Because computer ethics is such a volatile issue, an entire branch of study has grown up around computer ethics, which proponents who believe the computer age caused these ethical issues, and others who believe these issues would have surfaced anyway. One of the proponents of computer ethics, who actually was the first to teach the concept, Walter Maner, from Old Dominion University, is a proponent of the computer creating brand new ethical issues. An expert quotes Maner, "For all of these issues, there was an essential involvement of computing technology. Except for this technology, these issues would not have arisen, or would not have arisen in their highly altered form" (Bynum, 2008). A colleague of Maner's, Deborah Johnson, disagreed with Maner, and the two began debating the issue. Author Bynum (2008) continues, "Johnson granted that computers did indeed transform old ethics problems in interesting and important ways -- that is, 'give them a new twist' -- but she did not agree that computers generated ethically unique problems that had never been seen before." The debate about how computers have affected ethics and if they have created whole new arenas for ethical violations continues, but it is clear that computer ethics is a challenging field that bears increased study and concern.
The biggest issue in the online privacy issue is, can people really expect privacy when there is so much information sharing going on online? Today's society is technologically rich, information rich and socially networked more than any other in history. People "blog," "twitter," and "Facebook" about their daily lives and beliefs to an astonishing degree, throwing caution and privacy to the wind. They place extremely personal information online, like daily activities, their political and religious beliefs, and they allow the world to read it, but they still want to maintain their privacy to maintain their health and safety, and they expect their Internet providers and technology providers to provide that privacy. Of course, Internet and technology providers do have an ethical liability to keep their users safe, but is this even a realistic goal in today's society? Another author notes, "So many people are completely comfortable using social networking sites like Facebook and MySpace and so forth, to really live their lives in a kind of public scrutiny that once would have just been inconceivable" (Rennie, 2008). This new, technologically rich generation seems unconcerned about many privacy issues, and that may change the way society looks at and thinks about privacy and ethics.
However, there...
However, that was not an option, and it points to the rigidity of the corporation and its rules. Harrah's defense of their policy is utilitarian in its outlook and its purpose. It stresses utility (beauty) over values or concerns of personal beliefs and personal privacy. A Harrah's spokesman for the "Personal Best" program noted, "Harrah's customers, people who are loyal to the Harrah's brand name, expect a certain quality of
Technology / Privacy / Workplace There is a rapidly increasing use of technological monitoring in the workplace, and while technology in general has been highly beneficial to companies, the use of some technologies has raised privacy and ethical concerns among employees. This paper reviews the available literature when it comes to workplace monitoring of employees and the ethical implications of that monitoring. Is Privacy in the Workplace a Dying Notion? The right to
107) could also apply here. The confidentiality clause in such a case then only applies insofar as it is estimated that there is no need to disclose confidential information to others. In the case of Mrs. Z, her family deserves to know about her situation, because it affects their lives pertinently. Because of the increasing cultural diversity throughout the world, cultural values also play an important part in making ethical
Ethics of Employee Location Monitoring In the contemporary workplace, workers are usually aware that their computer activity, email, and phone conversations may be -- and probably are -- being monitored by their employer. Efforts to limit the consumption of offensive or pornographic material, use of company resources for non-work purposes, and desire to track employee behavior in order to improve efficiency leads managers to install keystroke logs, RFID location tags,
This may be done without the consent of the owner of the information thus also infringing on their right to privacy. Education has also been revolutionized greatly by technology. As a result of technological advancements it is now possible for teachers and students to communicate over thousands of miles. Instructors are also able to give assignments which students can submit despite the distance. In this way, technology has enabled global
It is important that I am honest to anyone who I choose to be my mentor. Communication must be frank and honest, as learning is the key to research. Requirements for IRB Approval Institutional Review Boards (IRB) are the governing bodies that determine what research may be conducted at the university. This is the approving authority for future knowledge and must be treated with honor and respect. As a student under
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now