Ethical Scenario
Ethics is a term used to refer to the set of rules that help in determining right and wrong behavior during moral decision making. One of the major issues in Information Technology and Information Systems is computer ethics. This is primarily because the rapid technological advancements seem to enhance the likelihood of unethical use of computer devices and information systems. As these advancements continue to occur, it is expected that the misuse and abuse of these system will continue in the future (Masrom et. al., 2010, p.26). Therefore, IT professionals are increasingly faced with the need to promote ethical use of information systems in order to enhance information security. Some of the most common examples of unethical use of information systems include identity theft, hacking, software piracy, and spam. There is need to address these unethical practices because of their potential harm to individuals and the society.
Information Security Ethical Scenario
As the owner of a high-class restaurant in New York City, I recently purchased a new customer relationship management information system that can assist in managing customer reservations. The new information system provides the restaurant with the capability of tracking the frequency of customer visits as well as their orders, size of their bills, the kinds of tips they leave for employees, where they are likely to sit in the restaurant, and whether they are difficult customers. While this customer relationship management information system helps in providing insights regarding customers, there are some ethical concerns regarding its processes, objectives, and outcomes. Some of these concerns include whether this type of information is an invasion of customers' privacy, the ethical responsibilities to safeguard the information, and whether it would be ethical to sell the information to other businesses in the area. These ethical concerns should be addressed in attempts to ensure information security and promote the effectiveness of the new customer relationship management information system.
The type of information collected in the new customer relationship management information system is not tantamount to an invasion of customers' privacy because ethics was not compromised. The information generally reflects the type of information collected and maintained by a customer relationship management information system. These information systems generally collect information regarding customer purchases, customer support calls, customer returns, product service and repairs, customer training, and sales activities. The information collected in the new CRM information system for the restaurant in New York City falls under these categories.
However, compromise of ethics could occur if the information is used for unethical purposes that do not promote business objectives. In essence, the information should only be used to promote and accomplish business objectives since this is the primary reason for collecting and maintaining the information.
Ethical Responsibilities to Protect the Information
One of the major ways to ensure security of the information gathered by the customer relationship management information system is to protect the information through crucial ethical responsibilities. Ethical responsibilities to protect customer information…
ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been
Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
Security Manager Leadership Analysis & Assessment of Main Management Skills of Security Managers The role of security managers and their progression to Chief Information Security Officers (CISO) in their careers is often delineated by a very broad base of experiences, expertise, skills and the continual development of management and leadership skills. The intent of this analysis and assessment is to define the most critically important management skills for security managers, including those
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
" (Harman, Flite, and Bond, 2012) the key to the preservation of confidentiality is "making sure that only authorized individuals have access to that information. The process of controlling access -- limiting who can see what -- begins with authorizing users." (Harman, Flite, and Bond, 2012) Employers are held accountable under the HIPAA Privacy and Security Rules for their employee's actions. The federal agency that holds responsibility for the development
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now