Ethical Scenario
Ethics is a term used to refer to the set of rules that help in determining right and wrong behavior during moral decision making. One of the major issues in Information Technology and Information Systems is computer ethics. This is primarily because the rapid technological advancements seem to enhance the likelihood of unethical use of computer devices and information systems. As these advancements continue to occur, it is expected that the misuse and abuse of these system will continue in the future (Masrom et. al., 2010, p.26). Therefore, IT professionals are increasingly faced with the need to promote ethical use of information systems in order to enhance information security. Some of the most common examples of unethical use of information systems include identity theft, hacking, software piracy, and spam. There is need to address these unethical practices because of their potential harm to individuals and the society.
Information Security Ethical Scenario
As the owner of a high-class restaurant in New York City, I recently purchased a new customer relationship management information system that can assist in managing customer reservations. The new information system provides the restaurant with the capability of tracking the frequency of customer visits as well as their orders, size of their bills, the kinds of tips they leave for employees, where they are likely to sit in the restaurant, and whether they are difficult customers. While this customer relationship management information system helps in providing insights regarding customers, there are some ethical concerns regarding its processes, objectives, and outcomes. Some of these concerns include whether this type of information is an invasion of customers' privacy, the ethical responsibilities to safeguard the information, and whether it would be ethical to sell the information to other businesses in the area. These ethical concerns should be addressed in attempts to ensure information security and promote the effectiveness of the new customer relationship management information system.
The type of information collected in the new customer relationship management information system is not tantamount to an invasion of customers' privacy because ethics was not compromised. The information generally reflects the type of information collected and maintained by a customer relationship management information system. These information systems generally collect information regarding customer purchases, customer support calls, customer returns, product service and repairs, customer training, and sales activities. The information collected in the new CRM information system for the restaurant in New York City falls under these categories.
However, compromise of ethics could occur if the information is used for unethical purposes that do not promote business objectives. In essence, the information should only be used to promote and accomplish business objectives since this is the primary reason for collecting and maintaining the information.
Ethical Responsibilities to Protect the Information
One of the major ways to ensure security of the information gathered by the customer relationship management information system is to protect the information through crucial ethical responsibilities. Ethical responsibilities to protect customer information…
Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the
Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the
SECURITY Information Security and Risk Management in IT This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the
Security at Work Information Security within the nursing fraternity With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be
Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice
Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now