StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Social Media, Networking, and IT Ethics - Cultural Perspective - Essay Example

Cite this document
Summary
This paper "Social Media, Networking, and IT Ethics - Cultural Perspective" is analyzing some of the vital issues and ethical concerns due to the latest technology. This research will find out the basic ethical issues in Social media/networking and IT Ethics with respect to cultural perspective…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "Social Media, Networking, and IT Ethics - Cultural Perspective"

SOCIAL MEDIA / NETWORKING AND IT ETHICS A CULTURAL PERSPECTIVE Name Date Table of Contents SOCIAL MEDIA / NETWORKING AND IT ETHICS A CULTURAL PERSPECTIVE 1 Name 1 Date 1 Table of Contents 2 INTRODUCTION 3 SECURITY OVERVIEW 3 BASIC IT TECHNOLOGY ETHICS 5 SOCIAL NETWORKS AND ETHICS 6 ETHICS IN SOCIAL MEDIA 7 COMMON DILEMMAS 9 CURRENT ATTITUDES, PERCEPTIONS, AND BEHAVIOR 11 ETHICAL MANAGEMENT 12 CONCLUSION 14 REFERENCES 15 17 INTRODUCTION Each development in communication and information technology is focused on at least one ethical dilemma. Additionally, from email updates to Facebook, the users of new technologies are unconscious of well balance between ethics and profit struck by suppliers. In this scenario, software developers, individuals and businesses have to think about right and wrong effects while making use of the information technology each day. In addition, the basic concerns essential to the world of IT are the end user's anticipations of privacy and the provider's ethical responsibility to utilize email or applications reliability. For the reason that of quickly lathering environment of technology, novel and complex ethical concerns are raising those bring into problem the capability of society to tackle and self-assuredly decide them. Moreover, these novel matters and concerns are occurring in the fields of information technology, biotechnology, nuclear technology, nanotechnology and the fields defending the health and welfare of the public as well as the atmosphere (Katers, 2011) and (Kastenberg, 2011). This paper is aimed at analyzing some of the vital issues and ethical concerns due to latest technology. This research will find out the basic ethical issues in Social media/networking and IT Ethics with respect to cultural perspective. SECURITY OVERVIEW Security is not simply about securing and protecting our personal information and business network from outside thefts and threats; it as well concerned about saving and protecting beside threats within the workplace. In this scenario, the primary step to safety is awareness. In other words, it is significant for individuals and staff members to keep in mind not simply the possible threats however as well how to stop/deal with those threats. Additionally, the both awareness and education provide every worker with the knowledge of his position and job required to save and protect the business’s network. This, in reality, will move a long means in the direction of mitigating risk (Schweitzer, 2005). However, a lot of internet threats and issues are simply preventable and immediately done because of employees who are only unaware of their occurrence. Once briefed on fundamental online and web based safety, it is significant to keep our staff educated and informed also. In addition, when latest dangers take place, we need to adopt a suitable mechanism that automatically saves memos awarding every worker of the danger. It is only possible when we guide our staff members regarding how to recognize it, what to perform if it happens. Moreover, the business should make sure the entire business worker’s computers and laptops are outfitted by means of newest security tools. On the other hand, it is also a good idea to alert them to the attendance of these systems and tools and educate them how to execute security scans, if they previously do not know. This is particularly true for mobile workers who can be executing using an unsure internet link. Thus, we need to make sure that our business staff members are aware of the web based issues and risks, also (Schweitzer, 2005). BASIC IT TECHNOLOGY ETHICS In past few years, the problems and issues of IT Ethics have turned out to be very complex and a big challenge. The capability to place material on the Web has been attracted by an extremely large number of people. However, development of systems and software has quietly hidden the issues and complexities and frustrations that were concerned with writing HTML, increasingly websites are being developed by people with a comparatively diffident quantity of computer literacy. On the other hand, once the early unwillingness to make use of the internet and the web for commercial reasons had been conquered by websites for carrying out business activities on the web growing rapidly as well as e-commerce turned out to be a term eternally to be recognized as a fraction of common practice (Schweitzer, 2005) and (Phukan, 2002). In addition, the absorption of innovative technology is approximately never smooth. As the web started to expand out of its shortened infancy, a large number of complex problems and issues generate repeatedly as well as a huge amount of these concerns and issues remain unresolved. Moreover majority of these problems and concerns hold a powerful ethics content. As the capability to arrive at millions of people immediately and at the same time has passed into the hands of the ordinary person, the fast appearance of thorny ethical concerns is probable to continue unabated (Schweitzer, 2005) and (Phukan, 2002). SOCIAL NETWORKS AND ETHICS With the development of social networking websites like that Twitter and Facebook, people have started talking about work connected issues on the internet. This is one aspect that is turning into a problem as majority people realized. Additionally, the social networking websites are a way for people to communicate with the people from all over the world as well as approximately everyone is able to get access to the data and information that is shared on online collaborative social networking profiles. As we become a part of these social networking websites, we as well have to be aware of various ethical as well as legal issues that can arise. It is very important that professionals do not make illegal use of some of the individual’s personal data and information or photographs of their face if they do place something on Twitter or Facebook. If they are arriving out to inquire recommendation or post an image, they are able to perform without causing some harm to the individual (Clark, 2011), (Sacan, 2010) and (NORDUnet, 1991). In addition, technology professionals have to keep in mind the US state and federal laws that they could rupture if they place data and information of any person like that Social Security number, name, address and other personal details. Though, social networking websites offer a lot of advantages for business professionals; however it is very important that the people’s security and trust are honored first. In this scenario, it is the vital responsibility of technology professionals to take care of people’s private data and information and make sure that they have not made illegal use of details associated with any person. Additionally, it is necessary that business managers and supervisors clarify the significance of saving the personal details of staff members and other associated personnel. In addition, managers should have meetings with the workers and clarify to them how to be technology expert on social networking websites like that Twitter and Facebook. Moreover, it is very important that every member of staff recognizes the worth of the consequences of their deeds if they make use of any person’s personal details (Clark, 2011), (Sacan, 2010) and (NORDUnet, 1991). In addition, business managers should move over ethical issues and concerns that can appear if the particular person does post unsuitable data and information. Aditionally, it is also the responsibility of business managers to examine the federal and state laws that they have to obey. Moreover, people can take legal action against the business and member of staff in case their personal details get posted to social networking websites. Furthermore, there are also many other legal concerns that can take place if the business does not control what is placed on their staff’s social networking profile (Clark, 2011), (Sacan, 2010) and (NORDUnet, 1991). ETHICS IN SOCIAL MEDIA Social media plays a significant role in developing associations with our clients and other business partners. Additionally, similar to navigating the internal channels in a business or still personal friendships with professional colleagues, associations are developed on the basis of trust. When our clients state us that we will be there for them, they anticipate us to be there for them. In the same way, when we articulate we care for their requirements, we had better show it or that trust deteriorates. In this scenario, both professional ethics and personal ethics are essentially linked with each other. In addition, we cannot have professional ethics without a heavy dose of private ones. Additionally, neither can be turned on or off. If we have them, others are able to inform because we are true to our word. Thus, we need to work hard in order to fulfill our responsibilities our responsibilities and commitments (Falls, 2009). Moreover, the user generated information content has turned out to be ubiquitous and it is not astonishing that business marketers are paying more and more concentration on social media as an online method to link and communicate with customers and to present a marketplace marketing research to achieve insight into customer’ view, attitudes or behavior. Additionally, it has formed novel prospects for researchers to interact, observe and collect information. It has as well brought new methods comprising utilization of community panels, netnography and co-creation, web scraping and blog-mining. However, in order to build up effective strategies there is need to keep away from unsuitable privacy legislation and to protect the liberty to conduct research tasks. Yet in the United States, the customary free-for-all viewpoint of self-regulation is coming below pressure. The possible result is certainly extra guidelines in the US as well as if huge numbers of individual citizens support the thought of a ‘do-not-track list’ still the majority pro-business politicians are improbable to get a hard stand beside it (Mareck, 2011) and (Brogan, 2011). Furthermore, the marketplace research industry has a vested attention to show the law makers and customers regarding tackling these responsive issues. We desire to draw notice to possible issues, to obtain a debate going and conformity regarding what is and is not allowable to give confidence researchers to go in a rational direction. Significantly, we want to keep away from offensive people as well as to keep the community as possible respondents on our side as a result we are able to carry on by means of this type of research (Mareck, 2011) and (Brogan, 2011). COMMON DILEMMAS When we think of ethics, descriptions of two-faced politicians and greedy corporations cooking the books almost certainly appear to our mind. In realism, ethics is for all time a two-sided coin with our standing and our income on the line. In this scenario, the high-quality ethics guidelines to trust as well as friendships, as a lack of them are able to leave us looking over our shoulder. Additionally, the wrong ethics have taken down corporations, politicians, and yet whole nations. Though, the ethics is not a black-and-white topic, the choices we formulate could affect our business or yet our living styles. Keeping in mind, here are a number of widespread ethical problems that will happen as we make use of networking, social media or any IT based medium. These can be: (Parr, 2011), (Business Ethics, 2011) and (Harris, 2011) Spamming: We entirely desire to run our businesses profitably as well as products; however there is dissimilarity among reaching out and spamming, Facebook and Twitter with links and promotional messages. Thus, when we market our product and services, we need to keep in mind to offer others by means of value in return (Parr, 2011). Feuds by others: It is simple to let an argument spill into a community spat inside our Twitter feed; however is this actually helpful to our followers? In fact, the social media is about facilitating others, not about putting them down. In this scenario, public disputes and calling people out are more probable to damage our standing than facilitating it (Parr, 2011). Lying: In case of networking and social media arrangement the fundamental occupant is transparency, as well as lying is the whole opposite of that. Additionally, not simply are we mislead people, although social media has exposed a lot of liars that it immediately is not worth the risk. It is simpler as compared to someone to do the research on what we articulate (Parr, 2011). Misrepresentation: This as well pursues from the “be transparent” law. As we cannot be lying by saying we worked at Google as well as Yahoo, it’s deceptive to make use of that information if we worked at each for three days as a contractor. Thus, it is bad idea to utilize a business brand name or an achievement unless we really have the right to it. In this scenario, we would not simply make new opponents; however we could have legal trouble also (Parr, 2011), (Business Ethics, 2011) and (Harris, 2011). CURRENT ATTITUDES, PERCEPTIONS, AND BEHAVIOR Unethical and frequently illegal behavior while making use of information technology appears to be ordinary. In this scenario, software piracy and illegal access to computing offer capability of illegal acting in many countries. However, a lot of clients of IT defy these laws with little or no fear. As a result, majority of IT professionals is willing to perform in ways that are deliberately unethical, thus in this scenario, what type of reaction might we wait for when the matters are a little more indistinct? Additionally, a recent research conducted by SPA (Software Publishers Association) shown that more than 20 percent of the whole personal computer programs in use are illegal copies. In addition, with approximations of software sales nowadays in the neighborhood of United Sates $50 billion to US$60 billion, that could stand for as a great deal as US$12 billion every year. Moreover, the Software Publishers Association has carried suit beside a number of businesses as well as a minimum one university from this practice. A lot of writers in the area of computer ethics cover an evenly alarming picture of present day business as well as computer ethics. It is discovered that issues of software piracy as well as hacking turn out to be mainly crime of the young people can be also sanguine (friedman, 2011) and (Mishra et al., 2006). Moreover, their research and study on computer ethics demonstrated that at hand circumstances are unsatisfactory. In some researches it is stated that software copying policies, established a drearily poor attitude towards software copying at some organizations. It is also outlined that business staff have a number of worst offenders in this view (friedman, 2011) and (Mishra et al., 2006). ETHICAL MANAGEMENT In this section I will discuss some of the important ways to deal with this kind of issues: Outsource Awareness In order to deal with possible issues and concerns of ethics there is need for some awareness of social networking and IT arrangement. In this scenario, security awareness necessitates commitment to a permanent program of worker communications as well as should be intended as such. For example, some businesses use Notice-Bored service, that can able to deliver a series of awareness modules holding a dissimilar information security subjects each month consequently there is for all time something fresh to study. In addition, for ethical awareness in case of social networking and IT arrangement the intended materials themselves require to be creative, well-written and interesting to utilize the viewers that lift another point. In common point of view, if we desire to produce a genuine security society, everybody in the business from top to bottom requires to be informed and provoked regarding information security. In this scenario, the business’s ethical awareness Notice-Bored materials deals with general workers, managers, and IT people independently for the reason that they have separate information requirements (Schweitzer, 2005), (Mareck, 2011) and (Falls, 2009). Training & Rewards A lot of corporations consider that addressing technical problems and issues alone is sufficient to support their IT privacy and security. Unluckily, this is basically not true; the weakest link in the IT safety chain is the element of human. In this scenario we require improving understanding of all the professional businesses by facilitating them to build-up an improved recognition of the entire computer and information security problems like that dangers of accidentally downloading spyware, spam as well as phishing expeditions. However, a high-quality awareness plan should contain at least 3 fundamental aspects: to train, inform and frequently educate staff members (Schweitzer, 2005), (Mareck, 2011) and (Falls, 2009). Develop an IT Ethics Policy For the better IT, social media and networking ethical issues management there is need for the better development of a high level IT policy. Yet at the smallest business, an IT ethics policy places the tone for IT culture as well as undoubtedly establishes the ground regulations for what is it is not satisfactory. In this scenario, the rules about the access of other personal’s information and data files, the utilization of pirated software, and personal utilization of business equipment are spelled out evidently as a result that everybody recognizes prospects on the front end. Not simply are able to similar a policy be a prevention for bad performance, however it as well speeds up management’s reaction to events for the reason that repercussions are spelled out in the strategy (Schweitzer, 2005), (Mareck, 2011) and (Falls, 2009). This establishment of enhanced ethical policy at corporate level offers the average member of staff a legalistic ‘thou shall not’ rules and regulations code, and a negative reaction is approximately certain. The ethical policy design is to build up a “values-based” strategy that gives confidence to staff to pursue the spirit of the law throughout their job. As each ethics policy will differ from business to business, there are main elements that most codes should comprise. The majority noticeable is the addition of ethical permissions however beyond that, there are a small number of other “must-haves (Schweitzer, 2005), (Mareck, 2011) and (Falls, 2009). CONCLUSION Each development in communication and information technology is focused on at least one ethical dilemma. Additionally, from email updates to Facebook, the users of new technologies are unconscious of well balance between ethics and profit struck by suppliers. In this scenario, software developers, individuals and businesses have to think about right and wrong effects while making use of the information technology each day. Security is not simply about securing and protecting our personal information and business network from outside thefts and threats; it as well concerned about saving and protecting beside threats within the workplace. In this scenario, the primary step to safety is awareness. A lot of internet threats and issues are simply preventable and immediately done because of employees who are only unaware of their occurrence. In past few years, the problems and issues of IT Ethics have turned out to be very complex and a big challenge. With the development of social networking websites like that Twitter and Facebook, people have started talking about work connected issues on the internet. This is one aspect that is turning into a problem as majority people realized. This research has offered a detailed analysis of some of the ethical issues in information technology, networking and social media regarding cultural prospective. In this research I have tried to outline some of the possible issues and areas that need to the addressed for the sake of better ethical practice of the business and personal life. This paper has outlined some of the important issues from ethical point of view in our cultural prospects. REFERENCES Brogan, C., 2011. The Ethics Imperative in Social Media. [Online] Available at: http://www.chrisbrogan.com/the-ethics-imperative-in-social-media/ [Accessed 20 September 2011]. Business Ethics, 2011. The Ethics of Social Media – Part II: Playing by New Rules. [Online] Available at: http://business-ethics.com/2010/11/19/the-ethics-of-social-media-part-ii-playing-by-new-rules/ [Accessed 21 September 2011]. Clark, B., 2011. Social Networking Ethics. [Online] Available at: http://www.matthewkeegan.com/2011/05/02/social-networking-ethics/ [Accessed 19 September 2011]. Falls, J., 2009. Why Social Media Demands Professional Ethics. [Online] Available at: http://www.socialmediaexplorer.com/social-media-marketing/why-social-media-demands-professional-ethics/ [Accessed 19 September 2011]. friedman, l., 2011. Information Technology & Social Responsibility. [Online] Available at: http://baruchnewmedia.com/notes/4910notes/itethics.htm [Accessed 22 September 2011]. Harris, D., 2011. How Social Media Is Pushing the Limits of Legal Ethics. [Online] Available at: http://gigaom.com/2011/02/26/how-social-media-is-pushing-the-limits-of-legal-ethics/ [Accessed 22 September 2011]. Kastenberg, 2011. Ethics and the Impact of Technology on Society. [Online] Available at: http://www.nuc.berkeley.edu/Ethics+and+the+Impact+of+Technology+on+Society [Accessed 18 September 2011]. Katers, N., 2011. About Ethics in Information Technology. [Online] Available at: http://www.ehow.com/about_4743180_ethics-information-technology.html#ixzz1YeZild7O [Accessed 17 September 2011]. Mareck, M., 2011. Privacy and ethics in social media research. [Online] Available at: http://rwconnect.esomar.org/2011/02/22/privacy-and-ethics-in-social-media-research/ [Accessed 19 September 2011]. Mishra, A., Akman, I. & Yazici, A., 2006. Software piracy among IT professionals in organizations. International Journal of Information Management, 26(5), pp.401-13. NORDUnet, 1991. Networking Ethics for NORDUnet. [Online] Available at: http://www.nordu.net/basics/ethicsN.html [Accessed 19 September 2011]. Parr, B., 2011. Social Media Ethics: 4 Common Dilemmas. [Online] Available at: http://www.openforum.com/idea-hub/topics/technology/article/social-media-ethics-4-common-dilemmas-ben-parr [Accessed 18 September 2011]. Phukan, S., 2002. IT Ethics in the Internet Age: New Dimensions. [Online] Available at: http://proceedings.informingscience.org/IS2002Proceedings/papers/phuka037iteth.pdf [Accessed 18 September 2011]. Sacan, A., 2010. Computer & Networking Ethics. [Online] Available at: http://www.ceng.metu.edu.tr/doc/services/ethics [Accessed 19 September 2011]. Schweitzer, D., 2005. Security Lessons Learned: Employee Training & Education Can Mitigate Threats. 27(20). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Social Media, Networking, and IT Ethics - Cultural Perspective Essay, n.d.)
Social Media, Networking, and IT Ethics - Cultural Perspective Essay. https://studentshare.org/information-technology/2046544-social-medianetworking-and-it-ethics-a-cultural-perspective
(Social Media, Networking, and IT Ethics - Cultural Perspective Essay)
Social Media, Networking, and IT Ethics - Cultural Perspective Essay. https://studentshare.org/information-technology/2046544-social-medianetworking-and-it-ethics-a-cultural-perspective.
“Social Media, Networking, and IT Ethics - Cultural Perspective Essay”. https://studentshare.org/information-technology/2046544-social-medianetworking-and-it-ethics-a-cultural-perspective.
  • Cited: 0 times

CHECK THESE SAMPLES OF Social Media, Networking, and IT Ethics - Cultural Perspective

Cross-Cultural Competitive Intelligence Strategies by Adidam, Gajre and Kejriwal

Introduction The research paper, ‘Cross-cultural competitive intelligence strategies' by Adidam, Gajre and Kejriwal is highly relevant in the contemporary environment of fast transforming business dynamics.... The authors believe that it is a continuous process of assimilating environment information about the changing socio-cultural and political environment within which business operates.... Businesses fail not because of lack of competency and financial backup but because of failure to exploit the cultural competencies of the new market and market paradigms....
4 Pages (1000 words) Essay

Identifying Global Business Opportunities

Coach uses new technologies such as social networking sites like Facebook as well as Twitter to create awareness and to enhance its customer base.... International Business – COACH Phase One: Planning the Global Business Enterprise A.... Identifying Global Business Opportunities Coach, Inc is regarded as one of the leading luxury leather goods corporation based in the United States....
5 Pages (1250 words) Essay

The Application Simple Wash

As a function of performing such an analysis, the reader will be able to come away with a more clear understanding of how current employers utilize social media and other forms of web content as a means of narrowing down the applicant pool.... The application that was defined on the website consists of a specific program which is designed to pour through large amounts of social networking data as a means of targeting social networking data that potential employers might find offensive and helping the user to remove this content prior to this ever being an eventuality (Jones, 2011)....
7 Pages (1750 words) Essay

What are the sources of your political beliefs

There may be disagreements along the way, but the entire process is expected to result to something by which people may have to stick on a clear perspective of the subject matter and stand still on their conviction.... Let us add to the list the coming to life of social networking platforms like Facebook and Twitter that also have significant impact on how an individual may socialize and readily connect to different tribes and tongues around the world.... These social networking programs have important contribution to how political information may be imparted from one person to another....
3 Pages (750 words) Essay

The use of the internet among the youth fosters social cohesiveness

The social media have succeeded in creating a virtual society on the internet.... Peace and unity are social and cultural concepts referring to the cohesive societies in different par... Additionally, the internet is an unorthodox media that operates on the pull technology.... Unlike the traditional media, internet places the power of choice and censure on the hands of the user.... The youths in the modern society are addicted users of the internet, the advent of such social networks as Facebook and twitter revamped the trend thus increasing the youth's traffic to the internet by nearly eighty percent....
4 Pages (1000 words) Essay

How Xanga Influences Communication

Communication is considered to be one of most important parts of social life around the world; however its forms tend to be differentiated in accordance with the local culture and the personal attitudes of people… On the other hand, communication can have many aspects and refer to a general influence by specific published material (media) or to active involvement in a two-or more-sides communication channel (like the chat rooms in Internet).... In any case, communication should be However, as in all forms of social activities, communication should be based on specific criteria trying to avoid the development of relationships that may hide a risk for people participated....
10 Pages (2500 words) Essay

Technological Influences on Building Relationships

Technology only allows him to socialize more, not in person but with the aid of a number of tools like the office phone, the cell phone, Internet, computer and social media linkages.... This essay concerns the social networks that newcomers within an organization rely immensely in order to become acquainted comprise of Facebook, the company's internal databases and so on.... These social networks are understood by them as their saviors....
5 Pages (1250 words) Essay

An End in Itself: McLuhan, Media, and the Innovation Aesthetic

As a traditionalist/conservative, McLuhan, who had no substantial background in the technical or scientific fields, remained faithful to the “Western cultural legacy” in which he was steeped and which informed his views.... The essay "An End in Itself: McLuhan, media, and the Innovation Aesthetic" clearly indicates the emphasis on the medium at the expense of content.... hellip; media precludes the possibility that we can choose how to interact because it determines how people communicate....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us