Ethical, Legal, And Social Issues In Technology

Ethical,Legal, And Social Issues In Technology

Institutionaffiliation:

Ethical,legal, and social issues in technology

Application of research into ethical, legal, and social attributesin information technology contributes greatly to theinterdisciplinary facet of technology. In this regards, Stahl, Eden,Jirotka, &amp Coeckelbergh (2014) assert that research in technologyusually breaks down into two scientific models i.e. design scienceand behavioral science thus, researchers or network administratorsusually encounter various legal, social, and ethical issues. Researchis an imperative facet in technology as numerous issues of social,legal, and ethical such as copyrights, netiquette, privacy, security,citizen journalism, and cybercrimes arise in most technologicalattributes (Craighead, Ketchen, Dunn, &amp Hult, 2011). In thisregards, the discourse offers a context on the legal, social, andethical issues that a network administrator can encounter in variousfields of technology such as in communication or informationtechnology.

One of the mostprevalent issue that most network administrators encounter whether interms of legal, social, or ethical facets is the issue of privacy.Organizations or governments collect vast amounts of information anduse the information for security, demographics, analysis, controllingexpenses, or gaining market share (Case, 2012). In this regards,research and innovation into technology has allowed the developmentof interdisciplinary attributes in technology, which have changed thescope of what organizations or governments can collect and process.The issue of privacy arises regarding what data should a networkadministrator collect and process concerning consumers of technology.In addition, protecting the information collected may raise legal andethical dilemmas for network administrators if they fail to initiateconfidential and set authorization procedures for accessing thesedata.

On the otherhand, Stahl et al. (2014) assert that researchers in technology raiseissues of netiquette for network administrator. Netiquette involvesthe etiquette of online networking that administrators shoulddevelop. In this regards, it highlights the dos and don’ts, ofnetworkers thus, encompasses legal, social, and ethicalconsiderations. Some of the rules of netiquette include social codesof communication, philosophy of effective communication, and moraland social code of internet based human attributes. Some of thenetiquette issues that network administrators experience and whichthey should avoid include cross-posting, multiposting, hijacking adiscourse thread, and off-topic posting (Case, 2012). In thisregards, administrators need to realize the correct netiquette toutilize and subject their systems and themselves to such rules. Infact, failure to follow some rules may result to confrontations orlitigations.

Stahl et al.(2014) and Craighead et al. (2011) assert that researchers continueto apply responsible research and invention (RRI) in the field oftechnology to address some of the limitations of technology ethics,legal issues, and social issues. Technology has considered thesignificance of legal, social, and ethical issues for long, includingquestions of good and bad, regulations, and perceptions. In thisregards, issues of security and cybercrimes have developed asprevalent social, ethical, and legal aspects that people experience.For example, the slippery slope has seen numerous networkadministrators scan employees’ emails and messages or divertingmessages to wrong recipients, sending spams, or reading people’smessages without their consent. Administrators can therefore, usethe illegally collected information to embarrass a person, get theperson dismissed, blackmail, or for gaining political mileage (Case,2012). In addition, administrators may use their knowledge ofnetworking to reveal company secrets despite signing agreementsdisallowing them from revealing trade secrets. The aforementionedissues relate to cybercrimes and security since they lead to legalramifications or inhibit the security of technologies.

References

Case, D. O. (Ed.). (2012).&nbspLooking for information: A surveyof research on information seeking, needs and behavior. EmeraldGroup Publishing.

Craighead, C. W., Ketchen, D. J., Dunn, K. S., &amp Hult, G. G.(2011). Addressing common method variance: guidelines for surveyresearch on information technology, operations, and supply chainmanagement.&nbspEngineering Management, IEEE Transactionson,&nbsp58(3), 578-588.

Stahl, B. C., Eden, G., Jirotka, M., &amp Coeckelbergh, M. (2014).From Computer Ethics to Responsible Research and Innovation in ICT:The transition of reference discourses informing ethics-relatedresearch in information systems.Information &amp Management.