Ethical Scenario
Ethics is a term used to refer to the set of rules that help in determining right and wrong behavior during moral decision making. One of the major issues in Information Technology and Information Systems is computer ethics. This is primarily because the rapid technological advancements seem to enhance the likelihood of unethical use of computer devices and information systems. As these advancements continue to occur, it is expected that the misuse and abuse of these system will continue in the future (Masrom et. al., 2010, p.26). Therefore, IT professionals are increasingly faced with the need to promote ethical use of information systems in order to enhance information security. Some of the most common examples of unethical use of information systems include identity theft, hacking, software piracy, and spam. There is need to address these unethical practices because of their potential harm to individuals and the society.
Information Security Ethical Scenario
As the owner of a high-class restaurant in New York City, I recently purchased a new customer relationship management information system that can assist in managing customer reservations. The new information system provides the restaurant with the capability of tracking the frequency of customer visits as well as their orders, size of their bills, the kinds of tips they leave for employees, where they are likely to sit in the restaurant, and whether they are difficult customers. While this customer relationship management information system helps in providing insights regarding customers, there are some ethical concerns regarding its processes, objectives, and outcomes. Some of these concerns include whether this type of information is an invasion of customers' privacy, the ethical responsibilities to safeguard the information, and whether it would be ethical to sell the information to other businesses in the area. These ethical concerns should be addressed in attempts to ensure information security and promote the effectiveness of the new customer relationship management information system.
The type of information collected in the new customer relationship management information system is not tantamount to an invasion of customers' privacy because ethics was not compromised. The information generally reflects the type of information collected and maintained by a customer relationship management information system. These information systems generally collect information regarding customer purchases, customer support calls, customer returns, product service and repairs, customer training, and sales activities. The information collected in the new CRM information system for the restaurant in New York City falls under these categories.
However, compromise of ethics could occur if the information is used for unethical purposes that do not promote business objectives. In essence, the information should only be used to promote and accomplish business objectives since this is the primary reason for collecting and maintaining the information.
Ethical Responsibilities to Protect the Information
One of the major ways to ensure security of the information gathered by the customer relationship management information system is to protect the information through crucial ethical responsibilities. Ethical responsibilities to protect customer information…
ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been
Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination
Ethical Problems in Business PRINCIPLE: Ethics may be termed as the inner guiding moral principles, values and beliefs people use to indicate and identify what is acceptable and appropriate behavior whilst straying away from the opposite (Jones, 2007). However each individual may perceive different behaviors as acceptable and appropriate depending on the individual's own self-interests, attitudes, beliefs and values. To dig further into the aspects of business ethics, it is primarily a notion for
" (Harman, Flite, and Bond, 2012) the key to the preservation of confidentiality is "making sure that only authorized individuals have access to that information. The process of controlling access -- limiting who can see what -- begins with authorizing users." (Harman, Flite, and Bond, 2012) Employers are held accountable under the HIPAA Privacy and Security Rules for their employee's actions. The federal agency that holds responsibility for the development
Ethical Behavior Theory in Organizations This analytical research report discusses the debatable issue of the much-needed ethical behavior in working milieu. The research paper highlights the fundamental characteristics, a well-drafted research design, a separate section of suggestions; a Works Cited an appendix featuring important data and relevant diagrams pertaining to the organizational behavior theory and the underlying ethical issues. The Works Cited nine sources in MLA format. ETHICS AND ORGANIZATIONS Ethics and ethical
Remote access controls. Network security management. Password policies. Compliance with the policies and procedures of the company is very vital to the organization, and the policies and procedures should be clearly communicated to the appropriate business teams. Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now