Premium Essay

Call for Papers for a Special Issue of Journal of Information Technology

In: Miscellaneous

Submitted By rmdelmando
Words 494
Pages 2
Call for Papers for a Special Issue of Journal of Information Technology Information Systems and the Financial Crisis and After
Special Issue Editors: Chrisanthi Avgerou, Alexandros-Andreas Kyrtsis and Frank Land

In various reports and newspaper articles – however only sporadically in academic publications – questions have been raised regarding the relationship between ICT and the 2007-2009 financial crisis and its continuing fallout on the financial markets. The expansion of electronic delivery channels for financial products and services as a consequence of the overbanking of the wealthier societies, the accelerating dependence of public finances on the operations of international computer supported financial networks, the growing importance of derivatives for investment and hedging, the exponential growth of the trading of complex financial instruments in globally interlinked exchanges; algorithmic trading; the break in the traditional link between debtor and lender, the use of electronic platforms for over-the-counter trading; the digitization of clearing, settlement and custody services, are among the developments which have revolutionized the technological landscapes of finance. These developments of the last thirty years have created not only advantages; they have also exposed the financial system to technological and managerial risks on top of the main financial risks. Does this mean that we are justified to blame technology for at least part of the processes which have led to the complications financial systems and economies are facing on a global scale? Was this the result of the way information systems development has tried to cope with the continuous innovation in the financial sector in the last three decades? What are the challenges concerning the manageability of information infrastructures; and what are the pressures for new enterprise…...

Similar Documents

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper The two acts I have selected to write about are the Do Not Call Act of 2003 and the Child’s Internet Protection Act. This paper will provide an understanding why the law required these acts to be established and why each of them played an important role in improving information technology. The first act to be discussed is the Child’s Internet Protection Act and the second act is Do Not Call Act of 2003. Child’s Internet Protection Act The Child’s Internet Protection Act also known as CIPA was established in 2000 by congress to directly address the concerns of children being able to access obscene and harmful sites through the internet. The CIPA imposes specific set of requirements on libraries and schools that receive discounted rate for internet access. In 2001 the FCC issues guidelines and updates to the rules in 2011. CIPA states that any school or library may not qualify for the discounts offered from the E-rate program unless the school or library has a an internet safety policy that covers technology protection measures that blocks obscene, harmful to minors, and child pornography ("Children’s Internet Protection Act", n.d.). The internet is not monitored and because of this children require supervision when access the websites. Schools that are subjected to CIPA rules must meet two additional requirements: 1. Internet safety polices will include monitoring online use of minors 2. Must provide education to minors on appropriate...

Words: 614 - Pages: 3

Free Essay

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can......

Words: 1012 - Pages: 5

Premium Essay

Information Technology White Paper

...Tan Pham CSIA 303 Information Security White Paper Professor Gupta Information Security White Paper The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential data are some of a few risks that a business must address. These risks originally come from sources calls vulnerabilities and threats. Vulnerabilities in plain definition are weaknesses of an information system. These weaknesses later can be translated and exploited by attackers, insider or outsider. These attackers are generally can be seen as threats. Businesses must find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential......

Words: 1157 - Pages: 5

Premium Essay

Information Technology Acts Paper

...The daily use of information technology for personal and business environment has created an innovative effect on people lives. This change has been an important factor for success through everyday life function. The fast growing pace of information technology brought along many ethical issues, like privacy, property, and accuracy, as people began to share their personal data over networks. These major issues brought new laws to defend consumers, for example The Telephone Consumer Protection Act (TCPA) of 1991, and the Do Not Call Implementation Act of 2003 form after Information Technology began to grow so fast creating ethical issues over customers information shared on networks. The new laws Telephone Consumer Protection Act 1991 and Do Not Call Implementation Act 2003 were necessary as information technology progress creating ethical issues over the years. References: Introduction to Information Systems: Enabling and Transforming Business, 3rd Edition R. Kelly Rainer, Casey G. Cegielski ©2011 Advances in information technology (IT) are meant to improve various aspects of life. Unfortunately, IT advances are resulting in a growing amount of ethical issues. The major ethical issues associated with IT advancements are privacy, property, accuracy, and ease of access to sensitive information. Privacy can easily be breached when information is stored in databases and shared over networks. Ethical issues due to advances in IT call for the creation of new acts to...

Words: 423 - Pages: 2

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper Justine Huffman BIS/220 July 28, 2014 Vivien Lewis Information Technology Acts Paper With the advances in information technology (IT) today, individual’s personal and business lives are improving in a numerous amount of ways. Regrettably, with new technology advances, comes a growing amount of ethical issues such as an invasion of property, privacy and easy access to sensitive information. With personal information being stored in databases and shared over the web privacy can be breached with just a couple clicks of a button. Ethical issues that have formed from the advancements in IT call for new acts to be put in place to protect the privacy of today’s consumers. The Children’s Internet Protection Act of 2000 and the Do Not Call Implementation Act of 2003 are examples of Acts that are being created because of the ethical issue being formed from the advancements in IT. The Children’s Internet Protection Act was sign in to law on December 21, 2000 by President Bill Clinton. This act was designed for public libraries and public schools to apply filters and monitoring to block visual depictions of obscenity, child pornography and material harmful to minors (Canon, 2001). Before schools or libraries adopt the act the must hold at least one public hearing or meeting to address the proposal. Schools and libraries must meet two certification requirements: 1) the Internet safety policy must monitor the online activities of minors and 2)...

Words: 733 - Pages: 3

Free Essay

Information Technology and the Rise of Ethical Issues

...Information Technology and the Rise of Ethical Issues The purpose of this research is to identify what are the advances in information technology that resulted in new ethical issues necessitating the creation of the Telephone Consumer Protection Act (TCPA), 1991, and the Children’s Online Privacy Protection Act (COPPA), 1998. To start examining the ethical issues of each act it was necessary to understand the meaning of the act and who the act affected. Each act applied to different age groups yet pertained some of the same ethical issues for the creation of each act. Once the meaning behind the acts were identified, the ethical issues were easy to recognize. Information Technology Information technology dramatically has changed the course of business in a rapid pace toward humanity. These advancements have made conducting business effective and efficient by the use of larger data storage, auto dialers, auto recordings, and identifiers, such as cookies or IP addresses to learn personal information. However, these advancements come with drawbacks that include morally and ethically wrong destruction toward individuals with their privacy and safety. Creation of Acts The Telephone Consumer Protection Act (TCPA), 1991 was established for the consumers that did not wish to have telemarketers calling. The advancements in technology were enabling businesses to call residential phone numbers as well as sending facsimiles to market and sell products. The phone calls were...

Words: 700 - Pages: 3

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper Jessica Jordan BIS/220 Mai Nguyen October 17, 2011 Information technology has greatly advanced through the years. For the most part, these advancements are beneficial to consumers, however, the advancements have also made it necessary for the government to step in to create acts in order to set restrictions and help protect consumers’ rights. Two of the acts implemented are the Children’s Internet Protection Act, 2000 and the Do Not Call Implementation Act, 2003. The Children’s Internet Protection Act, 2000 is a federal law that requires schools and libraries to certify that they have an Internet safety policy that takes measures to block or filter Internet access to pictures that are obscene or child pornographic and, for computers that are accessible to minors, pictures that are harmful to minors. Schools and libraries are also required to implement an Internet safety policy which addresses minors’ access to inappropriate matter, minors’ use of electronic mail and chat rooms, unauthorized access by minors online, disclosure of personal information regarding minors, and minors’ access to harmful materials. Also, schools are required to monitor online activities of minors (Federal Communications Commission Guide, 2011). The advances in information technology that resulted in the Children’s Internet Protection Act, 2000 are the popularity of the Internet and the ease of access to share information through this source. The......

Words: 565 - Pages: 3

Free Essay

Information Technology Acts Paper

...ASHLEI MCQUEEN Information Technology Acts Paper BIS/220 PROFESSOR ZAMIR DEEN July 21, 2014 Information Technology Acts Paper The Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003 was enacted into law in January 2004 (Kigerl, 2009). This law was created from the enormous bulk spam in emails that hit airwaves I the 2000 's. everyone now has a computer of some sort Weathersby desktop laptop or tablet well and the new millennium decade everyone had a desktop home computer. What kept reoccurring was some of these balk messages would contain pornographic material and unwanted irritating and embarrassing material into people's inboxes of their email. This created a really bad phenomenon of people not liking to use email because I cannot tell what real email was and what was junk and there was nothing to break down each email or monitor what you were really writing to people because of all the horrendous spam. This is when can spam Law was created it big knowledge the ethical issues and recognized the marketing downfall people would face if they cannot protect email users from unwanted messages . As far as it manages an informational technology based on the ethical issues above they have had many advancements. For one the email service allows people to write a message to anyone on the continent with the click of a button. However many features have made ethical problems and prevailed through and made spam one of the most unwanted......

Words: 956 - Pages: 4

Free Essay

Information Technology Ethical Issues

...INFORMATION TECHNOLOGY ETHICAL ISSUES                                        Ethics is in accordance with the standards or rules for behavior or a practice especially the standards of professionalism. Information ethics is defined as a branch of ethics that is directed to the relationship between dissemination, organization, use and creation of information, and the moral and ethical codes governing human behavior in a society. Information system have raised ethical questions for both organizations and Individuals since they all create opportunities for intense social change, and thus putting at risk the current distribution of powers, rights, money and obligation. There are various ethical issues in information system privacy being one of them. Privacy is the right of a particular organization, including the state or individual to be left alone, free from interference and surveillance from others. Personal information of a particular individual or organization is critical, and the way they are handled can significantly interfere with the individual or the group. Privacy entails what information about an individual or an organization must a reveal to others, extend to which the information should be given and under what conditions. The information of a particular person or group should be safeguarded adequately to prevent its access by others without permission or consent. There are some of personal information that must be revealed to......

Words: 382 - Pages: 2

Free Essay

Issues in Information Technology

...Brent C. Dugan IT101-AT6 Ethical issues in Information Technology Information Technology And Resource Use As of Autumn 2003, leadership of the Network for E (N4E) is being taken over by Professor Scott Matthews of Carnegie Mellon, one of its founding members. Jon Koomey began a leave of absence from LBNL beginning in August 2003 (his LBL email and phone will still reach him while he's on leave). Koomey et al., "Sorry, wrong number: The use and misuse of numerical facts in analysis and media reporting of energy issues.", which contains the most complete summary of the controversy over electricity used by office equipment, was published in the 2002 issue of Annual Review of Energy and Environment (also LBNL-50499). vol. 27,. pp. 119-158. Email JGKoomey@lbl.gov for a copy. Baer et al. "Electricity requirements for a digital society" was published at the end of 2002 RAND Corporation, MR-1617-DOE, ISBN 0-8330-3279-8. They concluded that projections of information technology totalling 50% of electricity use in twenty years are completely implausible. Instead, their scenarios project something under five percent for office and communications equipment in all cases by 2020. Ethics In Information Technology Are the ethical decisions that a technology user must make fundamentally different than those facing the ordinary person?   No, because it is difficult to resolve competing interests no matter what the nature of action or behavior is contemplated.   Is the......

Words: 961 - Pages: 4

Premium Essay

Ethical Issues Facing Information Technology

...ourselves. This research paper focuses on the ethical issues facing information technology. I will be identifying examples of those ethical issues, situations in which they occur, and helpful ways in which organizations can avoid abuse and catastrophes. Introduction Ethics is defined as moral principles that govern a person or group’s behavior. (insert reference) Now that we know the definition of ethics, then what are ethics in information technology? Ethics in information technology are a set of moral principles that police the use of computers and all forms of telecommunications used to receive, send, and store information. With the rise of information technology, more and more professionals have encountered ethical issues in the workplace and finding out there are situations in which ethical problems are becoming more prevalent. Some examples include; (1) problems with privacy and confidentiality, (2) computer security, and (3) computer crimes and computer related crimes. This paper will focus on these examples. Problems With Privacy and Confidentiality Information privacy is the right of an individual to determine what information is collected about them and how it is used. Some people are not aware of ways in which data can be collected or how it is used. Many think they have a level of secrecy as they browse online, but websites are often collecting your personal information within seconds of you......

Words: 1562 - Pages: 7

Premium Essay

Special Issues Paper

...Special Issues Paper and Presentation Corbo Mikah BSCOM/100 Introduction to Communication November 09, 2015 Mary Lee Special Issues Paper and Presentation This is our final assignment for your class, and because of my communication issues with my children, I am writing this paper again and will have to redo all of my presentation. When I started this class, I was stunned because I thought I knew everything I needed about communication. Well as you can guess, I was wrong I have learned quite a bit along this long journey through Introduction to Communication. I am here writing about some of the key points of communication that I have learned and hopefully I will be able to show you that I was able to learn from you and your course. This last week we have been learning about diversity, ethics, technology and mass communication. These four words seem to not have anything in common, right? Well, that is what I thought until I began to read and research all four of these words. I looked all through our Chapters and I had a really hard time finding the best meaning of diversity, so after more research I found the perfect answer. Diversity is the inclusion of individuals, representing more than one national origin, color, religion; a point of difference. Another good example to the meaning of diversity would be variety, or a range of difference. The next word is ethics and my favorite meaning to this is; a branch of philosophy dealing with values relating to human......

Words: 1543 - Pages: 7

Free Essay

Information Technology Ethics Issues

...Information Technology Ethics Issues In the past thirty years technology has changed our lives significantly. It changed the way we communicate, the way we work, the way we interact with each other, to how we fight wars. With that being said, it has raised controversy and initiated intense debates that are often differentiated or entangled in scientific uncertainties or dishonest demagoguery. Law and ethics are struggling to keep pace with technology. For example, employers are forbidden and can face legal action if the ask interviewers about their, religion, political affiliation, or sexual preference. Nevertheless, they are able to turn to the internet like google or Facebook to determine if a candidate meets the job criteria by their beliefs, looks, or habits. It is against the law for lenders to discriminate a person based off their race, gender, and sexuality. However, they can deny a person a loan based on their Facebook friends that have a history of poor credit history or if their Facebook bios don’t match other websites like LinkedIn for example. Since laws have not kept up with modern day technology it causes regulatory gaps. As technology rapidly progresses the gaps seem to be getting bigger and bigger with time. Employment is not the only place where these regulatory gaps are happening. They are happening wherever technology exist. Technology has evolved so much in the last thirty years it’s nearly impossible to keep up causing our laws and ethical......

Words: 469 - Pages: 2

Free Essay

Information Technology Act Paper

...Nowadays, technology is advancing at an exponential rate. Over the last two decades or so, everyone in the world has essentially become connected to one another via computer, the internet, and social media. But as the world becomes more connected, does it also become more vulnerable? Let’s be honest, not everyone in the world has everyone else’s best interest at heart. How many times have you had to turn off the ringer of your phone because of the nonstop assault of telemarketer calls? How many emails have you received saying you’ve won the lottery in London or that the Prince of Nigeria would like to conduct business with you? It is these types of issues that motivated the United States Congress to enact several laws to protect America and its citizens from technological attacks and exploitation. In this paper, I will describe two such acts and discuss the advances in technology that resulted in new ethical issues making each such act necessary. In 2002, the United States Government enacted the Federal Information Security Management Act (44 U.S.C. § 3541, et seq.), or FISMA. FISMA recognizes the significance of information security to the economic and national security interests of the United States and mandates that each federal agency develops documents, and implements an agency wide program to provide information security for that agency ("FISMA Center", 2010). This law was enacted due to the thousands of cyber-attacks of several Federal Agencies by both foreign and......

Words: 516 - Pages: 3

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Esan Williams BIS/220 June 11, 2012 Professor Evie Garrreau Advances in information technology (IT) are meant to improve various aspects of life. Unfortunately, IT advances are resulting in a growing amount of ethical issues. The major ethical issues associated with IT advancements are privacy, property, accuracy, and ease of access to sensitive information. Privacy can easily be breached when information is stored in databases and shared over networks. Ethical issues due to advances in IT call for the creation of new acts to protect consumers. The Telephone Consumer Protection Act (TCPA) of 1991 and the Do Not Call Implementation Act of 2003 are two perfect examples of Acts being created as direct results of IT advancements coupled with ethical issues. The advances in information technology that resulted in new ethical issues necessitating the creation of the TCPA of 1991 and the Do Not Call Implementation Act of 2003 consisted of computer networks, predominantly the Internet, allowing organizations to collect, combine, store, and share massive amounts of data on institutions, groups, even individuals (Rainer & Cegielski, 2011). Access to specific consumer demographic information basically became potential leads for telemarketing organizations. Once the leads were accessed, telemarketing businesses used call centers to push the products or services they sold. IT advances forced Congress’ hand to offer some......

Words: 887 - Pages: 4