With the growth of information technology use in organization, there is also a parallel growth in some individuals or businesses engagement in some unethical behaviors relating to the use of information technology. That is a good enough reason why it would be vital for education systems and businesses to tackle about the ethical concerns of information technology usage and to come out with code of ethics to restore ethical issues and violations. According to Brooks (2010), there are four major problems which concern the managers of information technology the most. The problems are as following (a) security, (b) privacy, (c) electronic monitoring, and (d) intellectual property of workforces. In this paper, this paper will address these major issues and identify the ethical challenges presented by each issue.
The thought of security of data refers to protecting or to keeping any data from damage or unofficial and undesirable actions. In other words, it refers to maintain or ensure the privacy of the data and electronic information alongside of its integrity, and allow certain individuals with certain legitimacy or authority to access it. In our lives, how many times did we hear about or see hackers hacking some unauthorized information? Then they take this information and publish it on the internet, they might remove it, damage it or modify it or for any other reasons. Hacking Hillary Clinton’s email account and taking snapshots of the very private emails then publishing them on the internet might be an example and many unlimited examples are out there. Today due to complexity of structure of its use, it is overwhelmingly difficult, in particular for businesses to secure their data and protect their information. Nowadays, almost ...
... middle of paper ...
...d the Challenges Presented by Information Technology. American Journal of Business Education, 3(10), 1-13.
Cone, E. (2008, September 10). Social Responsibility: Doing the Right Thing. CIO Insight. Retrieved from http://www.cioinsight.com/c/a/Research/Doing-the-Right-Thing
Harbert, T. (2007, October 29). Ethics in IT; Dark Secrets, Ugly Truths. And Little Guidance. Computerworld, 41(44), 34-36.
Moor, J. H. (2001). The ethics of privacy protection, Library trends, 3, 38-91.
Jennings, M. (2010). Business Ethics: Case Studies and Selected Readings (6th ed.). Mason, OH: South-Western Cengage Learning.
Vitolo, T. M., & Brinkman, B. J. (2007). Ethics for the Graduating Class: Issues, Needs, and Approaches. In Lowry, G. R., & Turner, R. L. (Eds.), In Information Systems and Technology Education from the University to the Workplace (p. 299-310). Hershey, PA: IGI Global.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Abstract. Use of grid systems has increased tremendously since their inception in 90’s. With grids, users execute the jobs without knowing which resources will be used to run their jobs. An important aspect of grids is VO (Virtual Organization). VO is a group of individuals, pursuing a common goal but under different administrative domains. Grids share large computational and storage resource that are geographically distributed among a large number of users. This very nature of grids, introduces quite a few security challenges.... [tags: Information Technology ]
2469 words (7.1 pages)
- The quick development in the field of technology made it important for all the big business to implement such technology in their industry procedures, so that competitive benefits over others can be accomplished. The following paragraph contains a brief description about the information technology security in general//. With the increasing benefits of implementing the technology in the business places, most of the business organizations have identified such technology as one of the crucial aspects for achieving success.... [tags: Information security, Security, Computer security]
1025 words (2.9 pages)
- The famous cryptographer Bruce Schneier once said that “[p]eople often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Schneier, 2000). The practice of Information Security Management is employed by businesses through a variety of standards, best practices, and frameworks to combat this issue. Their adoption of best practices in the public domain allows businesses to strive for improvements through their own interpretation. These best practices are sourced from standards such as ISO/IEC 27000, proprietary knowledge and public frameworks such as COBIT, Six Sigma, or ITIL.... [tags: Information security, Security]
1160 words (3.3 pages)
- Introduction As the African proverb denotes, “It takes a village to raise a child”, it will take that same communal effort in today’s society to keep that child safe in school and higher education facilities. This village must consist of parents, law enforcement, federal government, personnel, and the general public for protection. As preponderant challenges emerges in this wicked society related to public mass shootings, higher education institutions are placing more accentuation than ever upon risk mitigation.... [tags: Information security, Security, Computer security]
1483 words (4.2 pages)
- The information security challenges faced in Zanzibar are persistent in transitional countries as could be seen in the case study “state of Information Security in Zanzibar’s public sector” (Shaaban, et al., 2012). Most of these challenges are partly attributed to lack of proper budgeting for ICT infrastructures, cultural gap awareness, political instability, trust, business continuity plan, and inadequate human resource management to effectively manage this technology (Dada, 2006). The application of e-government in corporate governance to improve efficiency and effectiveness of the public sector agencies and delivery of services to the users has increased extensively, due to its result ori... [tags: Security Challenges, Transitional Countries]
1456 words (4.2 pages)
- CRITICAL INFRASTRUCTURE - INFORMATION TECHNOLOGY Executive Summary: The Information Technology Sector in the United States is an extremely complex environment supporting and interdependent between all 16 sectors. According to the department of Homeland Security, “These virtual and distributed functions produce and provide hardware, software, IT systems and services, and in collaboration with the Communications Sector the Internet” (DHS, 2014). Problem Statement: In the United States, the Information Technology Sector has showed increased reliance on computer systems, which they have linked to almost all their vital infrastructures.... [tags: National security, Security]
1438 words (4.1 pages)
- Many organizations are now facing huge threats to their stored information. This is putting organizations and individuals at risk of losing their privacy. There are factors that contribute to information vulnerability of an organization and to a personal level. In addition, there are measures that are put in place to help secure information. The factors that pose a threat to information may include inter-connectivity and the wireless applications used in business (Rainer & Turban, 2009, p. 1). There is massive communication of computers following the inter-connectivity and this introduces a lot of challenges in the manning of information security (Rainer & Turban, 2009, p.... [tags: Information Technology]
868 words (2.5 pages)
- According to Weaver (2014), in the today 's business world, different measures ensure the control of data and information access in the corporate sector. Due to the evolving change in technology, it is beneficial as well as risks do exist that organizations must face protecting assets better. The problems exist while implementing information systems strategically in organizations for maximum productivity and at the same time, and to ensure the protection of information assets and corporate data.... [tags: Information security, Security, Risk, Attack]
1074 words (3.1 pages)
- The problem to be investigated is the connection between ethical foundations and the challenges presented by information technology in today’s high intensity electronic environment. The discussion centers on the topics of societal ethical changes caused by information technology, the ethical usage of information the technology, and the development of a code of ethics surrounding these ethical issues. These topics are reviewed using Brooks (2010, October) article titled, The development of a code of ethics: An outline classroom approach to making connections between ethical foundations and the challenges presented by information technology.... [tags: Information Technology ]
1946 words (5.6 pages)
- The fourth phase of the Information security program is the Sustain phase. In this phase we are making sure to keep the network, computer systems, applications, and environment up and running in a secure and protected manner. This includes making sure that implemented controls are continuing to work properly, continue to do vulnerability assessments, and continue to do education and awareness. The price of security is the eternal vigilance, since the security is the ongoing thing, rather than one event only.... [tags: Security, Computer security, Risk]
736 words (2.1 pages)