Principles of Information Systems, Loose-Leaf Version
13th Edition
ISBN: 9781305971820
Author: Ralph Stair, George Reynolds
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Question
Chapter 14.4, Problem 2CTQ
Program Plan Intro
Code of ethics:
- The “ethics” word comes from the Greek term “duty”. The code of ethics means all the responsibilities that professional must respect when carrying out their work.
- It also contains the core value of the work and the behavior which should be adopted.
Example:
Professional and confidentiality secrecy are responsibilities contained in code of ethics as well as conduct in numerous professions like accountants, lawyers, doctors and journalists.
Intent of the code of ethics:
- The intent of code of ethics established by a professional order as a way to safeguard the public and status of professionals.
- The employee who breach their code of ethics suffer disciplinary actions that can range from a warning or rebuke to dismissal or ejection from their professional order.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is an ethical code, and what is its purpose? What are some of the most important aspects of almost every code of ethics? Is there anything special that newcomers to your field should be aware of? What procedure would you use to draft a code of ethics for this professional group, and who would you involve?
What exactiy is an ethical code, and what is its purpose? What are some of the most important
components of nearly every code of ethics? Is there anything specific that needs to be addressed for
folks who are just starting out in your field? What kind of method would you use to draft a code of
ethics for this professional group, and who would you enlist to help you do so?
What does the abbreviation CISSP stand for? Make use of the Internet to determine the ethical standards that CISSP holders must agree to adhere to.
Chapter 14 Solutions
Principles of Information Systems, Loose-Leaf Version
Ch. 14.1 - What is the harm in nonproductive use of...Ch. 14.1 - Prob. 2RQCh. 14.1 - Do you think that it would help to involve a small...Ch. 14.1 - Prob. 2CTQCh. 14.2 - Prob. 1RQCh. 14.2 - Prob. 2RQCh. 14.2 - Prob. 1CTQCh. 14.2 - Prob. 2CTQCh. 14.3 - Prob. 1RQCh. 14.3 - Prob. 2RQ
Ch. 14.3 - Prob. 1CTQCh. 14.3 - Prob. 2CTQCh. 14.4 - Prob. 1RQCh. 14.4 - Prob. 2RQCh. 14.4 - Prob. 1CTQCh. 14.4 - Prob. 2CTQCh. 14 - Prob. 1SATCh. 14 - Prob. 2SATCh. 14 - Prob. 3SATCh. 14 - Prob. 4SATCh. 14 - Prob. 5SATCh. 14 - Prob. 6SATCh. 14 - Prob. 7SATCh. 14 - Prob. 8SATCh. 14 - Prob. 9SATCh. 14 - Prob. 10SATCh. 14 - Prob. 11SATCh. 14 - Prob. 12SATCh. 14 - Prob. 13SATCh. 14 - Prob. 14SATCh. 14 - Prob. 15SATCh. 14 - Prob. 16SATCh. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQCh. 14 - Prob. 11RQCh. 14 - Prob. 12RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 1PSECh. 14 - Prob. 1TACh. 14 - Imagine that your team has been hired to conduct a...Ch. 14 - Prob. 3TACh. 14 - Prob. 1WECh. 14 - Prob. 2WECh. 14 - Prob. 3WECh. 14 - Prob. 1CECh. 14 - Prob. 2CECh. 14 - Prob. 3CECh. 14 - Prob. 1CTQ1Ch. 14 - Prob. 2CTQ1Ch. 14 - Prob. 3CTQ1Ch. 14 - Prob. 1CTQ2Ch. 14 - Prob. 2CTQ2Ch. 14 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- Of the organizations listed in this chapter that have codes of ethics, which is focused on auditing and control?arrow_forwardHave you ever seen an instance of internet bullying or harassment? How did you react when you first heard about it? The person has apparently been the target of bullying previous to your intervention; please explain how you arrived at this judgment.arrow_forwardWhat are the primary arguments against certification, and how can certifying bodies change their programs to overcome these shortcomings?arrow_forward
- Would we investigate cyberstalking in the same way that we investigate identity theft? What are your justifications for supporting or opposing it?arrow_forwardWhat are some characteristics of an organization with successful ethics program in placearrow_forwardWhat your observation about cyber bullying?arrow_forward
- Legislation imposes limitations on safeguarding confidential information, whereas ethical principles offer direction on how to achieve this objective in a morally appropriate fashion. Privacy What are your opinions or perspectives on the matter at hand?arrow_forwardLegislation imposes limitations on safeguarding confidential information, whereas ethical principles offer direction on how to accomplish this task in a morally appropriate fashion. Privacy What are your opinions or perspectives on the matter at hand?arrow_forwardWhat are some of the complaints that UEFI has received throughout the years? Which of the aforementioned critiques do you concur with or reject?arrow_forward
- What characteristics set cybercrime apart from other types of criminal activity? If you can think of any examples from the published works, could you kindly provide them?arrow_forwardDo you think an organizations have ethics?arrow_forwardSearch the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies. Do each of the policies have sections that address information security requirements? What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring policy or a termination policy.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning