Definitions And Concept Of Information Ethic

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract: Information ethic has rapidly growth in field of library and information science. Basically, the terminology of ethics is the moral philosophy regarding what’s right and wrong. Meanwhile, information ethics is the part of ethic that relates with the life cycle of information. In other word, information ethic is a part of ethics that emphasize the relation between the life cycle of information, and the ethical standards and moral codes. The concept of information ethic has been arising since the development of computer technology and internet. It also considering of moral issues about informational privacy, moral agency, new environmental issue, problem arising from life cycle of information such as digital divide, digital right, ownership and copyright. This paper has specifically focused on the broader concept about information ethics, the arising chronology of information ethic’s history. This paper also view on how information ethics relates to the Information Technology (IT) Professionals. From the broader concepts, these papers emphasize the definition of information ethics to specific and narrower concepts. The information ethics conceptual theory had been developed by Luciano Floridi called "Floridi Information Ethic" (FIE) served four fundamental principles. There are several challenges or critical issues regarding information ethics that need to be highlighted. Hence, these papers emphasize several ways to address the critical issues about information ethics.

Keywords: Ethic, Information technology, ownership, copyright, information science

1.0 Introduction

As a broader concept, Information ethics had been developed starting the field of Library Science, and another fields had been evolved and embraced by many other field. Information ethics are widely related to the ownership, access, privacy, security, and community. "Computer and information ethics", in the broadest understanding, can be understood as branch of applied ethics which studies on how to analyze a social and ethical impact of Information, Communication and Technology (ICT). Information Ethics can be seen in Information science, computer ethics (including cyber ethics), management information systems, business and the internet.

Basically, Information Ethics have long and short history regarding its evolution. The evolution of Information Ethics had been involved many kinds of disciplinary starting from Librarianship, Computer Science, Information Management System, Cyberethics, Media Ethics, and since the rapid development of technology a lots of disciplines have involved in Information Ethics as well. These phenomena show on how the information can be conducted and organized according to the ethical norms.

Information ethics had been raised in the United State over 20 years ago. The first issue of information ethics was occur in field of Librarianship before continue to another fields. For example, the one of the key figure is Robert Hauptman. Robert Hauptman had written several articles about ethical issues. One of the famous is Ethical Challenges in Librarianship. This article emphasize some of the problems in field of Librarianship such as censorship, privacy, access to information, balance in collection development, copyright, fair use, codes of ethics, and problem patrons. Unfortunately, when the issue of information ethics had been spread away to the America, American not too concern about ethical issues in librarianship compare than the issue in field of computer science and information technology. However, some of information ethics issues were rise as early as 1980. Barbara J. Kostrewski and Charles Oppenheim wrote an article, "Ethics in Information Science" for the Journal of information science. The issues that were arise such as confidentiality of information, bias in information, the quality of data supplied by online vendors, and the use of work facilities.

Over the years, Information ethic was adopted by the field of Computer Science. The creations of textbook like The Principle of Information Ethic written by Richard Seversen are about respect for privacy, and fair representation. Besides that, another textbook written by Marsha Cook Woodbury which is Computer and information ethics, addresses a broader variety of issues such as computer crime, copyright, privacy, electronic commerce, artificial intelligence, and software reliability.

Information has been spread out into Information System Management field. The textbook written by Florence M. Mason Richard O. Mason, and Mary J. Culnan entitled Ethics of information management. It is about the ethical awareness in information systems, society and organization.

Another area has emerged in information ethic is Cyber ethics (computer ethic). Basically, Cyber ethic related with the issues of internet or cyberspace, expert systems, and artificial intelligence. The example of mechanism written by James Boyle's Shamans, software and spleens: law and the construction of the information society.

Information ethic also strands is media ethic. Media ethic should aware with the information ethic as concerning of the phrases information ethics: Philip Patterson and Lee Wilkins, Media ethics: issues and cases. Information ethic has involved from years to years associated with critical issues and phenomena about the internet.

2.0 Methodology

In completing this term paper, the major instrument that has been used is literature review. By reviewing the literature review, all the information will be cultivate back based on the understanding. The literature review that had been used is journal about information ethic. Another method applied for this term paper is review the information in web page. Approach that had been used in completing this term paper is understands from the reviewing and cultivation from the understanding.

3.0 Definitions and concept of information ethic

According to Dr. Chien-Pen Chuang & Dr. Joseph C. Chen (1999), a general description of information ethic is one aspect of much larger philosophy known as social ethics. It deals with the moral conduct of information user-based on their responsibilities and their accountability. Free moral agents, individuals, society, and organization should hold the responsibilities on what action they had done. In most countries, the legal system encodes and regulates the most important ethical standards, and provide a mechanism to control the people, organizations, and government. The government is responsible for unethical activity. However, the rapid development in the information technology arena has created a lot of uncertainty in the law.

Any deficiencies in the regulations bring individuals, organizations, and communities to act without legal restrictions and ethical ethical manner. Instead, IT tends to give rise to ethical problems, such as violation of personal rights of others. The two major issues involving the conflict between information technology is observing other people's privacy. Individual privacy is a moral right to be left alone and responsible for the information without letting other people know about them. New information technology is making misleading question collection, storage, retrieval, and analysis of information easier. In addition to issues related to ownership of personal information, the new information technologies pose problems for the protection of intellectual property.

Intellectual property includes all tangible and intangible inventions of human ideas. Intellectual property is divided into three forms, namely: patents, copyrights, and trade secrets. Patents protect inventions in the machine, including the basic principles behind the patented invention. Copyright protects the expression of ideas but not the basic idea itself. Trade secrets are to protect any intellectual products, such as formulas, product ideas, computer programs and database compilation. Everyone should know the laws to protect intellectual property so they do not encroach on others rights to privacy.

The concept of information ethics theory can be used for information technology (IT). This is because information technology is fast, and has the character continues to grow. The field of computer technology is one of the areas that are difficult to coordinate certain moral code. However, a set of ethical values ​​is vital in providing information to the computer because the computer vulnerable to various types of cyber crime. Therefore, one must look to the ethical theories that form the moral basis of information in all disciplines and professional fields. But, we must understand what the theory of information ethics.

Therefore, the information should be the basis of ethical theory to all human action. Regulations must be based in the community, and information ethics theory should provide the methods and justification for, information ethics theory goal is to "be the basis of that person's responsibility to act in a certain way, or it is an offense to act in a certain way". Basically, the misconduct was due to misuse of computer use. A company should establish a code of ethical standards related to information technology.

Typically, a person feels something illegal is immoral actions, however, is not necessarily happen. Companies must distinguish between a legal and moral act. A company needs to know the purpose of moral and create a consistent moral code. Information Ethics theory is absolutely necessary because of a general rule are difficult to quantify, moral regulation is not necessarily justified, and conventional morality is not always true. However, there is no information that exactly follows the scope of information ethic.

The basis of ethical theory comes from Kant's categorical imperative, which states, "people should behave in such a manner that if everyone else acted the same way, everyone would benefit". Information Ethic theory looks benefit for the whole of society. There are two basic approaches to information ethic theory, first is the teleological approach and second is the deontological approach.

Teleological approach defines "immoral action worth is determined by the effect of an action itself". Basically this approach asserts that a moral act is one action that will produce happiness for everyone involved. Teleological approach emphasizes consequences of an action, and the result of an action. Deontologists approach defines that "if the action taken is a duty, and, if the principle of an action is universal, then it is the right action." All action have an interest whether an action is good or bad action. This theoretical values ​​each individual, whereas teleological approach sometimes allows individuals to reacting with the mindset first. Both approaches can be applied in the community to create a moral society on technology.

It is important that one has a set of professional ethics because when someone is in a particular field of work, an individual will enter into a complex set of relationships, involving duties and rights. Four professional relation involving are with employers, clients, professional colleagues, and the community. We must understand the rules of morality associated with that relationship. Ethics and morality that a complicated role in the modern business world, and especially the field of computer

There are five aspects that need to be addressed, namely integrity, competence, responsibilities, professional responsibility, and advancement of human welfare. These aspects are very important to the ethical theory of information was discussed. If one holds to each of these in their daily activity, one can act in a morally responsible.

4.0 Information ethic conceptual theory

Table 1: Kant's categorical imperative theory

1) TELEOLOGICAL APPROACH

2) DEONTOLOGICAL APPROACH

a) Defines "immoral action worth is determined by the effect of an action itself"

a) Defines "if the action taken is a duty, and, if the principle of an action is universal, then it is the right action."

b) Asserts that a moral act is one action that will produce happiness for everyone involved.

b) All action have an interest whether an action is good or bad action.

c) Allows individuals to reacting with the mindset

c) This theory values each individual person.

5.0 Challenges Issues/problems arising in circumstances of information ethic

In the concept of information ethicthe best way to understand the nature of the field is through some examples of the challenges issues/problems. This term paper highlighted five challenges issues of information ethic.

5.1 Computers in the Workplace

Computers obviously pose a threat to jobs. Computers are more efficient than humans in performing many tasks. Another issue is the aspect of workplace health and safety. When information technology is applied to the workplace, it is important to look at the effects on the health and satisfaction of employees who will operate it. For example, employees will feel pressured to compete with high-speed computerized devices. These are just some social ethics issues that arise when information and technology information included in the work place.

5.2 Privacy and Anonymity

Computer network is used to collect, store, find, get and share personal information. this makes computer technology threatens anyone who wants to store various types of personal information such as medical information. In the rapid growth of information technology, it has led to new privacy issues, such as data mining and data matching. Philosophers say that the control of personal information is not sufficient to establish or protect privacy.

5.3 Intellectual Property

One of the controversial issues related to ethics information is intellectual property rights. An intellectual property right is proprietary software. Some people believe that the ownership of software should not be allowed. While some people say that all information should be free, and all programs can be modified by anyone. The software industry today alleged loss of billions of dollars every year through illegal copying through software piracy.

5.4 Globalization

Information on current ethical flourishing into a broader field and commonly known as the "global information ethics". Across the global network such as the Internet and the world-sites that connect people across the community. There are a number of global issues such as global law, global cyber business, and global education.

5.5 Computer Crime

At present, computer crime becomes increasingly prevalent. Computer security is a topic that is particularly acute in the field of Information Ethics. This problem is not focused on physical security equipment such as protection from theft, fire, flood, etc. Instead, it focuses more on the "logical security. Types of malicious software leave a great challenge to computer security. Among the types of malicious software is" viral ", which acts damaging computer programs that other" worms "that can traverse from machine to the machine through a network, and may have to move in a different machine, "Trojan horse" that will do damage behind the scenes.

6.0 Recommendations to address the challenges arising in circumstances of information ethic

After going through all the challenges issues/problems arising in the circumstances of information ethic, there’s several recommendations addressed to overcome or minimize the issues.

6.1 Protect the privacy and confidentiality of all information entrusted to the computer.

In order to overcome the issue of computer in the workplace, protect the privacy and confidentially of all information entrusted to the computer is important to ensure all the information are saved and not be altered by anyone. Protection of the information privacy could avoid the manipulation of personal and confidential data as well. Hence, the management at the workplace must be aware about the issue of protecting privacy and confidentially of all information entrusted to the computer.

6.2 Applying of anonymity on the internet

Anonymity can help someone protect personal information and it is practically the same as privacy. For example, if someone is using the internet to get psychological counseling or to discuss personal problems and sensitive issues such as AIDS, abortion, sexually transmitted diseases, and political dissent, anonymity can give the same protection of privacy. In addition, anonymity and the privacy of the internet can preserve human values ​​such as safety, mental health, and peace of mind.

6.3 Owning a patent on a computer algorithm.

Patents allow the exclusive right to use the patented item. In general, the approach to carry out "patent search" to ensure that a program is not copied from an existing program or not in violation of any software patent is a process that is expensive and time consuming. Therefore, only large companies with strong and big budgets can afford to conduct services "patent search". This will affect a small software company to maintain their exclusive rights.

6.4 Efforts to develop mutually agreed standards and efforts to advance and defend human values

In order to overcome the problems of globalization, efforts are being made in the context of a globalized world. Undertaken efforts to address the problem of globalization is to create an ethics and values ​​that can be debated and changed the context is not limited to a specific geographic area, or constrained by religion or culture. This very well could be one of the most important social development in history.

6.5 Support, respect, and abide by all appropriate local, state, provincial, and federal laws

Malicious kinds of software, or "programmed threats", embezzlement or planting of logic bombs, and "hacker" who breaks into someone's computer system without permission are one of the challenges issue arising in information ethic. In order to overcome this issue, the support, respect and abide of the laws are important such as about the act of privacy and confidentiality. People should abide to the law of privacy that stated like personal data protection. This act will protect user from being hacking by anyone. Besides that, the act about integrity in assuring that data and programs are not modified without proper authority. This will avoid the hacker and the planting of logic bomb. On the other hand, user should respect and support the policy of consistency to ensure that the data and behavior we see today will be the same tomorrow and do not be manipulate by anyone under the act of personal data protection. The law also enacts the act about controlling access to resources. Hence, it is important to support, respect, and abide by all appropriate local, state, provincial, and federal laws in order to overcome the issue of computer crime in information ethic.

7.0 Conclusion

In conclusion, information ethics have evolved over centuries of years in related fields. Growth in information ethics focus on areas related to the Internet, networks, and computers. There is a clear distinction between information ethics issues related to print media such as newspapers authenticity reference checkers. Information ethic cannot escape the problem or issue arising especially after the emergence of the World Wide Web. Information ethic is important so that every action in managing the information is correct and moral.

8.0 References

Bynum, T. (2001). Computer and Information Ethics. Retrieved 26 April 2013, from http://plato.stanford.edu/entries/ethic

Capurro, R. (2005). Towards an Ontological Foundation of information ethic. Retrieved 26 April 2013, from http://www.capurro.de/oxford.html

Dr. Chien-Pen Chuang, & Dr. Joseph C. Chen. (1999). Issues in Information Ethics and Educational Policies for the Coming Age. 15.

Froehlich, T. (2004). A brief history of information ethics.Retrieved 26 April 2013, from http://www.ub.edu/bid/13froel2.htm

Information Ethic.Retrieved 26 April 2013, from http://en.wikipedia.org/wiki/Information_ethics

Lou Berzai. (2012). How Ethical Theory apply to IT Professional. Retrieved 26 April 2013, from http://www.aitp.org/news/9301



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now