Free Essay

Information Systems Ethical Issues

In:

Submitted By mrsdocmo
Words 748
Pages 3
Information Systems Ethical Issues
Mrs. Monique Morris
Intro to Management Information Systems – CIS 109
Strayer University

Professor Masudur Chowdhury
09/06/2015

INFORMATION SYSTEMS’ ETHICAL ISSUES
What are the ethical issues facing information systems?
Ethical issues in information systems are a growing problem, with the advancement of technology. Everyone is using computers and the internet for personal tasks every day. People use the internet for paying bills, managing bank accounts and also for business transactions. The technologists in control of these information systems need to have great morals, and not be tempted to violate their ethics. The ten commandments of computer ethics are very similar to business ethics, and personal ethics. (Bidgoli, 2014) Basically, the commandments are for guidance to not do any harm or wrong towards another individual. There are laws against many of the issues with the information industry. For example, it is illegal to steal someone’s identity or personal information. Unfortunately, this is becoming more of a problem, the more people use computers for personal tasks.
What are the more serious violations of ethics?
One of the ten commandments of computer ethics is “Thou shalt not use a computer to steal.” (Bidgoli, 2014) This has got to be the most widely violated ethical issue. It is difficult to meet someone who has not been a victim of this violation. Identity theft is stealing. Unfortunately, to violate this particular ethic, one does not have to be in the same city, or even the same country as the victim. This makes it very difficult to catch, or prosecute the criminal. I, personally, have not been a victim of the particular issue. I do not pay my bills on line, I mail them in to the company. I, also, keep a very close eye on my bank accounts, and check transactions every day. It is very hard to find trustworthy individuals, in this day and time. Does a credit check and background check always insure you’re hiring a trustworthy individual? I am not sure this would be the case. There are plenty of criminals with great credit, and they may have just not gotten caught for a convictable crime yet.
How can information system managers stop the violators?
A great way for information system managers to make sure this issue does not become a problem under their watch, would be to limit access to employees. Techs only need access to certain areas, and many do not need access to personal information of customers. (Guest Contributor, 2006) Managers don’t even need access to all of a customer’s information, so maybe they could limit complete access to the customer only. Another way to solve identity theft, would be to have a tracking system installed to track where the thief is located. (Markgraf) If this were a capable program, the company could locate the thief, and possible convict the felon. One other way, is for the public to reduce the amount of information they put out on the internet. The more society uses the internet, the more they are at risk of the crime. (Berzai, 2012)
How can the problem be solved in the future?
I am not sure this ethical issue will ever be resolved. Unfortunately, society is using computers more today than ever. More people are using the internet for paying bills, managing bank accounts and even putting way too much information in Social Medias. Our society is becoming computer dependent. There are cashiers who cannot make change without the computer telling them how much to give the customer. Children are started on computers as soon as they enter the school system. This is leading down a very dangerous path. Would society know how to function with computers? This is the leading question on the minds of many. Identity theft is becoming the crime of the future. It is very real, and very scary. Hopefully, the laws can find a way to keep up with technology. (Bidgoli, 2014) Most of the responsibility falls on the consumer, in fighting this particular crime. Ethics in information systems falls on the old saying, “Do unto others, as you would have them do unto you.” If more people would follow this old adage, then maybe our society would grow into a better people.

References

Berzai, L. (2012 , July 25). Ethical Problems in Computing. AITP.

Bidgoli. (2014). MIS 4. Stamford: Cengage Learning.

Guest Contributor. (2006). 10 ethical issues confronting IT managers. Tech Republic.

Markgraf, B. (n.d.). Ethical Issues With Business Technology. Chron.

Similar Documents

Premium Essay

Ethical Issues in Information Systems

...Ethical Issues in Information System Sebron Fleming Strayer University CIS109 – Introduction to Management Information Systems November 22, 2015 Professor Jean-Robert Bokino Abstract Most would agree that the advancement of computer technology has greatly enhanced the lives of many in today's society; however, with these advancements some pitfalls have come into play that diminish these advancements. The greatest threat to the achievements that have been made is that the criminal element has found ways to intrude. One of the manners into which these intrusions have occurred is the criminal invasion of privacy and an attempt to attack the individual's identity. In many cases, these cyber attacks by criminals has caused a lose of consumer confidence and has forced internet users and consumers to carefully consider ways in which to protect themselves. The advancement of computer technology has allowed us to more easily and quickly accomplish those task that was at one time time consuming and both routine and exhaustive. We are now enabled to shop online via e-commerce and are afforded the ability to pay bills and even do our banking and pay taxes online. “New computer technologies for gathering, storing, manipulating, and communicating data are revolutionizing the use and spread of information. Along the way, they are also creating ethical dilemmas...forcing people to confront entirely new rights and responsibilities in their use of information and to reconsider standards...

Words: 1065 - Pages: 5

Premium Essay

Strategy as a Wicked Problem

...1. Define Wicked Problem, Examples, 10 Properties. 2. Summarize the 4 solutions listed 3. Summarize PPG’s situation and wickedness 4. Analyze their strategy to come up wickedness through solutions listed in the context: 1. Involve stakeholders, document opinions and communicate 2. Define the corporate identity 3. Focus on action and Adopt a “feed-forward” orientation 5. Lessons from case PPG Question 3 The company, founded over a century ago as a plate-glass manufacture, chemicals and coating business. PPG is a global player with 125 manufacturing facilities and partner over 25 countries,. PPG first became aware of strategy’s wickedness in the late 1980s. Two missteps taught the company that diversification, be it into other industries or countries, is fraught with peril: 1 Diversification: PPG expanded its portfolio by acquiring medical electronics businesses from Honeywell and Litton Industries in 1986 and from Allegheny International in 1987. However, the biomedical industry’s volatility and the units’ focus on customization did not fit the company’s competence in low cost, standardized production. As resulte: Seven years later, PPG had to sell the division. 2 Being in other countries: The company others wicked challenge was China, where PPG offering the market with something they do not have competitive edge over the local supplier. This result where PPG’s operations there...

Words: 353 - Pages: 2

Premium Essay

Management Information Systems

...ME001-S : Analysis and Design of Management Information System by Dr. Eric C.C. Tsang (曾祥財 曾祥財) 曾祥財 FIT, MUST 1 Chapter 4 Ethical and Social Issues in Information Systems 2 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES • Identify the ethical, social, and political issues that are raised by information systems. • Identify the principles for conduct that can be used to guide ethical decisions. • Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. • Assess how information systems have affected everyday life. 3 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Is Your Student Loan Data on Loan? • Problem: Insufficient privacy protections for sensitive data related to student loans. • Solutions: Improve system security and protect student information to restore confidence in the system. • Revoke over 52,000 user IDs suspected of misusing access to students’ private information. • Demonstrates IT’s role in providing quick and convenient access to data. • Illustrates how the very same technology has the potential to threaten privacy and cause more harm than good. 4 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Understanding Ethical and Social Issues Related to Systems • Past five years: One of the most ethically...

Words: 2655 - Pages: 11

Premium Essay

Hacking

...International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime...

Words: 3982 - Pages: 16

Premium Essay

Ethics

...Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria  Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’ Reactions to an Intelligent Interactive Telephone Health Behavior Advisor System, in: Ngwenyama...

Words: 1786 - Pages: 8

Free Essay

Social Engineering Attacks and Counterintelligence

...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the risk...

Words: 3249 - Pages: 13

Premium Essay

Ethical Hacking

...International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime, a study...

Words: 3974 - Pages: 16

Premium Essay

1.the Moral Dimensions of Information Systems

...Dimensions of Information Systems The moral dimensions that can control the major ethical and social concerns generated by information systems are as follows: (i) Information Right and Obligation What information rights do individuals and organizations possess with respect to themselves? What can they protect? What obligation do individuals and organization have concerning this information? (ii) Property Rights and Obligations How will traditional intellectual property rights be protected in a digital society in which tracing and accounting forownership is difficult and ignoring such property rights is so easy? (iii) Accounting Liability and Control Determining who should take responsibility for decisions and actions. Many of the laws and court decisions and actions establishing precedents in the area of accountability, liability and control were firmly in place long before information systems were invented. (iv) Quality of System  This has to do with data quality and system errors. As werely more on information systems, data quality issues are gaining more importance. These issues affect you as a consumer and as a user. (v) Quality of Life An interesting quality of life issue that affects more and more people personally is the ability to work from home. Before the advent of information systems most people used to have a regular day job 8.00 a.m. to 5.00 p.m., five days a week in a typical office setting in our society. But with the introduction of information systems people...

Words: 609 - Pages: 3

Premium Essay

Ethical Hacking Essay

...Ethical Hacking Essay Introduction Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the "Ethical Hacking" as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue. In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical. Ethical The "Computer Ethics" states in part that all information belongs to everyone and there should be no boundaries or restraints to prevent disclosure of this information (Johnson, 1994). From most hacker's perspective, freedom of information includes the right to source codes and the programs themselves. This freedom also includes...

Words: 1017 - Pages: 5

Premium Essay

Administrative Ethics Paper

... Administrative Ethics Paper The Online Journal of Issues in Nursing has a current article named “Caring for Patients While Respecting Their Privacy: Renewing Our Commitment”. The basis of the article concerns the ethical and legal issues concerning the “Health Insurance Portability and Accountability Act” otherwise known as (HIPPA). This law has impacted the healthcare industry and the way in which healthcare workers conduct themselves with patients, their families, and with one another. In nursing the importance of confidentiality has always been the forefront of patient care. The current Code of Ethics for Nurses (ANA,2001) is clear in its intent and meaning as it relates to the nurses primary role in promoting and advocating patient’s rights relating to privacy and confidentiality. Every nurse has always understood the need for patient confidentiality even before (HIPPA) was law. Truth being with advanced technology, new demands in healthcare, and recent developments in the world at large has made it more difficult to keep this promise. But keep it they must. As healthcare workers on any given day we hear and see private and confidential information, it is our duty to protect it. On occasion we do become comfortable with patient’s medical information that it can be easy to forget that as healthcare workers how important it is to keep information secure and private. Thus, a recommended solution to this issue is to recap the -privacy section of the “Health Insurance...

Words: 1166 - Pages: 5

Premium Essay

Ethical Issues

...Development 2010 Ethical Issues in Information Technology There are a great variety of ethical issues in I.T.: 1 Ethical dilemmas There are various ethical dilemmas in relation to I.T. that need to be addressed. What are and are not ethical issues in I.T.? In regard to hackers, for example, are they testing the system or performing an immoral action? Will genetic engineering improve the quality of peoples’ lives or start to destroy it? How do we recognise when an ethical dilemma exists? There are, indeed, many grey ethical areas. 2 Plagiarism Plagiarism is where the work of others is copied, but the author presents it as his or her own work. This is a highly unethical practice, but happens quite frequently, and with all the information that is now available on the Internet it is much easier to do and is happening more often. 3 Piracy Piracy, the illegal copying of software, is a very serious problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies. Programmers spend hours and hours designing programs, using elaborate code, and surely need to be protected. Although some might argue that some pirating at least should be permitted as it can help to lead to a more computer literate population. But, for corporations, in particular, this is a very serious issue, and can significantly damage profit margins. 4 Hacking Hackers break into, or ‘hack’ into a system. Hacking can be undertaken for a variety of reasons, such as the wish to damage a system or the wish...

Words: 2051 - Pages: 9

Premium Essay

Legal and Ethical Issues

...Running Head: LEGAL AND ETHICAL ISSUES 1 Legal and Ethical Issues Herzing College Online U7A1: MBA 663-8: Health Insurance and Managed Care LEGAL AND ETHICAL ISSUES Legal and Ethical Issues The current landscape of the healthcare industry changes rapidly with new rules and regulations, placing many healthcare insurance and managed care organizations in jeopardy of litigation because of legal and ethical issues. Controversy surrounds the healthcare industry because of the decisions made by managed care organizations regarding patient treatment and payment to providers. The following examines the legal and ethical issues surrounding the everchanging healthcare insurance and managed care organizations. Managed Care Conflict The problem facing managed care organizations and health insurance is the inherent conflict with their goal of cost containment by reducing service utilization, with the healthcare delivery system that places the patient’s health first (Kongstvedt, 2013). According to Saunier (2011), the definition of managed care is: 2 Processes or techniques used by any entity that delivers, administers and / or assumes risk for health services in order to control or influence the quality, accessibility, utilization, costs and prices, or outcomes of such services provided to a defined population. (Saunier, 2011, p. 22) Saunier (2011) describes the purpose of these organizations that manage care is the control of costs by “implementing aggressive cost containment...

Words: 1504 - Pages: 7

Premium Essay

Administrative Ethics

... There are a plethora of issues concerning patient privacy, confidentiality, and HIPAA. Unfortunately, these are issues that have arisen more recently; patient privacy and confidentiality wasn’t a largely disputed issue before the introduction and increase of health information technology implementation and usage. According to the Center for Democracy and Technology, “Health information technology has tremendous potential to improve health care quality and reduce costs while empowering patients to play a greater role in the management of their own care. At the same time, however, electronic storage and exchange of personal health information poses risks to privacy. Unaddressed, privacy concerns can stand in the way of realizing the benefits of health IT, for neither patients nor providers will make full use of a system they do not trust.” One has no choice but to take the two into consideration: do the speed, accuracy, and reduced cost of health information technology outweigh the potential privacy concerns? As stated in a brief article published by the National Center for Biotechnology Information, “The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable.” While these may not be considered issues that pose a serious, heavy threat or...

Words: 1190 - Pages: 5

Premium Essay

Legal and Ethical Issues Relating to Business Information

...Legal and Ethical Issues Relating to Business Information Introduction I this task I’m going to explain the legal and ethical issues in relation to the use of businesses information and also I’m going to explain operational issues as well in the last park of the task i going to analyse the legal ethical and operational issues using appropriate examples . Most people do not feel safe in putting or giving their personal details on different social networks like Facebook and Twitter and another organization who uses the personal detail from the people or customers , the reason being of many hackers invading other people's privacy this also can happen with many businesses as well such as Tesco ,Asda e.g. if they do not have a security system to keep them safe . Legal Issues These are various items of legislation to protect the use of business information. Data Protection Act 1998 is one of the legal issue business information. Many businesses store use information about people. The Data Protection Act protects information held about people from being misused. The information stored by businesses on databases must be: ✓ Obtained fairly and lawfully ✓ Used only for the purposes stated during collection ✓ Adequate, relevant and not excessive in relation to the intended use ✓ Accurate and up to date ✓ Not kept for longer than necessary ✓ Processed in line with your rights ✓ Subject to procedures to prevent unlawful processing, accidental loss, destruction...

Words: 2188 - Pages: 9

Premium Essay

Social, Legal, and Ethical Issues in the Information Age

...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...

Words: 5310 - Pages: 22