The ICT professionalism plays a vital role in every organization and also on the general public. ICT professional’s posses the comprehensive and the required understanding that is relevant to the body of knowledge. An ICT professional is the one who is eligible for the member of the profession level and should posses the discussed skills, capabilities and knowledge such as the theoretical and the factual knowledge of the ICT in the broader context; having the coherent knowledge of the field and involves the critical understanding of the principles and theories; exercise supervision and management related to the working environment; is committed towards the ethical professional practice against the code of conduct (Ramadhan, Indra, & Murni, 2011). The Information & Communication Technology includes the hardware, software and the intranet for sharing information by the organization. The moral values and Ethics play a major role in the functioning of an organsisation without being bias.The ICt professional are responsible for accvy promoting te standards which arepromie he ogansation with the supporting professionals and the professionalism (Ramadhan, Indra, & Murni, 2011). This essay will discuss the ethical issues of the ICt professionalism in the case of Samsung, Apple patent damage and develop an understanding of the ethical issues related to the ICT professionalism through the classic theories of ethics. In the case, the ICT professional are accountable for the effectiveness and quality of the work (Ramadhan, Indra, & Murni, 2011).
The ICT on the fast pace is persistently placing its role in everyone life and the approach through which the ICT professionals are performing the duties with the subject of the greater scrutiny (Ramadhan, Indra, & Murni, 2011). In the case, the ICT professional’s haven’t followed the code of conduct and crossed the company morals and ethical dilemmas and copied the Apple company patent products (Heersmink, van den Hoven, van Eck, & van den Berg, 2011). The company Samsung has to function as per the law, rules, and regulations of the ethics
The latest technology in the companies is required for the purpose of the exchange and also to store the important information required by the companies (Ramadhan, Indra, & Murni, 2011). For this, the ICT professionals are to e occupied with such skills and to take care that the required exchange of the data in an organization is done in an ethical way without losing the vital information to the other parties or organizations or misusing the required information for the personal interest (Heersmink, van den Hoven, van Eck, & van den Berg, 2011). The manipulation or copying the information of the company causes serious issues related to the ethical dilemma of the data security of an organization. In the case of the Apple VS Samsung, there is a serious concern related to the company’s ethical dilemma as the other company copied the patent services and features of the Apple product.
The code of conduct and ethics both offers the benchmark for the ICT professionals and the members mutually with the proficient standards. The ethics code, enshrined six principles which are to be followed by the ICT professionals are; primarily related to public interest, the excellence of life to be enhanced; honesty; competence; professional development and professionalism. Such principles of the ethics help the ICT professionals to uphold the unethical and the inappropriate challenges related to the usage of the technology (Ramadhan, Indra, & Murni, 2011).
The emergence usage of the data and technology increases the concerns related to the ethical behaviour among the ICT professionals. In the case, it was the responsibility of the Apple Company to keep the company data secure and confidently within the organization.
Ethical Theories:
Ethics include the systematizations and the recommendations regarding what is the right and wrong concept. The different ethical theorist states that ICT professionalism is the valuable concept with the several pros and cons (McNamee, 2007). The ethical actions not only uplift the reputation of the company, whereas ethically the wrong doing also hurts the morale of the company and damage the relations. Discuss about the perception of ICT professionalism from different perspective of the ethical theories.
Consequentialist Theory
The consequentialist theory asserts that the simple ethical findings involve the conditions to be intrinsically good or bad. Utilitarianism is a vital theory of Consequentiality. Utilitarianism emphasizes to act morally auctioning in the right way to cause less harm and betterment in the larger way (McNamee, 2007). The theory provides the base for the ethical issues and develops the great understanding about the existence and the importance of the rights.
The theory of Consequentialist mainly emphasizes on the policies consequences within the constraints of justice. The present Consequentialist as the theoretically and practically sound approach towards the ethical issues related to the computer and information ethics.
Utilitarianism theory helps ICT professionals to act accordingly and perform the policies as per the cost base and benefits the society. Professionalism is to act for the good and not to harm or affect the individual for the self interest or benefits (Berzai, 2017). As per the theory, the professionals are enabled to act beyond emotions and to act profitably with the practical consequences and resolving the issues with the positive outcomes (Berzai, 2017). Theory of Utilitarianism in the ICT professionalism is the motive of achieving the personal relationship with the clients, society, employer and the co-professionalism (Berzai, 2017).
Deontological Theory
According to the theory of the Deontological; any action is done in the sense of duty, if the action is to be universalized then the action is to be right. All the concerned actions have the significance whether from such actions goods comes out and the theory values each and every individual value. Theory of deontological asserts that in case the action done is not to act in the correct way and constructs the better end (Berzai, 2017). The theory at first is encased with the rights of language. In the case the action is done with the sense of duty to the consumer and in the case the principle is universalized and hence the action of the company is to be right in the favour of the consumer (Berzai, 2017).
According to the theory, it values the rights of the each and every individual. The professional's act affects the social and physical environment; hence ethics play a vital role ICT professionals act.
Samsung, Apple patent case; ICT professionals of both organizations have to get hold of the lead for considering the implication of the ethics in the project and no individual is affected by such an action of the company (Davey, & Tatnall, 2014). The ethical dilemma of the company also desires the ICT professionals for taking into consideration the inference of such procedures on the employees, consumers, and others.
The ICT Professionalism consists of the various disciplines; each of such disciplines requires the wider sets of skills in order to knowledgeably embark on certain precise functions. Significantly, and in the light of how such vital ICTs become to the societies and virtually in different aspects of lives such as the finances, physical safety, and health. This becomes important increasingly that the professionals or the specialists employed or contracted, acquire the requisite attitude and competencies, and takes the complete responsibility for the work commence by them (Davey, & Tatnall, 2014).
Berzai, l. (2017). How Ethical Theories Apply to IT Professionals - Association of Information Technology Professionals. Aitp.org. Retrieved 10 May 2017, from https://www.aitp.org/news/93013/How-Ethical-Theories-Apply-to-IT-Professionals.htm
Davey, B., & Tatnall, A. (2014). Aspects of Professionalism, Ethics and Lifelong Learning for Australian ICT Professionals. Journal Of Law And Governance, 4(3). https://dx.doi.org/10.15209/jbsge.v4i3.164
Heersmink, R., van den Hoven, J., van Eck, N., & van den Berg, J. (2011). Bibliometric mapping of computer and information ethics. Ethics And Information Technology, 13(3), 241-249. https://dx.doi.org/10.1007/s10676-011-9273-7
McNamee, D. (2007). Information Ethics and Disaster Grants. Journal Of Information Ethics, 16(1), 70-73. https://dx.doi.org/10.3172/jie.16.1.70
Ramadhan, A., Indra, D., & Murni, A. (2011). e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics. International Journal Of Advanced Computer Science And Applications, 2(8). https://dx.doi.org/10.14569/ijacsa.2011.020816
Tavani, H. (2012). Computer Ethics as a Field of Applied Ethics. Journal Of Information Ethics, 21(2), 52-70. https://dx.doi.org/10.3172/jie.21.2.52
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Samsung In Apple Patent . Retrieved from https://myassignmenthelp.com/free-samples/samsung-in-apple-patent.
"Samsung In Apple Patent ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/samsung-in-apple-patent.
My Assignment Help (2018) Samsung In Apple Patent [Online]. Available from: https://myassignmenthelp.com/free-samples/samsung-in-apple-patent
[Accessed 24 January 2021].
My Assignment Help. 'Samsung In Apple Patent ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/samsung-in-apple-patent> accessed 24 January 2021.
My Assignment Help. Samsung In Apple Patent [Internet]. My Assignment Help. 2018 [cited 24 January 2021]. Available from: https://myassignmenthelp.com/free-samples/samsung-in-apple-patent.
Think, you have crafted an assignment spending hours and days. Now when you submit the paper, you are charged with copying.Majority of times non-referencing or referencing in incorrect manner can mar your chances of retaining academic reputation. Get all your papers checked with our mla citation machine,apa citation machine,harvard referencing generator etc. Well, to be double sure you can offcourse ask for our help.
Answer: Introduction Smiths Security is a firm located in Australia that deals with security businesses such as fire monitoring services, armored vehicles, alarm monitoring, and security guards. The head office is located in Sydney and has data center across all the major cities in Australia such as Brisbane, Perth, Melbourne, Adelaide, and Sydney). Sydney office houses the main data center. At every site there is 2 business application serve...
Read MoreAnswer: Project Title : Formation of IOT based Healthcare Mobile Application Fundamental Project Goal The goals of the ‘Formation of IOT based Healthcare Mobile Application’ project are, Formation of Mobile Application: The mobile application was developed for easing the functions of the organization. The ‘Formation of IOT based Healthcare Mobile Application’ project would result in forming the mobile application sup...
Read MoreAnswer: Section 1: Operating System Client System: The client system is the group of client or can be an individual system also. By the meaning of group it mainly indicates an organization, community or a business. The client system mainly used for communicating with a server. To elaborate the client system further in this case the Microsoft Windows operating system will be used because the Microsoft Windows has all the features which is req...
Read MoreAnswer: Introduction Malicious is a kind of malware software which is very harmful to human-computer systems. There are many forms of a malware attack, for example, viruses, spyware, rootkits, worms, and adware. In the last few years the rate of malicious attacks is increasing very fast because many consumers use wireless networks which are very less secure and hackers use malware software to block computer systems. The main purpose of ...
Read MoreAnswer: Task 1: Cost of operating the business Considering the operations of Fiction life, both Albert and Bernita work 2 and half hours a day for 3 days each, while Chris works 5 hours each day for 5 days in a week making a total of 25 hours each week. The total Annual wages for Chris sum up to $28,600, while the wages of the casual worker who stands in for Chris during his 4 week annual leave are $3,300. In addition, the total annual ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I am very pleased with this assignment. It was written well and met the requirements that was needed to complete the assignment. I made the necessary grammarly corrections and submitted it on time. I will use this expert again
Australia
I would like to continue working with this writer. He/she was on point. Thanks a lot for your help. This will allow me to understand the topic better and develop the real work.
Australia
Report wriiten as expected but waiting to be graded. I have to change some of the wording but happy with report so far. Lets hope i get a good grade this time.
Australia
Very Good Service provided by My Assignment Help to help me get my scored in all my examination.
Australia