment. In a lot of ways, it has proven to be a difficult assignment for students to understand. I was very pleased with the quality of your paper. **
 * As far as contributing to a replacement for the Brooks paper, we could probably do that together since I am one of the subject matter experts for a dozen of these classes. NCU has internal polices and procedures on how this gets done and how is qualified to make or recommend changes. I would be more than happy to work with you on something like this. **
 * Please keep up the good work. **
 * Please keep up the good work. **

=**The Development of a Code-of-Ethics: IT Challenges**= The problem to be investigated is three-fold; to delineate the areas that need addressing between Information Technology (IT) and ethics, to describe the ethical use of IT, and the wider scope of whether a code of ethics for the Information Technology field would be worthwhile. In this paper the author’s academic opinion has been sought with validation from academic, peer-reviewed references, and both will be provided.

Societal Ethical Changes Caused by Information Technology
In the reading assignment four principle areas of focus were identified as issues of concern for managers of technology, and were also the locus of attention in the Information Resources Management Association’s (IRMA) 2007 conference. These four topics include “ security, privacy, intellectual property and electronic monitoring of employees ” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Cone, 2008, para. 7; Brooks, 2010, p. 2, not properly quoted in the later <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). This paper will address each of these areas and identify the ethical challenges presented by each.

<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Security of Data
<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">The first of the topics associated with management concern regarding information is the ability to store the data in an efficient manner, while restricting that data to only those individuals and groups that should have access. Each week the news reports of some hacker accessing information they should not be able to access, and then publishing it, deleting it, or modifying it. This is the issue of data security. Today’s information and data are either stored in files, or inside of databases. As the world’s, and business’s, usage of computers has become more standardized, and entered into Moor’s (2005) “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">power stage,” more “understand how to use it or can benefit from it by relying on people who do understand and use it <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 112 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) driving further implementation. Because of the now ubiquitous nature of internet access – whether that access be through a “wired” or a “wire-less” network connection, it becomes more and more difficult to restrict access to information without a fully planned, designed, and implemented security implementation to protect data from outside encroachment. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Unfortunately, hacking is not necessarily always an outside threat. Brooks (2010) mentioned a systems administrator who copied a manager’s “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">unencrypted spreadsheet of salary information <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Harbert, 2007, para. 24; Brooks, 2010, p. 9, not properly quoted in the later <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) because he could. Several studies have shown that this is not a unique situation, and that about one-third of IT workers admitted to accessing privileged information by using their administrator passwords ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Brooks, 2010, p. 5 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). As Harbert states “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">IT employees have privileged access to digital information, both personal and professional, throughout the company, and they have the technical prowess to manipulate that information <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">para. 6 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">), which increases the possibility of abuse from within. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">The final issue of data security is the possibility that the data that is presented on the internet may not be correct, or it could be incomplete. This makes trusting information outside of a published, peer-reviewed, and vetted source difficult. This is fostered by the ease with which information can be shared on the internet, with little to no means of controlling whether the information so presented is valid and verifiable truth, opinion, or fiction masquerading as truth. “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">Information might be used to mismanage people’s lives, particularly when the party using inaccurate information has more power and authority <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Kuzu, 2009, p. 92 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">).

<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Privacy
<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Moor (1990) stated: “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">The concept of privacy seems so obvious, so basic, and so much a part of American values, that there may seem to be little room for any philosophical misgivings about it <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 69 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). He then provides the philosophical groundwork of what privacy is, and explores whether it can be defended by philosophy. In terms of IT, privacy usually is taken to mean the expectation that what is personal, and belonging to a certain person, group, organization, or company should remain in that context, unless freely disclosed or shared by the same. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">The conflict with privacy in the IT arena usually takes two paths. In one case privacy is infringed because one is working, and it is the expectation of the employer that one’s endeavors will be to favor the employer, i.e., to be productive. This topic will be covered in the section below entitled “Electronic Monitoring”. The adage that knowledge is power is the other temptation for privacy infringement. Kuzu (2009) identified that since information is easy to control, communicate, process, store and retrieve, “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">and the increased value of information in. . . decision-making might lead decision makers to try to acquire our personal information by invading our privacy <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif;">p. 92 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">).

<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Intellectual Property
<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">As noted earlier, the current capabilities of computers, networks, storage facilities, and ease of communication make it possible to share almost anything with anyone. This can be especially troubling, if this information is patented, copyrighted, trademarked, or in any other way identified as the specific property of an individual or organization. Unlike products that one may go to the store to buy, intellectual property represents intangible information. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">There are two possible ethical issues in regards to the protection of intellectual property. In one example, a disgruntle employee because of their access and the ease of transmitting information sends “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">a company’s trade secrets outside the organization <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Al-Rjoub, Zabian, & Qawasmeh, 2008, p. 189 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). The other possibility is that an employee uses corporate resources to access and potentially infringe on the intellectual property of another, by downloading music, or videos from sites that allow access and sharing of these files. As noted by Jennings (2010), a company can be held liable for the actions of its employees while using work computers.

<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Electronic Monitoring
<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Jennings (2010) gave several reasons why businesses monitor their employees. Among these she listed “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">internal theft, liability for harm to customers, [and]. . . customer service <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 177 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). Al-Rjoub, Zabian, & Qawasmeh (2008) recognized that monitoring can take three forms: (1) “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">Focus on performance <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">”, (2) “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">Focus on employee behavior <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">”, and (3) “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">Focus on employee characteristics <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 190 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). Each of these categories implies more intrusive monitoring. At which point does the right of an employer to ensure productivity and a fair trade of work for an employee’s salary cross the line into an infringement of the employees’ privacy?

<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">The Ethical Usage of Information Technology
<span style="display: block; font-family: 'Times New Roman',Times,serif; font-size: 120%; text-align: left;">In this section the author will express his opinion regarding the ethical usage of information technology, based on the information discussed in the previous section. In addition, he will discuss an additional area which seems to be the largest challenge of using information technology, which is in the use of other people’s thoughts, opinions and research with cursory or no mention of the original author. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">It has been demonstrated that employees are willing to allow monitoring of their work behavior in order “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">to improve their behavior in the work and to improve the relationship between the employees themselves to make the work environment more peaceful and more welcome <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Al-Rjoub, Zabian, & Qawasmeh, 2008, p. 194 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). Studies have also shown that too much monitoring can have negative results including fear, mistrust, absenteeism, poor employee morale, emphasis on speed, or quantity over quality, and increased physical symptoms due to stress ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 191 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). <span style="display: block; font-family: 'Times New Roman',Times,serif; font-size: 120%; text-align: left;">In the research for this paper, the author found several pieces of information in the Brooks (2010) article that were of enough interest for him to retrieve the original article referenced and apparently paraphrased by Brooks. The use of another person’s thoughts or research is acceptable in an academic paper, on a web log entry, or in electronic mail, but it should be accompanied with some reference that the work or thought is not wholly one’s own. If it is a direct quote taken from someone else it is the usual practice, regardless of the medium, to insert it into quotes. This is one of the biggest problems of communicating information over the internet is that there are too many who express opinions and thoughts – not their own – without proper reference. For example in Brooks, she writes: <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">At //the 2007// conference of the Information Resources Management Association, Amoroso co-chaired a track entitled “Social Responsibility in the Information Age.” Topics included security, privacy, intellectual property, and electronic monitoring of employees, along with more familiar corporate concerns like diversity. Such issues are not just technology problems with regulatory and legal compliance implications; they are ethical concerns that say something important about the people who deal with them daily, and about the corporate culture in which they work. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;"> ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 2, italics added to represent the differences between Brooks article and original Cone (2008) article that she cites. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) <span style="display: block; font-family: 'Times New Roman',Times,serif; font-size: 120%; text-align: left;">It would appear that Ms. Brooks only got the title of the track from Mr. Cone because of the quotes, when in fact she copied three whole paragraphs from the article without identifying that she was quoting the original material. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">One would assume that Brooks may have made an innocent mistake, except that when she paraphrases the Harbert (2007) article, she writes: <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">What Bryan found on an executive’s computer //several// years ago still weighs heavily on his mind. He is //extremely// troubled by //the male employee// he discovered using a //corporate computer// to view pornography of Asian women and of children. This male employee was later promoted and moved to China to run a manufacturing plant. “To this day, I regret not taking that stuff to the FBI,” says Bryan. //This// happened when Bryan was IT director at the U.S. division of a $500 million multinational corporation based in Germany <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;"> ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 4, italics added to represent the differences between Brooks article and original Harbert (2007) article that she cites. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">The following paragraph is almost exactly the same in both cases, although not quoted in Brooks, merely cited. This author found one additional article regarding ethics education in information technology of particular interest. The following paragraphs were written in both articles (with the differences noted in italics): <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">//According to Vitolo and Brinkman (2007)//, teaching ethics is not about teaching right versus wrong; //teaching ethics// is about teaching informed discernment, conscientious decision making, and balanced living. //This brings forth the question//: Should teaching these behaviors be the domain of higher education? <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">For many years and in many institutions – //unfortunately//, even today – the teaching of ethics has not been embraced as part of the charge of higher education. However, as society has had to assimilate technology and as //society and today’s organizations// have had to face the repercussions of unethical and illegal behaviors, one questions the ethical training of the professionals making the decisions. Since these professionals are the products of higher education, many institutions and accreditation boards are requiring their students to have exposure to ethical philosophy. <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">//According to the literature, it has been noted that// students in the technical fields may not benefit from a purely philosophical //course// presentation of ethics. //As validated in a recent study//, introducing the ethical dilemmas associated with real-life decisions about //information// technology can be very //influential and eye-opening// to the student. While institutions have always been teaching students how to debug technology problems, institutions also need to teach students how to debug ethical decisions – to become aware that ethical decisions are also technology problems to be analyzed, understood, and appropriately resolved <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;"> ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Vitolo & Brinkman, 2007, abstract; Brooks, p. 7 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">The author also only looked up the three references cited above and wonders what he would find if he had referenced all of them. That there are issues that need to be dealt with because of the power that IT presents to the world is beyond argument. This author, however, finds it difficult to seriously entertain the entreaty of another academician regarding the establishment of a code of ethics for the Information Technology profession, who does not adhere to her own.

<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Developing a Code of Ethics
<span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Would establishing a code of ethics for IT professionals be useful for the development of the field? Currently there is no consistency regarding policies, or even the very definition of ethics in IT. Another difficulty pointed to by many authors is that because the field is varying and advancing so rapidly, it is challenging to remain apace. “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">Computer technology, because of its logical malleability and diverse applications, can produce policy vacuums in larger quantities than other technologies and hence computer applications raise great challenges for applied ethics. Computer ethics is special, if not unique, in this sense <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Moor, 2001, p. 91 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). So, there is the possibility that we could establish a code of ethics that has large holes, or no answers for us in some developing areas, which means that many may “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">continue to muddle through ethical dilemmas on their own and wrestle with their consciences afterward <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Harbert, 2007, para. 26 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">In regards to company policies regarding appropriate use of IT, it has been shown by Young (2010) that a four-part implementation receives better acceptance than the threat of termination. She suggests that a company should define “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">permissible workplace uses of the internet <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” as well as “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">specifically set out prohibited uses, rules of online behavior, and access privileges. Penalties for violations of the policy, including security violations and vandalism of the system, should also be covered <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 1469 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). She then found that it is better if this is followed by training which “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">can effectively communicate and update policies to employees <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 1469 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). Training was also emphasized by Kuzu’s (2009) findings, that “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">after training was given to participants, it was revealed that participants’ judgments regarding ethical dilemmas were more constructive. . . [perhaps] increasing participants’ theoretical and practical knowledge and helping them to solve ethical dilemmas in a more constructive way <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 93 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). Following training, Young identifies that enforcement of the policy is required. Proper technology and implementations must be put into place to ensure that the employer can identify violators of the policies. Finally, it was found that rather than automatic termination, it may be more beneficial to have a plan of rehabilitation in place to mitigate “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">a climate of fear, distrust and resentment in the workplace that [may] undermine productivity and cooperation among those workers who are using their internet accounts properly <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 1470 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). She noted that this rehabilitation should include factors like: <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">How long has the abuse occurred? Is the abuse just a one-time event or is the abuse chronic? How long has the employee been employed with the firm? Has the employee’s internet misuse significantly reduced his or her job performance? [And,] what is this employee’s work history? <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;"> ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 1470 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">It is essential for corporations to have policies that are enforceable and policed to protect them from litigation and employee misuse, and “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">ideally corporate policy takes over where the law stops, governing workplace ethics to clear up gray areas and remove personal judgment from the equation as much as possible <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Harbert, 2007, para. 11 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">A code of ethics for IT professionals would allow for a standard outside of corporate policies. If a policy did not cover a situation or scenario, the code of ethics would. Brooks (2010) argues that, <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">Developing and maintaining a code of ethics specific to the IT profession is essential to the creation of a culture that fosters trust and a commitment to responsibility, honesty, corporate integrity, and personal integrity while abstaining from conflicts of interest and perceived improprieties. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;"> ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 10 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Others argue that “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">the concept of computer ethics should not be examined within the framework of [IT]-related professional ethics. Rather, it should be examined within the framework of personal ethics to be followed by all individuals of the information society <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">Kuzu, 2009, p. 92 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). With the influence of technology reaching many individuals outside of the usual sphere of IT, this author concurs that the teaching of ethics should be wide-ranging, while including all individuals in our society, and not just look at those tasked with its implementation or maintenance. This author further states that clear company policies and training regarding the special ethical considerations that are a part of this specific field should be implemented.


 * = References ||
 * * Al-Rjoub, H., Zabian, A. & Qawasmeh, S. (2008). Electronic Monitoring: The Employees Point of View. //Journal of Social Sciences//, 4(3), 189-195.
 * Brooks, R. (2007). The Development of a Code of Ethics: An Online Classroom Approach to Making Connections between Ethical Foundations and the Challenges Presented by Information Technology. //American Journal of Business Education//, 3(10), 1-13.
 * Cone, E. (2008, September 10). Social Responsibility: Doing the Right Thing. //CIOInsight//. Retrieved from http://www.cioinsight.com/c/a/Research/Doing-the-Right-Thing/
 * Harbert, T. (2007, October 29). Ethics in IT; Dark Secrets, Ugly Truths. And Little Guidance. //Computerworld//, 41(44), 34-36.
 * Jennings, M. (2009). //Business Ethics: Case Studies and Selected Readings// (6th ed.). Mason, OH: South-Western Cengage Learning.
 * Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. //Turkish Online Journal of Educational Technology,// 8(2), 91-110.
 * Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen Nothin’ Yet! //Ethics and Information Technology,// 3, 38-91.
 * Moor, J. H. (2005). Why We Need Better Ethics for Emerging Technologies. //Ethics and Information Technology//, 7, 111-119. doi:10.1007/s10676-006-0008-0
 * Vitolo, T. M., & Brinkman, B. J. (2007). Ethics for the Graduating Class: Issues, Needs, and Approaches. In Lowry, G. R., & Turner, R. L. (Eds.), In //Information Systems and Technology Education From the University to the Workplace// (p. 299-310). Hershey, PA: IGI Global. ||