Premium Essay

Ethics in Information System

In:

Submitted By Anonymous8888
Words 472
Pages 2
Technology has affected the population of today at a great extent, whether it is negative or positive. Today’s generation would not last a day without the fancy technology that is integrated in their smartphones, laptops, TVs and most importantly the internet. Technology has also brought forth some important legal issues such as the liability of the person or institution for using their technology either for good reasons or bad. In this report I will be addressing how technology has impacted the quality of our lives, describing the internet service provider’s usage policy while discovering to what extent they are liable for the use of their equipment and foreseeing the future of spam in the next five years.
Technology has very much advanced itself over the course of the years. We are now able to conduct chores faster due to facilitated gadgets and machines such as the washing machines and vacuums; we can communicate easily due to land lines, mobile networks and the internet. Skype is a valid example to communicating easily with each other without the long hassle that previous generations were presented with in the past. Technology enables us to go about our days easily with the innovations in transportation means such as metros, cars, and buses. These are all the positives of technology and they are countless if we are to mention every little benefit technology has presented us with. However, to every good thing a bad thing tags along indefinitely. It is not the fault of the technology that bad things come out, it was always designed to facilitate life and work rather than harm people. Technology such as cars is highly related to air pollution which reduces the quality of the air that we breathe and ultimately harm the humans which have created the technology with breathing and respiratory problems. The availability of Skype and instant messaging such as BBM has

Similar Documents

Free Essay

Information System Ethics Notes

...Chapter 11 Ethical and Social Issues 11.1. Understanding Ethical and Social Issues related to Systems * Ethics: principles of right and wrong that individuals use to make choices to guide their behaviour. IS creates opportunities for intense social change, threatening existing distributions of power, money, rights and obligations. * Internet and digital firm techs make it easier to assemble, integrate and distribute info, unleashing new concerns about appropriate use of customer info, protection of personal privacy and protection of intellectual property * Other issues: establishing accountability, setting standards to safeguard system quality, and preserving values and institutions * 5 moral dimensions of the info age * Info rights and obligations individuals/firms possess in respect to themselves * Privacy – Claim of individuals to be left alone, free from surveillance/interference from other individuals, organizations, or the state; claim to be able to control info about yourself * Privacy in public spaces * Data storage & exchange * Laws & expectations in US Vs. EU & Australia * Protecting traditional intellectual property rights in digital society * Who is held accountable and liable for harm done to info and property rights * System quality: standards of data and system quality to protect individual rights * Quality of life: preservation of values in an info and knowledge based society * 4 technological trends of...

Words: 983 - Pages: 4

Premium Essay

Ethics

...Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria  Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’...

Words: 1786 - Pages: 8

Premium Essay

Pepsi Privacy

...Ethics and Privacy of Communications in the E-Polis Gordana Dodig-Crnkovic and Virginia Horniak Department of Computer Science and Electronics Mälardalen University Västerås, Sweden I N T R O D U C T I O N The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production, and the monitoring of persons and machines. It can also lead to new forms of social interaction [..]. However, without appropriate architecture and regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely...

Words: 3586 - Pages: 15

Premium Essay

Ten Point Code

...Final Assignment: Ten Point Code of Ethics Ten Point Code of Ethics Introduction: In the Information Technology field as with many professional fields it is necessary to have a clear code of ethics that ensures the safety of the professional, the organization, and the client. This code of ethics should reflect the standards that are put forth by the profession and the expectations that the profession has for those who work in this field. When developing the code of ethics I reflected on what has been important to me in my career in terms of technology, ethics, and safety in the military and in my current career. I also reflected on what I believe will be important to me when I entered the information technology profession, and what is ethically correct in terms of the profession, the organization for which I work, for the clients, and for all stakeholders. Based on this reflection, the ten point code of ethics below represents what I believe to be important in terms of the information technology profession. Point One: Follow the steps necessary to prevent unauthorized access to user identifications, passwords or any information that may be used to access information systems, user accounts, or information pertaining to stakeholders. As an IT professional you will take precautions necessary to prevent unauthorized access to user identifications, accounts and passwords. You will take the necessary steps to ensure that information systems cannot be accessed by unauthorized...

Words: 1028 - Pages: 5

Premium Essay

Information Security

...Principles of Information Security, Fourth Edition Chapter 3 Legal, Ethical, and Professional Issues in Information Security Learning Objectives • Upon completion of this material, you should be able to: – Describe the functions of and relationships among laws, regulations, and professional organizations in information security – Differentiate between laws and ethics – Identify major national laws that affect the practice of information security – Explain the role of culture as it applies to ethics in information security Principles of Information Security, 4th Edition 2 Introduction • You must understand scope of an organization’s legal and ethical responsibilities • To minimize liabilities/reduce risks, the information security practitioner must: – Understand current legal environment – Stay current with laws and regulations – Watch for new issues that emerge Principles of Information Security, 4th Edition 3 Law and Ethics in Information Security • Laws: rules that mandate or prohibit certain societal behavior • Ethics: define socially acceptable behavior • Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these • Laws carry sanctions of a governing authority; ethics do not Principles of Information Security, 4th Edition 4 Organizational Liability and the Need for Counsel • Liability: legal obligation of an entity extending beyond criminal or contract law; includes legal obligation to make restitution...

Words: 2389 - Pages: 10

Premium Essay

Brooks

..._______________________________________________________ Report Information from ProQuest May 15 2012 20:05 _______________________________________________________ Table of Contents 1. The Development Of A Code Of Ethics: An Online Classroom Approach To Making Connections Between Ethical Foundations And The Challenges Presented By Information Technology.............................................. 14 May 2012 1 ProQuest Document 1 of 1 The Development Of A Code Of Ethics: An Online Classroom Approach To Making Connections Between Ethical Foundations And The Challenges Presented By Information Technology .. Author: Brooks, Rochelle. .. Publication info: American Journal of Business Education 3. 10 (Oct 2010): 1-13. .. ProQuest document link .. Abstract: In today's organizations, ethical challenges relate to areas like fraud, right to privacy for consumers, social responsibility, and trade restrictions. For Information Technology (IT) specifically, these can translate to considerations on how technology is used to violate people's privacy, how automation leads to job reductions, or how management information and its corresponding systems are used and abused for personal gain. In the last 25 years, people have seen an overwhelming technology infusion affecting business, education, and society. Virtually all areas of the society have been transformed by the usage of technology. The change is important from an ethical perspective in terms of who Information Technology (IT) workers...

Words: 8895 - Pages: 36

Free Essay

Information Systems Ethical Issues

...Information Systems Ethical Issues Mrs. Monique Morris Intro to Management Information Systems – CIS 109 Strayer University Professor Masudur Chowdhury 09/06/2015 INFORMATION SYSTEMS’ ETHICAL ISSUES What are the ethical issues facing information systems? Ethical issues in information systems are a growing problem, with the advancement of technology. Everyone is using computers and the internet for personal tasks every day. People use the internet for paying bills, managing bank accounts and also for business transactions. The technologists in control of these information systems need to have great morals, and not be tempted to violate their ethics. The ten commandments of computer ethics are very similar to business ethics, and personal ethics. (Bidgoli, 2014) Basically, the commandments are for guidance to not do any harm or wrong towards another individual. There are laws against many of the issues with the information industry. For example, it is illegal to steal someone’s identity or personal information. Unfortunately, this is becoming more of a problem, the more people use computers for personal tasks. What are the more serious violations of ethics? One of the ten commandments of computer ethics is “Thou shalt not use a computer to steal.” (Bidgoli, 2014) This has got to be the most widely violated ethical issue. It is difficult to meet someone who has not been a victim of this violation. Identity theft is stealing. Unfortunately, to violate this particular...

Words: 748 - Pages: 3

Free Essay

Code of Ethics

...CODE OF ETHICS Compliance is the responsibility of all the Company’s directors, officers, managers, and employees.(Capital One,2011). One is responsible for learning the details of the policies, procedures, laws and regulations applicable to one's job and for seeking guidance when needed. It is important to avoid misconduct that violates the law, this Code, or Company policies, but also the appearance of impropriety. The point, which a subject is not explicitly explained in this Code, does not relieve an employee of their responsibility to maintain the highest ethical standards under all circumstances. If one has any concern about whether their actions or inactions could violate a law, it should be discussed with their manager. While no Code of Ethics can or should replace thoughtful behavior or common sense, it can help cultivate a culture that values and rewards honesty, integrity, and accountability. (Avon, n.d.). The principles detailed in the Code will guide in “doing the right thing” and in preserving the Company’s reputation for acting with integrity at all times. TRADE REGULATION Most states have enacted trade regulation laws to ensure fair competition. These laws prohibit price-fixing and other "anti-competitive agreements, deceptive acts, and unfair competitive methods." (Pension Consulting, n.d.). Some forms of joint activities are legally permissible, but others are not. Under no circumstances, should you illegally or improperly...

Words: 2229 - Pages: 9

Premium Essay

It Law and Ethics

...Chapter 11 Law and Ethics Chapter Overview Chapter 11 covers the topics of law and ethics. In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security. Chapter Objectives When you complete this chapter, you will be able to: Differentiate between law and ethics Identify major national and international laws that relate to the practice of information security Understand the role of culture as it applies to ethics in information security Access current information on laws, regulations, and relevant professional organizations Set-up Notes This chapter could be completed in a single class session, if there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize the organization’s liabilities the information security practitioner must understand...

Words: 4470 - Pages: 18

Free Essay

Evaluation of a Code of Ethics

...Evaluation of a Business Code of Ethics Holly Danielle Murphy PHL 323 Ethics in Management September 20, 2010 Mary Carter Evaluation of a Business Code of Ethics The code of ethics for InnerCity Broadcasting Company may be found in any business as its code is very standard. In this paper I will identify the ethical system at play within InnerCity Broadcasting Company and discuss how the code of ethics is used within the organization. The paper will also identify the type of ethical system at play within the organization and include information in regard to the different departments and the code of ethics. Each member of the company will need to understand the entire code of ethics; however, they will find different uses for this code within his or her duties. Additionally, modification of the code of ethics will be discussed and any amendments will be identified accordingly. Finally, the reaction to the new amendments of the code of ethics by both management and employees will be discussed. The company was founded by Percy Sutton who purchased the first owned African American radio station in 1971. He believed that the best way to empowerment was through the media and politics (HarlemTorch, n.d.). According to InnerCity Broadcasting Company (2010), the mission statement of InnerCity Broadcasting Company states: “Our primary focus is on entertaining and informing our listeners and helping advertisers to better understand the benefits of promoting their products and service...

Words: 1275 - Pages: 6

Premium Essay

Security

...Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize liabilities and reduce risks from electronic, physical threats and reduce the losses from legal action, the information security practitioner must understand the current legal environment, stay current as new laws and regulations emerge, and watch for issues that need attention. Law and Ethics in Information Security As individuals we elect to trade some aspects of personal freedom for social order. Laws are rules adopted for determining expected behavior in modern society and are drawn from ethics, which define socially acceptable behaviors. Ethics in turn are based on cultural mores: fixed moral attitudes or customs of a particular group. Some ethics are recognized as universal among cultures. Slides 9 Types of Law Civil law represents a wide variety of laws that are recorded in volumes of legal “code” available for review by the average citizen. Criminal law addresses violations harmful to society and is actively enforced through prosecution by the state. Tort law allows individuals to seek recourse against others in the event of personal, physical, or financial injury. Private law regulates the relationship between the individual and the organization, and encompasses family law, commercial law, and labor law. Public law regulates the structure and administration of government agencies...

Words: 2358 - Pages: 10

Premium Essay

The Development of a Code-of-Ethics: It Challenges

...code-of-ethics: IT challenges Geraldetta Lovelace Northcentral University The development of a code-of-ethics: IT challenges The problem to be investigated is the development of a relevant and effective code of ethics to address the ethical use of and the ethical issues related to the use of Information Technology (IT). The use of IT, like every innovation that has the potential to change lives for good, also has the potential for harm, however IT “seems to create more ethical challenges than other kinds of technology” (Brooks, 2010, p. 2). To be proactive, ethical issues involving IT need to be addressed by educational programs as well as businesses and professional IT organizations. Discussed herein are ethical challenges presented by the four issues of concern identified by technology managers: security, privacy, intellectual property and electronic monitoring of employees (Brooks, 2010, pp. 1, 2). Security In this context, security refers to maintaining the integrity and confidentiality of data by putting protective measures in place to prevent destruction and/or unauthorized use. Security issues involve internal as well as external forces. Hacking is usually thought of as being an external force, but can be an internal force as well. Any act of accessing a computer system and/or information without the authority to do so is considered hacking. Whether the information attained is used for good or evil, is another issue and does not negate that the information was obtained...

Words: 1691 - Pages: 7

Premium Essay

Computer Ethics

...Computer Ethics-NDex Danielle E. Maire-Jackson IS535ON: Managerial Applications of Information Technology 12-5-10 Professor McElyea TABLE OF CONTENTS I. Definition of Computer Ethics 3 II. Background of NDex 4 III. Discussion of Business Issues 5 IV. Proposed Solution 6 V. Recommendations for the Executive Committee 8 VI. References 11 I. DEFINITION OF COMPUTER ETHICS “Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society”. (Brotman, 2001). Ethics vary from one individual to another. Laws are written rules that govern. Ethics and information services have become very important. Computer ethics are key in today's modernized world. Social rights and the computer. This is really saying or giving you rights. For example, right to privacy. This allows your personal information to be kept just what it is, personal. Right to computer access, right to computer skills, etc. (Gorniak-Kocikowska, 1996). Code of ethics states what conduct is allowed and what is not allowed. There must always be a plan on how to maintain ethical practices in the business world. Many times people have valuable information to be stored into computer systems and therefore we...

Words: 2376 - Pages: 10

Premium Essay

Ethics

...Ethics Program for Prestige World Wide Ethics are essentially a set of moral standards a company holds itself and its employees to. It is a system of rights and wrongs or do's and don'ts that prescribe how companies and individuals should act in conjunction with values and morals. For example, a company dumping toxic chemicals into a river and then bribing a local official to cover it up would not be an ethical practice. Most corporations in the United States have adopted some sort of ethics plan as their moral philosophy and everyone from the CEO to the mail clerk are responsible for adhering to these standards. In today's world, customers want to know that the companies they do business with are ethically sound and free from corruption. An ethics program is an essential tool for a company to have to ensure that it is in compliance with the law and acts on sociably acceptable norms and trends. It is the way to promote operational excellence throughout the company and ensure that everyone is on the same page. Ethics programs give employees a clear understanding of what is right and wrong in the organizations eyes. This leads to a higher performing workforce which improves the overall operational performance of a company. This program should be part of the company's overall culture and reflect in the core values or mission statement. An ethics plan is a critical component of an organization's risk management policy. The plan should be tailored to support business objectives...

Words: 2200 - Pages: 9

Premium Essay

Computer Ethics

...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...

Words: 6774 - Pages: 28