Mgt7019-5 It Challenges

Topics: Ethics, Business ethics, Applied ethics Pages: 11 (3406 words) Published: October 30, 2012

Learner: LILLYDMGT7019-6


Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right.

Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so.

Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal.

| | | | | | | | | |MGT7019-8 | | | |Dr. Jennifer Scott | | | | |ETHICS IN BUSINESS | |

Assignment 5 – The development of a code –of –ethics: IT Challenges

Faculty Use Only
Debra, I am pleased to see that the technical issues cleared up and you were able to submit your assignment. Indeed, with the advancements in technology, I believe it is imperative that companies train employees on the risks of privacy infringement, especially IT employees. I also believe that it would be a good idea if this information was taught in schools, beginning with elementary schools.

I have made some comments on your paper, which was somewhat confusing. I ran your paper through Turnitin and it shows 59% similarity, which is high. It is apparent that some of the information you used was not cited correctly, especially when you refer to yourself. Please review the Northcentral Academic Integrity policy and let me know if you have questions. This is a warning that I will continue to turn all of your papers into Turnitin for originality checks. The NCU policy is to report possible plagiarism, but for this assignment I will just issue a warning.

I am looking forward to receiving your next assignment, which will be on the risks of subprime loans.

Dr. Scott Total: 8/10 Content: 6/7 Writing: 2/3 October 30, 2012

The development of a code-of-ethics: IT challenges
Debra Davis-Lilly
Northcentral University
Ethics in Business
Dr. Jennifer Scott
October 27, 2012
The problem to be investigated addresses how technology is used to violate people’s privacy, how automation leads to job reductions ("The Development of Ethics," n.d), and how management information and its corresponding systems are used and abused for personal gain and the development of a Code-of-Ethics: IT challenges. In reviewing the author’s scholarly opinion, the information provides validation from an educational and peer-reviewed reference pertaining to both.

Societal Ethical Changes Caused by Information Technology

Four fundamental areas of importance provided in...

References: |Cone, E. (2008, September 10). Social Responsibility: Doing the Right Thing. CIO Insight. |
|Retrieved from |
|Gleason, D. (2009). Computers and Society. Subsumption ethics, 29-36. |
|Related info on The Development of code of Ethics: An.
|Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen No thin’ Yet! Ethics |
|and Information Technology, 3, 38-91
|Moor, J. H. (2005). Why We Need Better Ethics for Emerging Technologies. Ethics and |
|Information Technology, 7, 111-119
|Vitolo, T. M., & Brinkman, B. J. (2007). Ethics for the Graduating Class: Issues, Needs, |
|and Approaches
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Challenges Essay
  • Challenges Essay
  • 5 Essay
  • 5 Essay
  • Unit 5 7 arakin 5 course Essay
  • Assignment 5 Essay
  • qcf level 5 Essay
  • nvq 5 Essay

Become a StudyMode Member

Sign Up - It's Free