Ethics is an essential part of any profession. The business ethics, along with the personal ethics needs to be followed. Considering the case study of targeting a broken heart, people have the tendency to post the stories of the breakup on the social networking sites such as Facebook (University, 2017). In a recent study on how the online behaviour of the people gets affected on their breakup moments has revealed the fact that people tend to post their personal issues and the reasons of their breakup (Berry, 2013). There is often a gap between the breakup and the Facebook post announcing the breakup. However, Facebook uses data mining and displays certain advertisements, targeting the broken and weak heart (Cohen, 2016). However, the people having recent breakup tends to get attracted to those offers made in the advertisements, committing various mistakes.
On the part of the company, Facebook, it is unethical to take advantage of the weaknesses. However, since Facebook uses data mining and other technology to offer its users relevant advertisements and offers made based on their recent posts, hence it cannot be called unethical. This is because, Facebook does not have the intelligence to judge the emotional turmoil of the person and hence it cannot judge whether to exploit the weakness of the people or not.
Professionalism is one of the basic ethical considerations that a person or a company needs to have, while engaging in a business. It refers to the ethics and competencies that is expected of a professional person or company. In the case study of Facebook targeting the weak heart, lack of professionalism has been seen. This is because, the information technology on which the company works has artificial intelligence (DeMartino & McCloskey, 2016). However, the artificial intelligence is not smart enough to judge whether to target the weak heart or not. Thus, the company needs to upgrade its software and technology such that information communication technology could be used in an efficient manner. Professionalism needs to be incorporated while designing the technology on which Facebook works. Moreover, as seen in the case study of Machado, he was the first person who was convicted at the age of 19 years, for sending life threatening hate mails to 56 Asian students ("Machado Case Materials", 2017). This is an example of utter misuse of the information technology and communication. Email is one of the most widely used information technology system for communication (Dent & Whitehead, 2013). This was misused by Richard Machado and had a deep social and ethical impact along with setting a wrongful example of misuse of internet and information technology and communication.
The advent of information technology and communication is a boon to the society and needs to be used effectively by the people of the society. However, the misuse of the email, to send threatening mails to 56 Asian students was a clear misuse of the information technology and communication.
Intellectual property includes the copyrights and patents that give exclusive rights to the person to for the inventions or other intellectual properties. The lack of privacy or infringement of the intellectual properties in the cyberspaces include the copyright of the online articles, unauthorized use of online data, breach of data privacy, and entering into personal cyberspace (Hubman et al., 2015). Copyright infringement includes the unauthorized download of pirated softwares, games, music, movies. The data privacy needs to be protected and only authorized softwares and music should be used. Moreover, the privacy of each person needs to be respected in the cyber world, thus, maintaining the integrity of the individuals. Digital copyright violation is a crime and needs to be refrained from (Weckert & Lucas, 2013). The business giants ensure that they do not exchange critical information in the cyber space, as the cyber space is vulnerable to authorized access and hacking. Thus, importance has to be given to the protection of intellectual property on the cyberspace, along with avoidance of using pirated software and music. Protection of intellectual property is an ethical issue and each professional needs to protect the privacy of the users (University, 2017). However, it might be argued that, since Facebook is a social platform, and the users are sharing their private information in a public platform, hence the use of data mining for suggesting events is justified and not a violation of privacy or infringement of personal property in the cyberspace.
Cyber ethics is referred to as the study of the legal and social issues, involving the cyber technology. The cyber ethics incorporates the moral and social values in the cyber world. Cyber ethics is essential to be maintained while incorporating information technology and communication. In the case of Facebook targeting the broken heart, the cyber ethics is violated. Though Facebook is a business house and the advertisements and offers are presented with the motivation of earning money, however, the cyber ethics need to be maintained. It has been highlighted by the researchers, that the posts made by men, have phrases such as “healing”, “drowning sorrow”, days before they announce their breakup. However, the posts made by the women have these phrases on the actual announcement (Reddy & Reddy, 2014). Hence, it is unethical that that Facebook mines its user’s posts and offer advertisements and offers taking the advantage of their weakness. In order to maintain cyber ethics, Facebook should avoid mining into the posts of the users especially with certain keywords that is indicative of a breakup (Spahn, 2014). Moreover, when the status of a person is changed to single, with indicative posts, the suggestive advertisements need to be stopped. However, certain offers for therapeutic treatment and counselling might be given to the users, with the intension of relieving them of the trauma that they are going through. Cyber ethics will be maintained if the use of data mining is directed towards the well-being of the people undergoing a breakup phase.
Berry, D. (2013). Ethics and media culture: Practices and representations. CRC Press.
Cohen, A. I. (2016). Ethics and Professional Practice. In Practicing Professional Ethics in Economics and Public Policy (pp. 237-244). Springer Netherlands.
DeMartino, G. F., & McCloskey, D. N. (2016). The Oxford handbook of professional economic ethics. Oxford University Press.
Dent, M., & Whitehead, S. (2013). Managing professional identities: Knowledge, performativities and the'new'professional (Vol. 19). Routledge.
Hubman, J. M., Doyle, Z. B., Payne III, R. L., Woodburn, T. F., McDaniel, B. G., & Giordano, J. V. (2015). Ethical Considerations in the Cyber Domain. In Evolution of Cyber Technologies and Operations to 2035 (pp. 163-174). Springer International Publishing.
Machado Case Materials. (2017). Computingcases.org. Retrieved 2 May 2017, from https://computingcases.org/case_materials/machado/machado_case_intro.html
Reddy, G. N., & Reddy, G. J. (2014). A Study of Cyber Security Challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.
Spahn, T. E. (2014). Professionalism vs. Ethics. Experience, 24, 47.
University, S. (2017). Targeting a Broken Heart. Scu.edu. Retrieved 2 May 2017, from https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/targeting-a-broken-heart/
Weckert, J., & Lucas, R. (2013). Professionalism in the information and communication technology industry. ANU Press.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Ethics And Professional Practices: Profession. Retrieved from https://myassignmenthelp.com/free-samples/ethics-and-professional-practices-profession.
"Ethics And Professional Practices: Profession." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/ethics-and-professional-practices-profession.
My Assignment Help (2018) Ethics And Professional Practices: Profession [Online]. Available from: https://myassignmenthelp.com/free-samples/ethics-and-professional-practices-profession
[Accessed 27 January 2021].
My Assignment Help. 'Ethics And Professional Practices: Profession' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/ethics-and-professional-practices-profession> accessed 27 January 2021.
My Assignment Help. Ethics And Professional Practices: Profession [Internet]. My Assignment Help. 2018 [cited 27 January 2021]. Available from: https://myassignmenthelp.com/free-samples/ethics-and-professional-practices-profession.
MyAssignmenthelp.com has been providing assignment help online to thousands of students in Australia. 99% of them are satisfied with our assignment writing services because they receive cheap homework help without compromising the quality of the paper. Our experienced and skilled assignment writers always pay attention to assignment requirements that help them craft high quality papers.
Answer: A parameter, as used in computer programing language, is a form of variable such as string, integer, double or float that is usually passed into functions, methods or procedures (Carpenter et al., 2017). Parameter comprises of those variables that are usually passed in a subroutine. They determine the computation of the functions or programs receiving those variables (Felleisen et al., 2018 ). Parameters are used to provide a platform...
Read MoreAnswer: When you build an Java application project that has a main class, the IDE automatically copies all of the JAR files on the projects classpath to your projects dist/lib folder. The IDE also adds each of the JAR files to the Class-Path element in the application JAR files manifest file (MANIFEST.MF). To run the project from the command line, go to the dist folder and type the following: java -jar "FlexiRent.jar" To distribute th...
Read MoreAnswer Task 1 Section 1 The concept of risk assessment can be considered as the identification of hazards that would directly impact the overall working of the organisation. The concept which can be applied to the aspect is detect business risk and provide processes, measures and control which would be directly reducing the impact of the risk to the operation of the business (Wood and Dandin 2017). The main aspect which would be taken into con...
Read MoreAnswer: import java.awt.BorderLayout; import java.awt.FlowLayout; import java.awt.GridLayout; import javax.swing.JTextField; import javax.swing.*; import java.awt.event.ActionEvent; import java.awt.event.ActionListener; import javax.swing.JButton; public class TemperatureConverter extends JFrame implements ActionListener { // instance variables JLabel fahrenheitLabel; JL...
Read MoreAnswer Introduction Businesses cannot pass by the benefits of modern innovations such as smartphones, laptops and cloud computing to their operations. Firms are enjoying a growth in mobility, return on investment and productivity at minimal expenses by using emerging technologies to store and manage their data. However, Security concerns are growing over the use of technologies in handling the data of companies. Company data is exposed to cyb...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I am writing to you to let you know that I am extremely impressed with your recent work. You\'ve dedicated years of service to this company, and your work exemplifies and principles now more than ever. Thank you for all that you have done to help us ...
Australia
Very good experience, so happy with the result. Very highly and strongly recommend this website.
Australia
I got a good price and quality work was provided to me in a short period of time. I scored really well in my assignment. All the rework was done in time which is great.
Australia
They have provided me with work having 0% plagiarism which really helped me to score well in my assignment.
Australia