By
Raul Bernardino
Introduction:
According
to the Andrews, “in the practicality of
the ethics have three different aspects that are influencing the behavioral of
the organization,” Andrews, K. R., (n.d). They are namely: The individual
development which is will be producing personal ethical, the effect of multiple
cross cultures effects either they are ethical and unethical environment that
contributes in the organization, and the organization are developed the policies,
the code of conduct, the procedures which are may encouraging the ethical or
discouraging unethical behaviors. The
characteristic of the personal that are influencing in the organizations and
the organizations are influencing the individuals (with the policies and
procedures) that embedded are equally important.
“For instance it is not allowing to “copying others works. It
is plagiarism or thief other properties in one community culture. However, it
is allowing doing so. As it becomes a share knowledge in that culture of the communities”
Hall, P. A.V. & Fernandez-Ramil, J. (2007, p.77).
The information technology industries and the revolution of
the information bring and contribute to the complexity of the ethical of the computing
and ethical of the knowledge sharing properties. Some concerns in the ethical
computing as follows:
a. Monitor
employees email and internet access
b. Lot of people
around the globe are copying or downloading music files, video files, and etc.
without paying any cents to copyrights
c. Hackers are
breaking the financial data-bases
d. Student is
doing plagiarisms
e. Spyware or
cookies that are planning on the user computers to monitor their activities
One
of the concrete examples is the closing down of the ‘DigiNotar’the Dutch
certificate authority which grants SSL to the on-line companies. The company
was attacked by hackers and able to generate the fake certification including
directing users to the other web sites. According to the Bown that, there were
significant looses in this event. The after the occurrence, the Dutch
government took over the management of ‘DigiNotar’ and now withdraw the trust.
Other
example is an ethical piracy of the software. Sometimes, we knew that it is
piracy copy of the software application; however that is only the available in
the software application in the country. I am talking about Microsoft piracy
copies in the country, where the distributor are distributing piracy copies in
the very first years of the independence. As the consequence of the piracies,
the products are cannot be updated from the internet. Lot of viruses is
spreading on the networks and disturbing all connectivity’s. It is including
corrupting working files or event deleting the working files. In the beginning
of the developing country, there are several difficulties in developing the software
applications. We cannot buy software license directly from the source because
Timor-Leste is not recognized as a country. Currently, most of the software
applications, we bought from agencies that are registered in Australia or
Singapore.
Any
software application development has to be in-line with the country law and
other regulations or ethical of the information and technology.
In
conclusion: The ethical computing professional has putted himself or herself in
relation to the client, communities, and with the other professionals in order
to develop a technology either it is soft or hard for the sake of the society.
The impact of the unethical computing may cost the loose of the financial or
life of the person as it happened on Therac-25.
References:
Hall, P. A.V. & Fernandez-Ramil, J. (2007) Managing the
Software Enterprise:
Software
Engineering and Information Systems in Context. London: Thomson
Learning.
Lecture note,
MNGSWE_WK3_seminar
No comments:
Post a Comment