Module2MethodsofEthicalAnalysis-IFSM3046982EthicsinInformationTechnology2215.pdf

6/23/21, 8:01 AMModule 2: Methods of Ethical Analysis – IFSM 304 6982 Ethics in Information Technology (2215)

Page 1 of 6https://learn.umgc.edu/d2l/le/content/581297/viewContent/21812984/View

Module 2: Methods of Ethical Analysis

Module 2: Methods of Ethical Analysis

Topics

Applica!on of Ethical Theories

Methods for Ethical Analysis

Applica!on of Ethical Theories

In module 1, we acquired a founda!on in classical ethical theories. In this module, we will learn how to apply this

knowledge to ethical challenges in today’s business world and, more specifically, to the area of informa!on

technology.

As we learned in module 1, the main tradi!onal ethical theories tend to be either rule-based (deontological) or

consequen!alist (teleological). Both types of theories provide a framework for deciding whether ac!ons are right,

depending upon the consequences that result from the ac!on (consequen!alist) or whether the ac!on follows the

relevant rules for ethical behavior (deontological). Tradi!onal ethical theories were intended to apply universally to

ethical dilemmas and obviously didn’t factor in issues such as marketplace compe!!on, stockholders, and today’s

ever-changing world of informa!on technology. Today’s IT manager needs to be able to address ethical issues and

to find resolu!ons in concrete business terms rather than engage in a philosophical ethical debate. However, we

can use those theories to guide our ethical decision-making process.

In addi!on to the ethical theories already presented, business ethics a”empts to take tradi!onal ethics and apply

them prac!cally to a business context. The norma!ve theories of business ethics (NTBE), introduced to the

informa!on systems community in large part by Smith and Hasnas, provide three basic approaches to ethical

problems: stockholder, stakeholder, and social contract theories (Smith, 2002). In this sec!on, we will introduce

those theories as well as make connec!ons to classical theory.

Norma!ve Theories of Business Ethics

As its name indicates, the stockholder theory of NTBE focuses on making ethical decisions that benefit

stockholders. According to this theory, because stockholders have invested in the company for their own profit,

ac!ons taken by the company should be focused on benefi!ng the bo”om line. A manager or employee has a

responsibility to use corporate resources in ways that do not take away from the stockholders’ benefits.

IFSM 304 6982 Ethic… Tasian Berryman

Course Home Syllabus Content GradesAc!vi!es and Assessments My Tools Academic Support More

Table of Contents Week Two – Jun. 23 to Jun. 29 Content Module 2: Methods of Ethical Analysis

https://learn.umgc.edu/d2l/le/content/581297/navigateContent/699/Previous?pId=21812869

https://learn.umgc.edu/d2l/le/content/581297/navigateContent/699/Next?pId=21812869

https://learn.umgc.edu/d2l/home/581297

https://learn.umgc.edu/d2l/lp/ouHome/defaultHome.d2l

https://learn.umgc.edu/d2l/home/581297

https://learn.umgc.edu/d2l/common/dialogs/quickLink/quickLink.d2l?ou=581297&type=lti&rcode=UMUC-3534594&srcou=6606&launchFramed=1&framedName=Syllabus

https://learn.umgc.edu/d2l/le/content/581297/Home

https://learn.umgc.edu/d2l/lms/grades/index.d2l?ou=581297

javascript:void(0);

https://learn.umgc.edu/d2l/le/content/581297/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-21812855

https://learn.umgc.edu/d2l/le/content/581297/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-21812869

6/23/21, 8:01 AMModule 2: Methods of Ethical Analysis – IFSM 304 6982 Ethics in Information Technology (2215)

Page 2 of 6https://learn.umgc.edu/d2l/le/content/581297/viewContent/21812984/View

responsibility to use corporate resources in ways that do not take away from the stockholders’ benefits.

Stockholder theory instructs managers to act within legal constraints. It does not instruct or encourage managers

to ignore ethical constraints.

Stakeholder theory expands a manager’s responsibility beyond the stockholders to include anyone with an interest

in the firm. This could include employees, customers, stockholders, and poten!ally even compe!tors. Given that

there is a poten!al conflict among the interests of the various stakeholders, the manager’s challenge is to balance

those interests and to provide the best possible solu!on that does not substan!ally infringe on any individual

stakeholder group.

According to social contract theory, businesses have ethical obliga!ons to benefit society by fulfilling customer

and employee interests within the generally accepted rules or codes. If there were a hypothe!cal contract between

society and a group of individuals who wished to establish a business, what would the la”er need from society—

and what would society expect in return? The terms of this hypothe!cal contract would outline both those sets of

expecta!ons. Therefore, in giving the group of individuals rights to act as an organiza!on, use resources, and hire

employees, a society would have expecta!ons related to fair treatment of employees, appropriate uses of natural

resources, and so on. (Smith, 2002).

Figure 2.1 illustrates the various links between business ethics and tradi!onal ethical theories to show the

con!nuing relevance of the la”er. To find out more about the connec!ons between NTBE and tradi!onal ethics,

click on the !tles under Norma!ve Theories of Business Ethics and read the informa!on contained in the pop-up.

Figure 2.1

Linkages between Tradi!onal Ethical and Business Ethics Frameworks

(Adapted from Smith, H. J. (2002). Ethics and Informa!on Systems: Resolving the Quandaries. The DATABASE for

Advances in Informa!on Systems (Summer 2002), p. 5.)

As you can see from the do”ed lines in figure 2.1, the modern and tradi!onal elements do have connec!ons and

rela!onships despite their various origins and applica!ons. As you become more familiar with each of these areas,

the similari!es and differences will become clearer.

(/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-

try-this-booksellers.html?ou=581297)

Try This 2.1: Booksellers, Inc – Please go to My

Tools -> Self Assessments-> to complete this

self assessment.

Methods for Ethical Analysis

https://leocontent.umgc.edu/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-try-this-booksellers.html?ou=581297

6/23/21, 8:01 AMModule 2: Methods of Ethical Analysis – IFSM 304 6982 Ethics in Information Technology (2215)

Page 3 of 6https://learn.umgc.edu/d2l/le/content/581297/viewContent/21812984/View

Methods for Ethical Analysis

Now that you’ve had some prac!ce in working through an ethical decision-making scenario, let’s look at various

structured approaches for addressing such situa!ons. There are several ways to systema!cally approach an ethical

dilemma. Each has merits, and each will result in an ethical decision if straigh$orwardly and honestly applied. As

you will see, the various approaches are similar yet have somewhat different slants.

Reynolds Seven-Step Approach

George Reynolds uses a seven-step ethical decision-making approach that is summarized in table 2.1.

Table 2.1

Reynolds’ Seven-Step Ethical Decision-Making Approach

Steps Descrip!on

1. Get the facts
Before proceeding, ensure that you have assembled the relevant facts regarding the ethical

issue that you’re addressing.

2. Iden!fy the

stakeholders

Iden!fy who is impacted by this situa!on and its subsequent resolu!on. Define what their role

is as well as what would be the best-case outcome for each stakeholder group.

3. Consider the

consequences

What are the benefits and/or harm that could come from your decision to you individually, the

stakeholders, and the organiza!on as a whole?

4. Evaluate the

various guidelines,

policies, and

principles

First look to any applicable laws, then to any exis!ng corporate policies, ethical codes, and

individual principles. Look at the applica!on of tradi!onal ethical theories as well as Norma!ve

Theories of Business Ethics.

5. Develop and

evaluate op!ons

You may iden!fy several possible solu!ons and may find it useful to support each with key

principles that support the recommenda!on. Your chosen solu!on should be ethically

defendable and, at the same !me, meet the stakeholder and organiza!onal needs and

obliga!ons.

6. Review your

decision

Review your decision in rela!onship to your personal and the organiza!on’s values. Would

others see this as a good and right decision?

7. Evaluate the

results

Did the final outcome achieve the desired results? This is an important step to help develop

and increase your decision-making abili!es.

(Adapted from Reynolds, G. W. (2003). Ethics in Informa!on Technology, pp.115-118.)

Kidder’s Nine-Steps

In his book How Good People Make Tough Choices, Rushworth Kidder presents a similar process; however, he

defines four dilemmas by which various moral issues could be categorized (Kidder, 1995, p.18).

Truth versus loyalty

Individual versus community

Short-term versus long-term

6/23/21, 8:01 AMModule 2: Methods of Ethical Analysis – IFSM 304 6982 Ethics in Information Technology (2215)

Page 4 of 6https://learn.umgc.edu/d2l/le/content/581297/viewContent/21812984/View

Short-term versus long-term

Jus!ce versus mercy

Kidder’s Nine-Steps are:

1. Recognize that there is a moral issue.

2. Determine the actor (whose moral issue is it?).

3. Gather the relevant facts.

4. Test for right-versus-wrong issues.

5. Test for right-versus-right paradigms (what sort of dilemma is this?).

6. Apply the resolu!on principles (ends-based, rule-based, or care-based).

7. Inves!gate the “trilemma” op!ons (look for common ground or compromise).

8. Make the decision.

9. Revisit and reflect on the decision. (Kidder, 1995, p. 183-187)

Kidder places “recognize that there is a moral issue” as the first step in the analysis for two reasons. First, it helps

to ensure that issues receive the a”en!on required. Secondly, it encourages a person to adequately address moral

ques!ons and dis!nguish moral issues from other situa!ons involving social conven!ons or contradictory values

that could be “economic, technological, or aesthe!c” rather than moral issues (Kidder, 1995, p. 183). A%er

evalua!ng for legal compliance, Kidder advocates some common sense checks such as “How would you feel if

what you are about to do showed up tomorrow morning on the front pages of the na!on’s newspapers?” Then, he

evaluates the issue to iden!fy which of the four dilemmas listed above apply to gain be”er clarity around the

dilemma, iden!fying the conflict at hand. (Kidder, 1995, p. 184).

Spinello’s Seven-Step Process

Richard Spinello provides a similar seven-step process for ethical analysis designed specifically for IT professionals,

and it is geared toward development of public policy and law. His sixth step entails adding an original norma!ve

conclusion: what should happen? His seventh step includes the ques!ons: “What are the public-policy implica!ons

of this case and your norma!ve recommenda!ons? Should the recommended behavior be prescribed through

policies and laws?” This approach can be useful for IT organiza!ons seeking to be”er structure and define policies

and procedures (Spinello, 1997, p. 45).

Here are all Seven-Steps:

1. Iden!fy and formulate the basic ethical issues in each case. Also, consider legal issues and whether ethical and

legal issues are in conflict.

2. What are your first impressions, your moral intui!on about the problem?

3. Consult appropriate formal guidelines, the ethical and/or professional codes.

4. Analyze the issues from the viewpoint of one or more of the three ethical frameworks.

5. Do the theories lead to a single solu!on, or do they offer compe!ng alterna!ves? If compe!ng, which

principle or avenue of reasoning should take precedence?

6. What is your norma!ve conclusion—what should happen?

6/23/21, 8:01 AMModule 2: Methods of Ethical Analysis – IFSM 304 6982 Ethics in Information Technology (2215)

Page 5 of 6https://learn.umgc.edu/d2l/le/content/581297/viewContent/21812984/View

6. What is your norma!ve conclusion—what should happen?

7. What are the public-policy implica!ons of this case and your norma!ve recommenda!ons? Should the

recommended behavior be prescribed through policies and laws?

Many common business ac!vi!es, such as process improvement, problem solving, and project management, have

defined approaches to support their process. To effec!vely make ethical decisions, it also is extremely useful to

have a structure to approach the problem. As a beginning step, have an understanding of the available

methodologies for approaching the issue in an objec!ve manner. Eventually, skill and experience in applying the

process will enable you to explain your process and subsequent recommenda!ons to other stakeholders.

One of the challenges for those working in IT is the lack of precedence in some situa!ons. The more you can apply

a well-grounded methodology when faced with a new or ambiguous ethical dilemma, the greater the likelihood

that you can come to an ethical solu!on that will effec!vely balance individual, organiza!onal, and/or social

concerns with good business.

Ul!mately, you need to use an analy!cal approach that works for you and for your organiza!on. It may be one of

the approaches we’ve discussed, or it may be a hybrid. Individual values will also drive the approach. In addi!on to

these theories, corpora!ons and professional associa!ons have a”empted to provide guidance through corporate

codes of conduct or professional codes of ethics. Corporate codes of conduct typically are intended to apply to all

employees and, therefore, do not specifically address IT issues. However, some IT organiza!ons establish

addi!onal policies related to so%ware use and so on. Professional associa!ons, such as the Associa!on for

Compu!ng Machinery (h”p://www.acm.org/serving/se/code.htm) (ACM), have established code of ethics for its

members to help guide their ac!vi!es.

Many of the ethical issues that arise within the field of informa!on technology fall into similar areas. Richard

Mason, a professor in Management Informa!on Systems, has iden!fied four ethical areas in the Informa!on Age

that have been widely accepted as key issues (Mason, 1986):

Privacy

Accuracy

Property

Accessibility

These will be discussed in more detail in module 3.

(/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-

try-this-ten-commandments.html?ou=581297)

Try This 2.2: Ten Commandments of

Computer Ethics – – Please go to My Tools ->

Self Assessments-> to complete this self

assessment.

With the informa!on presented in this module, you should be able to apply a structured approach to an ethical

dilemma. The scenario presented below under Try This 2.3 will provide you with an opportunity to do just that.

When you’ve completed that exercise, you’ll be ready to move on to the Self-Assessment.

(/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-

try-this- ithere.html?ou=581297)

Try This 2.3: ItHere Ethical Dilemma –

Please go to My Tools -> Self Assessments->

to complete this self assessment.

http://www.acm.org/serving/se/code.htm

https://leocontent.umgc.edu/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-try-this-ten-commandments.html?ou=581297

https://leocontent.umgc.edu/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-try-this- ithere.html?ou=581297

6/23/21, 8:01 AMModule 2: Methods of Ethical Analysis – IFSM 304 6982 Ethics in Information Technology (2215)

Page 6 of 6https://learn.umgc.edu/d2l/le/content/581297/viewContent/21812984/View

Task: View this topic

try-this- ithere.html?ou=581297)

References

Barquin, R. C. (1992). Ten commandments of computer ethics. Retrieved August 19, 2005, from

Ac!vity Details

https://learn.umgc.edu/d2l/le/content/581297/navigateContent/699/Previous?pId=21812869

https://learn.umgc.edu/d2l/le/content/581297/navigateContent/699/Next?pId=21812869

https://leocontent.umgc.edu/content/umuc/CourseDevelopment/equella/ifsm304/quizzes/m2-try-this- ithere.html?ou=581297

javascript:void(0);

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY