preview

Apply Decision-Making Frameworks to It-Related Ethical Issue.

Good Essays

Since the dawn of civilization, man has sought to further communication and interaction with his fellow man. The motivation behind this pursuit has been many fold: Some sought and seek this interaction for economic purposes, some for cultural purposes, and some still for educational purposes. Regardless of the incentive, different people in different times have sought to enhance the technology so as to further this pursuit. From the advent of writing in pre-bronze age Mesopotamia to the creation of the printing press in Renaissance Germany to more modern inventions like the radio and telegraph, much of human history has been devoted to making this large world smaller and smaller and furthering our communication and interaction. In this …show more content…

Stacy’s situation is just one of many recent cases in which aspiring and practicing educators have faced unfortunate consequences because of the way others perceive the use of social networking tools such as MySpace and Face book. (Carter, Foulger & Ewbank, 2008). ” (www.pbworks.com, page 1)
The above mentioned example is one of many questioning the credibility of the social networking sites. The fact that anyone can go to a person’s profile and save his/her picture to be used as desired is uncomfortable and disturbing. Another method for the disruption of ethical boundaries in regards to these networking channels is their utilization to conduct predatory marketing. The level of discomfort is high when a product/service is offered to a user on the basis of the needs assessment done by the exploitation of personal information. Some employers are also the culprits due to the fact that they make hiring decisions on the basis of prospective employee’s social network activities. These and many other scenarios lead problem solvers to come up with alternatives and implement productive decisions.
The first step in the decision making process is to gather information about the problem. The best method to acquire this information is from the users through

Get Access