Developing A Set Of Ethics For Computing Operations: A Research Proposal

Aim

This research proposal depicts the importance of implementing different ethical aspects in the computing society. It has been assumed that computer technology causes most of the ethical issues in the computing society. Due to lack of ethical aspects most of the computing industries are currently facing major challenges throughout. In order to resolve those issues proper implementation of set of ethics are needed to be developed. A literature review background and selection of research methodologies are developed in this paper. In addition to this, a research planning schedule is also implemented to divide the entire workload in small segments.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

According to Pearlson, Saunders and Galletta (2016) usages of traditional ethics are one of the important things that are strictly required to be considered by any computing organization. Both traditional as well as current ethical theories can be considered by the management authorities of the business organizations to resolve different sort of ethical issues. In order to serve accurate objectives and rationalist ethics proper mind set is needed must be arranged.  However, consideration of policy vacuums and conceptual muddles are also needed. 

The aim of this research proposal is to develop set of ethics considering the standards of ethics in computing operation. In order to minimize the operational issues ethics is referred to as one of the major factors that are strictly required to be considered.

In order to develop a set of ethical approaches in computing operation triple project constraints such as time, scope and cost are installed. It is determined that in order to complete the proposal 80 days are required and $40,000 are determined.

  • To identify the ethical issues in computing operation
  • To develop professional set of ethics
  • To investigate on different ethical components and to consider the most suitable components.
  • What are the issues associated to computing operation?
  • What is the professional set of ethics to be developed for minimizing the computing operational issues?
  • What are the challenges in code of ethics?

Ethics is referred to as the moral philosophy that helps to address the question about what is right and what is wrong. According to the computing committee administrator’s, globalization must be implemented throughout the curriculum of the computing operation. It is determined that different sorts of cultural differences are exiting in different computing society, but Pearlson, Saunders and Galletta (2016) stated that, all of the computing society are required to believe in some of the standard principle of ethics.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Information technology the branch of engineering deals with computer and its usage for transmitting, retrieving and storing data in the data server or data storage.  This particular literature review depicts the importance of implementing set of professional ethics while dealing with different computing operations (Larson and Gray 2013). The necessity of ethical integrity set of standard ethics developed by the board of directors of different of different ethics developing society. In addition to this the role of ethics in information technology and the challenges associated to the code of ethics are also demonstrated in this literature review (Murthy 2013). Apart from the consideration of lack of ethical aspects both the commercial and computing workplace are facing major challenges throughout. Even the ways through which the ethical challenges could be mitigated are also elaborated in this literature review paper.

In the year of 1980 the Atomic Energy of Canada Limited (AECL) discovered radiation treatment machine for cancer named as Therac 25 and it was completely based on computing operation and the operation of the system were also controlled by the computing operation (Lewis and Westlund 2015). However, during the usage of this technical solution many patients faced serious health issues. Though after investigation it was determined that the issues occurred due to improper system testing and serious computing errors.

Research Constraints

Computer ethics is a part of practical philosophy that is concerned about the ways through which the professionals might make proper decision regarding professional as well as social conduct (Russell, Dewey and Tegmark 2015).  In the history of civilization, computing and communication is referred to as one of the most important tools that enables. Data quality maintains the accuracy and consistency of data over the life cycle (Murthy 2013). If any data get hijacked or accessed by the external users then the confidentiality of the data server will be diminished (Bowen Hung-Baesecke and Chen 2016).  The broad overview of different types of data integrity should be developed considering the ethical approaches.

Each and every advanced in the information technology are accompanied with at least one ethical quandary. The software developers, business and individual must think about the rights and wrong of the information technology every day (Hughes, Cox and Akhir 2016). After considering the information technology and application of the information technology information ethics are needed to be investigated properly.

There are several challenges of ethics related to computing operations that must be solved at any cost in order to main data integrity and the consistency of IT systems (Budiono and Sawitri 2017). The main challenge of ethics in computing arises from the development of technology in the hands of unethical users that mainly use IT systems for negative and unethical purposes including hacking into other systems, online fraud and others. Some other challenges of ethics include inappropriate use of IT systems, use of the systems for personal gain, phishing on other people’s profiles and others (Pearson 2013). These challenges can seriously affect the daily operations and reputation of an organization or even the privacy of a particular user.

Various organizations around the world have devised and implemented several codes of professional ethics in order to ensure there is a fair usage of IT systems. Most of the challenges in IT systems arise from unfair usage of the systems for personal gain and harming other individuals or organizations (Alexander, Walker and Naim 2014). By implementing code of professional ethics, the organizations are trying to ensure the IT systems are used fairly and the privacy of confidential information is not breached by any means (Pearlson, Saunders and Galletta 2016). Moreover, IT employees are trained to use professional and technical skills at work rather than using the IT systems with unfair means and purposes

Conclusion

From the overall discussion it can be concluded that due to lack of ethical approaches most of the computing societies are currently facing major challenges. In order to mitigate those challenges implementation of proper code of ethics considering the standard principles are required (Agarwal and Dhar2014). Not only this but also the challenges of computing operation and the challenge mitigation approaches are also demonstrated in this literature review.  

Research methodology helps the researchers to define the most valuable and appropriate approaches those are necessary to make successful completion of resultant processes. In this section the research philosophy, research approaches, research design methods, data collection and data techniques are elaborated precisely.

Research Objectives

With the help of research philosophy appropriate manner to gain details of the research topics become easier to the viewers rather consumers. Whether the assumption process is correct or not can be easily determined with the research philosophy. There are three different kinds of research philosophy such as realism, positivism and interpretivism are available. Based on the type of research topic the accurate philosophy should be selected.

For developing set of professional ethics in computing operation instead of positivism and interpretivism approaches a mixed approach like realism is required to be adopted by the researchers. The hidden facts and the need necessity of the consumers of computing committees become revealed to the researchers. However the realism research approach describes the human belief application to establish relationship between human and tough reality.

In order to reveal the study material and to conduct an error free research works two different kinds of research approaches such as deductive and inductive are highlighted by the researchers. For studying the research topic, accurate data for the chosen are available however the mount is not enough to conduct the research work. However, with the help of inductive research approaches all the information relevant to the professional ethics could be determine easily.  

Deductive research approach demonstrates the practical application of the collected theories those are studied to gain the access of the content of the research topic. It has been determined that in order to the make application of the theories research work properly specified. Thus, for this particular topic, research approach selection and for better topic analysis deductive research approach is needed to be selected.   

Three different research design approaches are there such as explanatory, exploratory and descriptive. The outline and framework of the research topic could be critically analyzed with the help of the research design approach. Not only this but also the selection of data collection and the analysis patterns are also determined with the help of research design. For a better description of research design particular kind of data collection is needed to be applied by the researcher.

 For acknowledging different kinds of critical ideas and thoughts explanatory research design found to be the most suitable one. The descriptive aim of the research and to gain details of the research topic it is necessary to use proper need and description of the research topic. For this particular research topic the explanatory design is completely avoided because in most of the cases the longitudinal studies become difficult to demonstrate any particular topic. In order to make accurate decision regarding the professional set of ethics, descriptive design approach is suggested to be selected by the research developer.

For studying any sort of research topics, it is necessary to make proper data collection approaches such as primary data collection, secondary data collection. In order to gain details of the research topic, both the primary and secondary data collections are helpful however for this particular topic, secondary data are needed to be collected from the journals and articles. However, the first hand data collection approach requires proper validity and reliability as well.

Research Questionnaires

For this particular research proposal secondary data collection is much appreciable instead of primary data collection. The importance of professional ethics cannot be demonstrated by the survey questionnaires but from previous study of journals and articles the secondary data could be collected relevant to professional ethics in computing operation. Apart from the literature sources the other tools related to this topic include websites, books, websites, blogs and even online resources also.  

For this particular research topic both the qualitative and quantitative data are needed. Thus mixed data collection process is required to be applied for collecting and applying data. In order to collect narrative form of data qualitative data are very much helpful. On the other hand for adding theoretical concepts with the existing information quantitative data technique is needed.  

During the research ongoing phase certain ethical aspects are needed to be considered by the researchers. With the help of ethical approaches the researcher will be able to able to discriminate the right and wrong application sets. In order to analyze the research topic properly and to make accurate decision on certain standardization of ethics are needed to be implemented. The ethical aspects are as follows:

Data application: In order to understand the current trend of ethics in the practical field and computational operation it is necessary to consider the behaviour of both the organizational owners and the consumers. For making proper decision regarding which components of code of ethics should be installed, data application is required.  

Involvement of articles and other respondents: While including the details of application and ethical consideration it is necessary to understand the trend of ethics in terms of both commercial and non commercial application. Though, the data application should be avoided to make the findings limited to the academic purposes only.

Respondent’s Anonymity: While collecting data from the primary and secondary research it is important to consider the mental and physical status of the respondents. It means that the participants must not be harassed anyway.

A list of limitation could be highlighted by the researchers while developing the research proposal. The restricted scope of the research work can be easily identified if the with the research limitation.  The lists of limitations are as follows:

Reliability: It is necessary to maintain that none of the involved processes are generated from pressure or external influence. However, the ethical approach developers are completely biased towards the computing operations those have the power to affect the outcome the research topic. Therefore, certain issues associated to reliability are identified in this study.     

Time constraints: In order to lead the study towards successful outcome and even towards the expected outcome, time limitation is found to be as one of the most affective issues of this cross sectional study.  For the cross sectional study many important section of the research work were not analyzed properly.

Budget constraints: Budget is another limitation identified in this research proposal. According to the proposed study it is necessary to use proper tools and technologies to implement the qualitative as well as quantitative analysis.  

Literature Review

Task Name

Duration

Start

Finish

Predecessors

Schedule development for Ethics and computing

79 days

Thu 7/27/17

Tue 11/14/17

   Research initiation phase

11 days

Thu 7/27/17

Thu 8/10/17

      Understanding all the related issues

2 days

Thu 7/27/17

Fri 7/28/17

      Identification of the issues

3 days

Mon 7/31/17

Wed 8/2/17

2

      Analysis of the issues

3 days

Thu 8/3/17

Mon 8/7/17

3

      Ethical issues associated to advanced computing

3 days

Tue 8/8/17

Thu 8/10/17

2,4

      Feasibility study

3 days

Mon 7/31/17

Wed 8/2/17

2

   Research Planning phase

33 days

Fri 8/11/17

Tue 9/26/17

      Collection of data

4 days

Fri 8/11/17

Wed 8/16/17

5

      Analyzing collected data

5 days

Thu 8/17/17

Wed 8/23/17

8

      Selection of data collection method

5 days

Thu 8/24/17

Wed 8/30/17

6,9

      Selection of research method

5 days

Thu 8/31/17

Wed 9/6/17

10

      Analyzing the research methods

4 days

Thu 9/7/17

Tue 9/12/17

11

      Addition of required suggestion for the improvement

4 days

Wed 9/13/17

Mon 9/18/17

12

      Developing valid questionnaires

5 days

Tue 9/19/17

Mon 9/25/17

13

      Modification of the question sets

1 day

Tue 9/26/17

Tue 9/26/17

14

   Execution of the chosen methodologies

31 days

Wed 9/27/17

Wed 11/8/17

      Administrative level survey considering the employees of the organization

5 days

Wed 9/27/17

Tue 10/3/17

15

      Interviewing 12 employees from different workplace

6 days

Wed 10/4/17

Wed 10/11/17

17,2

      Interviewing 10 employees from computing society

5 days

Thu 10/12/17

Wed 10/18/17

12,18

      Analysis of the collected data

5 days

Thu 10/19/17

Wed 10/25/17

19

      Analyzing resultants generated from first computing company

5 days

Thu 10/26/17

Wed 11/1/17

20

      Analyzing resultants generated from second computing company

4 days

Thu 11/2/17

Tue 11/7/17

21

      Analyzing resultants generated from third computing company

1 day

Wed 11/8/17

Wed 11/8/17

22

   Critical evaluation of the data collected from different resources

4 days

Thu 11/9/17

Tue 11/14/17

      Final documentation of the collected data

4 days

Thu 11/9/17

Tue 11/14/17

23

Conclusion

From the overall discussion it can be concluded that development of professional set of ethics are very much important to resolve the issues facing by the computing society. However, for developing the ethical aspects accurate research methodologies in terms of research approaches, research philosophy, data collection and data types are also considered. In addition to this, the way through which the research work will be conducted is also scheduled accurately. The ethical actions effect the entire situation of the workplaces. A successful business organization completely depends upon the rust level coming from different parties such as employees, managers, suppliers, buyers or consumers and executives. Sets of ethics are nothing different but set of a regulation that describes acceptable conduct in the society. In order to complete the desired objectives by meeting the requirement of the consumers the companies must serve guidelines. The behaviour of the employees and the owners could be critical analyzed with the help of set of ethics. The main factors those are considered for developing the ethical sets include fairness, honesty, equality and trust. Professional code of ethics and standards are needed to maintain the client patient confidentiality. In order to develop the code of ethics accurate research work is required to be done and only based on that the proposal should be prepared.  

References

Agarwal, R. and Dhar, V., 2014. Big data, data science, and analytics: The opportunity and challenge for IS research.

Alexander, A., Walker, H. and Naim, M., 2014. Decision theory in sustainable supply chain management: a literature review. Supply Chain Management: An International Journal, 19(5/6), pp.504-522.

Bin-Abbas, H. and Bakry, S.H., 2014. Assessment of IT governance in organizations: A simple integrated approach. Computers in Human Behavior, 32, pp.261-267.

Bowen, S.A., Hung-Baesecke, C.J.F. and Chen, Y.R.R., 2016. Ethics as a precursor to organization–public relationships: Building trust before and during the OPR model. Cogent Social Sciences, 2(1), p.1141467.

Budiono, G.L. and Sawitri, N.N., 2017. Strategic Business Espionage: An Ethics and Business Practices to Gain Opportunity or Community Problems. Studies in Business and Economics, 12(1), pp.29-39.

Dove, E.S., Joly, Y., Tassé, A.M., in Genomics, P.P.P., Committee, S.P.I.S., Knoppers, B.M., International Cancer Genome Consortium and Ethics and Policy Committee, 2015. Genomic cloud computing: legal and ethical points to consider. European Journal of Human Genetics, 23(10), p.1271.

El-Gazzar, R.F., 2014, June. A literature review on cloud computing adoption issues in enterprises. In International Working Conference on Transfer and Diffusion of IT (pp. 214-242). Springer, Berlin, Heidelberg.

Fu, W. and Deshpande, S.P., 2014. The impact of caring climate, job satisfaction, and organizational commitment on job performance of employees in a China’s insurance company. Journal of Business Ethics, 124(2), pp.339-349.

Hughes, R.T., Cox, K. and Akhir, E.P., 2016. Modelling the alignment of information systems and business strategy: an example from sustainable procurement. In the 24th International Software Quality Management (SQM) and INSPIRE Conference. Bournemouth: SQM/INSPIRE.

Kerzner, H., 2013. Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons. Michaelson, C., Pratt, M.G., Grant, A.M. and Dunn, C.P., 2014. Meaningful work: Connecting business ethics and organization studies. Journal of Business Ethics, 121(1), pp.77-90.

Larson, E.W. and Gray, C., 2013. Project Management: The Managerial Process with MS Project. McGraw-Hill.

Lewis, S.C. and Westlund, O., 2015. Big data and journalism: Epistemology, expertise, economics, and ethics. Digital Journalism, 3(3), pp.447-466.

Meyer, C.K., Kurovski, S. and Clapham, S.E., 2014. Talking Trash: Ethics, Sustainability, And Organizational Trust. Journal of Sustainability Management, 2(2), p.43.

Mir, F.A. and Pinnington, A.H., 2014. Exploring the value of project management: linking project management performance and project success. International journal of project management, 32(2), pp.202-217.

Murthy, D., 2013. Ethnographic Research 2.0: The potentialities of emergent digital technologies for qualitative organizational research. Journal of Organizational Ethnography, 2(1), pp.23-36.

Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.

Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.

Pearson, S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer London.

Russell, S., Dewey, D. and Tegmark, M., 2015. Research priorities for robust and beneficial artificial intelligence. Ai Magazine, 36(4), pp.105-114.

Schwalbe, K., 2015. Information technology project management. Cengage Learning.

Sharif, M.M. and Scandura, T.A., 2014. Do perceptions of ethical conduct matter during organizational change? Ethical leadership and employee involvement. Journal of Business Ethics, 124(2), pp.185-196.

Sultan, N., 2013. Knowledge management in the age of cloud computing and Web 2.0: Experiencing the power of disruptive innovations. International journal of information management, 33(1), pp.160-165.

Verzuh, E., 2015. The fast forward MBA in project management. John Wiley & Sons.

Walker, A., 2015. Project management in construction. John Wiley & Sons.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP