Premium Essay

Ethical Issues in Information Systems

In:

Submitted By SeFleming3
Words 1065
Pages 5
Ethical Issues in Information System
Sebron Fleming
Strayer University
CIS109 – Introduction to Management Information Systems
November 22, 2015
Professor Jean-Robert Bokino Abstract Most would agree that the advancement of computer technology has greatly enhanced the lives of many in today's society; however, with these advancements some pitfalls have come into play that diminish these advancements. The greatest threat to the achievements that have been made is that the criminal element has found ways to intrude. One of the manners into which these intrusions have occurred is the criminal invasion of privacy and an attempt to attack the individual's identity. In many cases, these cyber attacks by criminals has caused a lose of consumer confidence and has forced internet users and consumers to carefully consider ways in which to protect themselves. The advancement of computer technology has allowed us to more easily and quickly accomplish those task that was at one time time consuming and both routine and exhaustive. We are now enabled to shop online via e-commerce and are afforded the ability to pay bills and even do our banking and pay taxes online. “New computer technologies for gathering, storing, manipulating, and communicating data are revolutionizing the use and spread of information. Along the way, they are also creating ethical dilemmas...forcing people to confront entirely new rights and responsibilities in their use of information and to reconsider standards of conduct shaped before the advent of computers” (Ethical Issues 2015). Because people use the Internet in their everyday lives, they rely on it to be safe and an accurate means of exchanging information. Due to the fact that criminals have found manners in which to invade our privacy and even go as far as to assume our identities, users/consumers are forced to incorporate maneuvers to

Similar Documents

Free Essay

Information Systems Ethical Issues

...Information Systems Ethical Issues Mrs. Monique Morris Intro to Management Information Systems – CIS 109 Strayer University Professor Masudur Chowdhury 09/06/2015 INFORMATION SYSTEMS’ ETHICAL ISSUES What are the ethical issues facing information systems? Ethical issues in information systems are a growing problem, with the advancement of technology. Everyone is using computers and the internet for personal tasks every day. People use the internet for paying bills, managing bank accounts and also for business transactions. The technologists in control of these information systems need to have great morals, and not be tempted to violate their ethics. The ten commandments of computer ethics are very similar to business ethics, and personal ethics. (Bidgoli, 2014) Basically, the commandments are for guidance to not do any harm or wrong towards another individual. There are laws against many of the issues with the information industry. For example, it is illegal to steal someone’s identity or personal information. Unfortunately, this is becoming more of a problem, the more people use computers for personal tasks. What are the more serious violations of ethics? One of the ten commandments of computer ethics is “Thou shalt not use a computer to steal.” (Bidgoli, 2014) This has got to be the most widely violated ethical issue. It is difficult to meet someone who has not been a victim of this violation. Identity theft is stealing. Unfortunately, to violate this particular...

Words: 748 - Pages: 3

Premium Essay

Management Information Systems

...ME001-S : Analysis and Design of Management Information System by Dr. Eric C.C. Tsang (曾祥財 曾祥財) 曾祥財 FIT, MUST 1 Chapter 4 Ethical and Social Issues in Information Systems 2 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES • Identify the ethical, social, and political issues that are raised by information systems. • Identify the principles for conduct that can be used to guide ethical decisions. • Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. • Assess how information systems have affected everyday life. 3 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Is Your Student Loan Data on Loan? • Problem: Insufficient privacy protections for sensitive data related to student loans. • Solutions: Improve system security and protect student information to restore confidence in the system. • Revoke over 52,000 user IDs suspected of misusing access to students’ private information. • Demonstrates IT’s role in providing quick and convenient access to data. • Illustrates how the very same technology has the potential to threaten privacy and cause more harm than good. 4 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Understanding Ethical and Social Issues Related to Systems • Past five years: One of the most ethically...

Words: 2655 - Pages: 11

Premium Essay

Hacking

...International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime...

Words: 3982 - Pages: 16

Premium Essay

Ethics

...Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria  Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’ Reactions to an Intelligent Interactive Telephone Health Behavior Advisor System, in: Ngwenyama...

Words: 1786 - Pages: 8

Free Essay

Social Engineering Attacks and Counterintelligence

...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the risk...

Words: 3249 - Pages: 13

Premium Essay

Ethical Hacking

...International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime, a study...

Words: 3974 - Pages: 16

Premium Essay

1.the Moral Dimensions of Information Systems

...Dimensions of Information Systems The moral dimensions that can control the major ethical and social concerns generated by information systems are as follows: (i) Information Right and Obligation What information rights do individuals and organizations possess with respect to themselves? What can they protect? What obligation do individuals and organization have concerning this information? (ii) Property Rights and Obligations How will traditional intellectual property rights be protected in a digital society in which tracing and accounting forownership is difficult and ignoring such property rights is so easy? (iii) Accounting Liability and Control Determining who should take responsibility for decisions and actions. Many of the laws and court decisions and actions establishing precedents in the area of accountability, liability and control were firmly in place long before information systems were invented. (iv) Quality of System  This has to do with data quality and system errors. As werely more on information systems, data quality issues are gaining more importance. These issues affect you as a consumer and as a user. (v) Quality of Life An interesting quality of life issue that affects more and more people personally is the ability to work from home. Before the advent of information systems most people used to have a regular day job 8.00 a.m. to 5.00 p.m., five days a week in a typical office setting in our society. But with the introduction of information systems people...

Words: 609 - Pages: 3

Premium Essay

Ethical Hacking Essay

...Ethical Hacking Essay Introduction Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the "Ethical Hacking" as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue. In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical. Ethical The "Computer Ethics" states in part that all information belongs to everyone and there should be no boundaries or restraints to prevent disclosure of this information (Johnson, 1994). From most hacker's perspective, freedom of information includes the right to source codes and the programs themselves. This freedom also includes...

Words: 1017 - Pages: 5

Premium Essay

Administrative Ethics Paper

... Administrative Ethics Paper The Online Journal of Issues in Nursing has a current article named “Caring for Patients While Respecting Their Privacy: Renewing Our Commitment”. The basis of the article concerns the ethical and legal issues concerning the “Health Insurance Portability and Accountability Act” otherwise known as (HIPPA). This law has impacted the healthcare industry and the way in which healthcare workers conduct themselves with patients, their families, and with one another. In nursing the importance of confidentiality has always been the forefront of patient care. The current Code of Ethics for Nurses (ANA,2001) is clear in its intent and meaning as it relates to the nurses primary role in promoting and advocating patient’s rights relating to privacy and confidentiality. Every nurse has always understood the need for patient confidentiality even before (HIPPA) was law. Truth being with advanced technology, new demands in healthcare, and recent developments in the world at large has made it more difficult to keep this promise. But keep it they must. As healthcare workers on any given day we hear and see private and confidential information, it is our duty to protect it. On occasion we do become comfortable with patient’s medical information that it can be easy to forget that as healthcare workers how important it is to keep information secure and private. Thus, a recommended solution to this issue is to recap the -privacy section of the “Health Insurance...

Words: 1166 - Pages: 5

Premium Essay

Ethical Issues

...Development 2010 Ethical Issues in Information Technology There are a great variety of ethical issues in I.T.: 1 Ethical dilemmas There are various ethical dilemmas in relation to I.T. that need to be addressed. What are and are not ethical issues in I.T.? In regard to hackers, for example, are they testing the system or performing an immoral action? Will genetic engineering improve the quality of peoples’ lives or start to destroy it? How do we recognise when an ethical dilemma exists? There are, indeed, many grey ethical areas. 2 Plagiarism Plagiarism is where the work of others is copied, but the author presents it as his or her own work. This is a highly unethical practice, but happens quite frequently, and with all the information that is now available on the Internet it is much easier to do and is happening more often. 3 Piracy Piracy, the illegal copying of software, is a very serious problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies. Programmers spend hours and hours designing programs, using elaborate code, and surely need to be protected. Although some might argue that some pirating at least should be permitted as it can help to lead to a more computer literate population. But, for corporations, in particular, this is a very serious issue, and can significantly damage profit margins. 4 Hacking Hackers break into, or ‘hack’ into a system. Hacking can be undertaken for a variety of reasons, such as the wish to damage a system or the wish...

Words: 2051 - Pages: 9

Premium Essay

Legal and Ethical Issues

...Running Head: LEGAL AND ETHICAL ISSUES 1 Legal and Ethical Issues Herzing College Online U7A1: MBA 663-8: Health Insurance and Managed Care LEGAL AND ETHICAL ISSUES Legal and Ethical Issues The current landscape of the healthcare industry changes rapidly with new rules and regulations, placing many healthcare insurance and managed care organizations in jeopardy of litigation because of legal and ethical issues. Controversy surrounds the healthcare industry because of the decisions made by managed care organizations regarding patient treatment and payment to providers. The following examines the legal and ethical issues surrounding the everchanging healthcare insurance and managed care organizations. Managed Care Conflict The problem facing managed care organizations and health insurance is the inherent conflict with their goal of cost containment by reducing service utilization, with the healthcare delivery system that places the patient’s health first (Kongstvedt, 2013). According to Saunier (2011), the definition of managed care is: 2 Processes or techniques used by any entity that delivers, administers and / or assumes risk for health services in order to control or influence the quality, accessibility, utilization, costs and prices, or outcomes of such services provided to a defined population. (Saunier, 2011, p. 22) Saunier (2011) describes the purpose of these organizations that manage care is the control of costs by “implementing aggressive cost containment...

Words: 1504 - Pages: 7

Premium Essay

Administrative Ethics

... There are a plethora of issues concerning patient privacy, confidentiality, and HIPAA. Unfortunately, these are issues that have arisen more recently; patient privacy and confidentiality wasn’t a largely disputed issue before the introduction and increase of health information technology implementation and usage. According to the Center for Democracy and Technology, “Health information technology has tremendous potential to improve health care quality and reduce costs while empowering patients to play a greater role in the management of their own care. At the same time, however, electronic storage and exchange of personal health information poses risks to privacy. Unaddressed, privacy concerns can stand in the way of realizing the benefits of health IT, for neither patients nor providers will make full use of a system they do not trust.” One has no choice but to take the two into consideration: do the speed, accuracy, and reduced cost of health information technology outweigh the potential privacy concerns? As stated in a brief article published by the National Center for Biotechnology Information, “The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable.” While these may not be considered issues that pose a serious, heavy threat or...

Words: 1190 - Pages: 5

Premium Essay

Legal and Ethical Issues Relating to Business Information

...Legal and Ethical Issues Relating to Business Information Introduction I this task I’m going to explain the legal and ethical issues in relation to the use of businesses information and also I’m going to explain operational issues as well in the last park of the task i going to analyse the legal ethical and operational issues using appropriate examples . Most people do not feel safe in putting or giving their personal details on different social networks like Facebook and Twitter and another organization who uses the personal detail from the people or customers , the reason being of many hackers invading other people's privacy this also can happen with many businesses as well such as Tesco ,Asda e.g. if they do not have a security system to keep them safe . Legal Issues These are various items of legislation to protect the use of business information. Data Protection Act 1998 is one of the legal issue business information. Many businesses store use information about people. The Data Protection Act protects information held about people from being misused. The information stored by businesses on databases must be: ✓ Obtained fairly and lawfully ✓ Used only for the purposes stated during collection ✓ Adequate, relevant and not excessive in relation to the intended use ✓ Accurate and up to date ✓ Not kept for longer than necessary ✓ Processed in line with your rights ✓ Subject to procedures to prevent unlawful processing, accidental loss, destruction...

Words: 2188 - Pages: 9

Premium Essay

Social, Legal, and Ethical Issues in the Information Age

...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...

Words: 5310 - Pages: 22

Premium Essay

Management and Information Systems

...Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Analyze the relationships among ethical, social, and political issues that are raised by information systems. 2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using...

Words: 20079 - Pages: 81