The ICT professionalism plays a vital role in every organization and also on the general public. ICT professional’s posses the comprehensive and the required understanding that is relevant to the body of knowledge. An ICT professional is the one who is eligible for the member of the profession level and should posses the discussed skills, capabilities and knowledge such as the theoretical and the factual knowledge of the ICT in the broader context; having the coherent knowledge of the field and involves the critical understanding of the principles and theories; exercise supervision and management related to the working environment; is committed towards the ethical professional practice against the code of conduct (Ramadhan, Indra, & Murni, 2011). The Information & Communication Technology includes the hardware, software and the intranet for sharing information by the organization. The moral values and Ethics play a major role in the functioning of an organsisation without being bias.The ICt professional are responsible for accvy promoting te standards which arepromie he ogansation with the supporting professionals and the professionalism (Ramadhan, Indra, & Murni, 2011). This essay will discuss the ethical issues of the ICt professionalism in the case of Samsung, Apple patent damage and develop an understanding of the ethical issues related to the ICT professionalism through the classic theories of ethics. In the case, the ICT professional are accountable for the effectiveness and quality of the work (Ramadhan, Indra, & Murni, 2011).
The ICT on the fast pace is persistently placing its role in everyone life and the approach through which the ICT professionals are performing the duties with the subject of the greater scrutiny (Ramadhan, Indra, & Murni, 2011). In the case, the ICT professional’s haven’t followed the code of conduct and crossed the company morals and ethical dilemmas and copied the Apple company patent products (Heersmink, van den Hoven, van Eck, & van den Berg, 2011). The company Samsung has to function as per the law, rules, and regulations of the ethics
The latest technology in the companies is required for the purpose of the exchange and also to store the important information required by the companies (Ramadhan, Indra, & Murni, 2011). For this, the ICT professionals are to e occupied with such skills and to take care that the required exchange of the data in an organization is done in an ethical way without losing the vital information to the other parties or organizations or misusing the required information for the personal interest (Heersmink, van den Hoven, van Eck, & van den Berg, 2011). The manipulation or copying the information of the company causes serious issues related to the ethical dilemma of the data security of an organization. In the case of the Apple VS Samsung, there is a serious concern related to the company’s ethical dilemma as the other company copied the patent services and features of the Apple product.
The code of conduct and ethics both offers the benchmark for the ICT professionals and the members mutually with the proficient standards. The ethics code, enshrined six principles which are to be followed by the ICT professionals are; primarily related to public interest, the excellence of life to be enhanced; honesty; competence; professional development and professionalism. Such principles of the ethics help the ICT professionals to uphold the unethical and the inappropriate challenges related to the usage of the technology (Ramadhan, Indra, & Murni, 2011).
The emergence usage of the data and technology increases the concerns related to the ethical behaviour among the ICT professionals. In the case, it was the responsibility of the Apple Company to keep the company data secure and confidently within the organization.
Ethics include the systematizations and the recommendations regarding what is the right and wrong concept. The different ethical theorist states that ICT professionalism is the valuable concept with the several pros and cons (McNamee, 2007). The ethical actions not only uplift the reputation of the company, whereas ethically the wrong doing also hurts the morale of the company and damage the relations. Discuss about the perception of ICT professionalism from different perspective of the ethical theories.
The consequentialist theory asserts that the simple ethical findings involve the conditions to be intrinsically good or bad. Utilitarianism is a vital theory of Consequentiality. Utilitarianism emphasizes to act morally auctioning in the right way to cause less harm and betterment in the larger way (McNamee, 2007). The theory provides the base for the ethical issues and develops the great understanding about the existence and the importance of the rights.
The theory of Consequentialist mainly emphasizes on the policies consequences within the constraints of justice. The present Consequentialist as the theoretically and practically sound approach towards the ethical issues related to the computer and information ethics.
Utilitarianism theory helps ICT professionals to act accordingly and perform the policies as per the cost base and benefits the society. Professionalism is to act for the good and not to harm or affect the individual for the self interest or benefits (Berzai, 2017). As per the theory, the professionals are enabled to act beyond emotions and to act profitably with the practical consequences and resolving the issues with the positive outcomes (Berzai, 2017). Theory of Utilitarianism in the ICT professionalism is the motive of achieving the personal relationship with the clients, society, employer and the co-professionalism (Berzai, 2017).
According to the theory of the Deontological; any action is done in the sense of duty, if the action is to be universalized then the action is to be right. All the concerned actions have the significance whether from such actions goods comes out and the theory values each and every individual value. Theory of deontological asserts that in case the action done is not to act in the correct way and constructs the better end (Berzai, 2017). The theory at first is encased with the rights of language. In the case the action is done with the sense of duty to the consumer and in the case the principle is universalized and hence the action of the company is to be right in the favour of the consumer (Berzai, 2017).
According to the theory, it values the rights of the each and every individual. The professional's act affects the social and physical environment; hence ethics play a vital role ICT professionals act.
Samsung, Apple patent case; ICT professionals of both organizations have to get hold of the lead for considering the implication of the ethics in the project and no individual is affected by such an action of the company (Davey, & Tatnall, 2014). The ethical dilemma of the company also desires the ICT professionals for taking into consideration the inference of such procedures on the employees, consumers, and others.
The ICT Professionalism consists of the various disciplines; each of such disciplines requires the wider sets of skills in order to knowledgeably embark on certain precise functions. Significantly, and in the light of how such vital ICTs become to the societies and virtually in different aspects of lives such as the finances, physical safety, and health. This becomes important increasingly that the professionals or the specialists employed or contracted, acquire the requisite attitude and competencies, and takes the complete responsibility for the work commence by them (Davey, & Tatnall, 2014).
Berzai, l. (2017). How Ethical Theories Apply to IT Professionals - Association of Information Technology Professionals. Aitp.org. Retrieved 10 May 2017, from https://www.aitp.org/news/93013/How-Ethical-Theories-Apply-to-IT-Professionals.htm
Davey, B., & Tatnall, A. (2014). Aspects of Professionalism, Ethics and Lifelong Learning for Australian ICT Professionals. Journal Of Law And Governance, 4(3). https://dx.doi.org/10.15209/jbsge.v4i3.164
Heersmink, R., van den Hoven, J., van Eck, N., & van den Berg, J. (2011). Bibliometric mapping of computer and information ethics. Ethics And Information Technology, 13(3), 241-249. https://dx.doi.org/10.1007/s10676-011-9273-7
McNamee, D. (2007). Information Ethics and Disaster Grants. Journal Of Information Ethics, 16(1), 70-73. https://dx.doi.org/10.3172/jie.16.1.70
Ramadhan, A., Indra, D., & Murni, A. (2011). e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics. International Journal Of Advanced Computer Science And Applications, 2(8). https://dx.doi.org/10.14569/ijacsa.2011.020816
Tavani, H. (2012). Computer Ethics as a Field of Applied Ethics. Journal Of Information Ethics, 21(2), 52-70. https://dx.doi.org/10.3172/jie.21.2.52
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Samsung In Apple Patent . Retrieved from https://myassignmenthelp.com/free-samples/samsung-in-apple-patent.
"Samsung In Apple Patent ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/samsung-in-apple-patent.
My Assignment Help (2018) Samsung In Apple Patent [Online]. Available from: https://myassignmenthelp.com/free-samples/samsung-in-apple-patent
[Accessed 01 April 2020].
My Assignment Help. 'Samsung In Apple Patent ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/samsung-in-apple-patent> accessed 01 April 2020.
My Assignment Help. Samsung In Apple Patent [Internet]. My Assignment Help. 2018 [cited 01 April 2020]. Available from: https://myassignmenthelp.com/free-samples/samsung-in-apple-patent.
Think, you have crafted an assignment spending hours and days. Now when you submit the paper, you are charged with copying.Majority of times non-referencing or referencing in incorrect manner can mar your chances of retaining academic reputation. Get all your papers checked with our mla citation machine,apa citation machine,harvard referencing generator etc. Well, to be double sure you can offcourse ask for our help.
Answer: Security Risk Assessment Security Risks, Threats and Vulnerabilities The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment . This form of risk assessment would be able to supp...Read More
Answer: Introduction: Australian Plastic Fabricators is one of the dynamic plastic fabrication company which is located in Sydney’s city fringe and is one of the Greater West supplying acrylic shop fittings to Sydney retail and shop fitting businesses. The organization is also considered to be the one stop shop for meeting all the needs related to Acrylic. Without any kind of doubt this organization can be considered to be the market le...Read More
Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...Read More
Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...Read More
Answer: Introduction Augmented Reality (AR) has emerged different technologies and it uses artificial intelligence and machine learning algorithms for providing a superimposed images and videos of real things for better understanding. In this report, AR technology will discuss with their uses in different fields as well as how it is beneficial for education system. AR is a latest technology, which is highly used for understanding of different t...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I got a 100 on my paper. Thank you for answer on such a short notice. It was a stiff price overall they responded and had me finish before my deadline!!!
My assignment you did was really excellent and I really like it. I will use this one again. thanks
this is the final assignment for this subject and did everything well and got a D grade for the subject.
this is the final group assignment and needed to upload on Turnitin. I could do my part really well and got a hd for this subject. great work guys.