Are the ethical decisions that a technology user must make fundamentally different than those facing the ordinary person? No, because it is difficult to resolve competing interests no matter what the nature of action or behavior is contemplated. Is the existence of competing interests' reason enough to impose a set of rules, or codes of conduct, within the technology environment? Unfortunately, the large number of activities, and their complex nature, conducted by information technology professionals, and users, can sometimes have serious repercussions, and affect the well being of many individuals. When these activities include, theft, destruction, or fraud, most would agree these types of activities are wrong. However, when can the behavior with respect to, privacy issues associated with databases and electronic mail, and electronic monitoring be considered wrong? Developing a set of rules, or codes of conduct will identify accepted actions for technology users. Privacy concerns have heightened the unease about ethics within technology. And it is this unease that prompted many professional organizations, such as the Association for Computing Professionals (ACM), to develop ethical codes of conduct for information technology professionals and users to provide guidance about ethical behavior. This paper will discuss the form of some of these codes and their effectiveness. The code of ethics adopted by ACM consists of 24 imperatives (ACM, 1992). These imperatives, similar to Immanuel Kant's (1724-1804) Deontological theory, are rules that command a type of action without regard to the type of desired end. For instance, ACM's General Moral Imperative 1.5 "Honor property rights including copyrights and patents" presupposes situations where matters of public security require custody of personal property in order to acquire information of unlawful activity. For example, under this theory, it is not considered ethical to steal a loaf of bread even if your...
References: Association for Computing Professionals. (1992) ACM Code of Ethics and Professional Conduct. Retrieved from http://www.acm.org. September 17, 2006.
Bentham, Jeremy (1748-1832). The Internet encyclopedia of Philosophy. Retrieved from http://www.utm.edu/research/iep/b/bentham.htm on September 23, 2006
Institute for Electrical and Electronic Engineers. (1991). IEEE Code of Ethics. Retrieved from http://www.ieee.org/portal/pages/about/whatis/code.html September 17, 2006
Kant, Immanuel (1724-1804). The Internet encyclopedia of Philosopy Retrived from http://www.utm.edu/research/iepk/kantmeta.htm on September 23, 2006
Levy, Steven. (1985) Hackers: Heroes of the Computer Revolution. New York: Doubleday.
Lysecky, Sarah. Listen up and listen in. IT.business.ca (September 12, 2006). Retrieved from www.ITbusiness.ca September 23, 2006
Office of the Privacy Commissioner of Canada. Retrieved from http://www.privcom.gc.ca/index_e.asp September 23, 2006
The White House. Retrieved from http://www.whitehouse.gov/infocus/patriotact/ on September 23, 2006.
Please join StudyMode to read the full document