StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical, Social, and Legal Issues Relevant to Information Systems - Report Example

Cite this document
Summary
This report "Ethical, Social, and Legal Issues Relevant to Information Systems" discusses effective data administration that entails adherence to ethical, social, and legal standards that guide individuals or institutions when transmitting the information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Ethical, Social, and Legal Issues Relevant to Information Systems
Read Text Preview

Extract of sample "Ethical, Social, and Legal Issues Relevant to Information Systems"

? PRIVACY Privacy Introduction Privacy in information management is an integral element that s should embrace to build confidence among stakeholders. Information management requires the adoption effective policies and guidelines that are ethically, socially and legally relevant. This ensures that data within an institution serves the intended purpose. Institutions that seek to enhance their performance and confidence levels should adopt effective data management systems. The systems should enhance data privacy by ensuring that only authorised persons access definite information. As apparent, effective data management, entails adherence to ethical, social and legal standards that guide individuals or institutions when transmitting information. The standards are significant especially in the current environment where various institutions are facing immense challenges in data management. The standards present requisite incentives that ensure information within institutions is used effectively. Data privacy is of fundamental concern within several institutions, for example, banks, hospitals, and learning centres. Privacy emphasises the need for appropriate and safety management of client’s data to boost their confidence. This paper discusses privacy because it is a fundamental aspect that ensures quality administration of data within institutions. Ethical, social and legal issues relevant to Information Systems As noted Information technology (IT), systems are software or hardware used by individuals and institutions to execute activities. The systems facilitate effective and efficient delivery of services in various facets of operations, and are recognisable as key pillars that influence data privacy. They aid information capturing, encoding, processing, storage and dissemination. The administration of such activities or information should be reliant on excellent privacy standards (Moon2010, p.1). The standards should assume social, legal and ethical dimensions. Furthermore, they should focus on an institution’s capacity to enhance sustainability. Ethics defines moral processes in institutions. It sets clear standards and moral values that stakeholders should obey in various jurisdictions. Ethical standards ensure delivery of quality services and optimal utilisation of resources, as well as enhancement of privacy in information administration. Institutions should formulate viable ethical principles, for example, the golden rule, utilitarian and risk aversion principles (Quigley 2004, p.2). This creates a favourable environment where every stakeholder is treated with diligence and respect. This is significant since institutions that operate with inferior ethical guidelines cannot maintain their clients in the current dynamic world that experiences immense competition. Code of ethics requires employees within institutions or individuals to use client information with confidence. They should also enhance privacy, security in data management and treat clients with respect. Exhibition of high level of cautiousness, prudence, timely delivery of services and accountability also form key ethical guidelines. The standards are integral in facilitating performance since they encourage accountability, responsibility and adherence to due processes while executing activities. Each profession has set ethical guidelines that guide execution of activities (Moon 2010, p.1). The professions, for example, nursing and accounting focuses on data privacy based on the information that individuals in such professions possess. Information conveyed through IT system significantly affect social processes. Poor management of information may lead to increased social incoherence, animosity and damage mutual understanding. This stalls performance and delivery of quality services to clients. Institutions should adopt the recommended information management practices to advance social integration. They should also adopt best practices to facilitate effective mitigation of social issues (Wilson, 2004, p. 119). Social issues influence the flow of information and development of privacy systems. The issues include social networking systems, communication, language complications, unethical behaviour, poor perception and attitude. Social networking systems, for example, E-mail, Skype and face book require proper security measures to ensure that individuals privacy is respected. The communication platforms have been subject to criticism due to their capacity to expose individual’s information. This has led to social disintegration in several settings. As noted, the social issues are complex in nature. This explains why individuals and authorities must take requisite measures to encourage social integration. Legally, data privacy is a paramount element within several jurisdictions (Wilson, 2004, p.119). This has prompted the development of stiff legal provisions and penalties. The penalties ensure that individuals or institutions manage the client information with confidence. The legal provisions mitigate the legal issues that have been impeding effective management of information. This has provided a glimmer of hope to individuals who affirm the need for the advancement of data privacy especially through IT systems. The key legal issues affecting data management include lack of effective guidelines to streamline data usage, transfer, content, disposal, safety and rights of punishing hackers. Lack of the legal incentives is a paralysing factor that several data users complaining about. The weak provisions have allowed data hackers and other irresponsibility IT network users who convey ill massages to escape without facing punishment (Wilson 2004, p. 121). These persons have not received punishment for their actions despite the resultant animosity and social disintegration. It is significant to note that legal complications have not made it possible for IT offenders to suffer liability that comes with their actions. However, this scenario is bound to change with the stringent measures that authorities within several settings develop (Duquenoy, Jones & Blundell, 2008, p. 3). Assessment of the key aspects of legal, ethical and cultural issues relevant to an IT professional According to Duquenoy, et al (2008, p. 3) professionals in diverse sectors, for example, IT individuals should ensure that privacy standards are upheld within institutions. They should execute their activities with diligence, accuracy and good faith to avert complications that may lead to challenges. The professionals should adhere to set ethical standards that guide operations in the communication sector. This facilitates social integration and builds confidence amid stakeholders who focus on management of information. The key ethical issues that IT professional should uphold to achieve privacy standards include avoidance of disclosure of information, ensuring quality input of data, ensuring limited neglect to crucial data and adherence to confidentiality levels. The IT professionals may also employ passwords, and username as ethical control measures to avert unauthorised access to information (Duquenoy, et al, 2008, p, 3). The ethical issues are critical when effective information management is to take precedence within institutions. These ethical concerns provide requisite incentives that boost social understanding, societal growth and encourages the achievement of valuable results. Consequently, social issues that IT professionals should consider include the establishment of property rights, data usage, information safety and adherence to due process. These elements form social and cultural aspects that are fundamental in ensuring safety, timely and effective social networking. They facilitate adequate identification and development of mitigation measures to IT malpractices that may be detrimental to social and cultural coherence. This enhances social integration by the IT officials. In particular, information safety is an aspect that is crucial in any setting that IT officials must consider (Duquenoy, et al, 2008, p. 3). IT officials should formulate credible systems or software to guarantee data safety by stakeholders when need arises. IT officials should also adhere to due processes during information management. They should integrate conventional and quality systems that can drive various operations especially when they are significant in data administration. This addresses cultural and social issues. The officials should also sensitise system users on property rights that are vital when identifying genuine systems. This is crucial since privacy in information management can be enhanced effectively when individuals use systems with usage rights. This means that such systems are genuine and cannot be compromised by hackers. Opposing perspectives and authority of reference material There are critical views that oppose the reasoning that social, legal and ethical issues influence information privacy. The dissenting emanate from various scholars who assert that privacy in information management is not reliant on ethical, legal or social guidelines. It is a logistical failure and a resultant feature of adapting inferior control protocols that lead to complications in privacy within institutions. The scholars state that institutions that seek to achieve their aspirations in terms of effective data management should adopt clear policies and information management protocol. These organisations should integrate effective software and hardware, initiate the use of passwords systems, username codes, develop a centralised system of management and adhere to the utilisation principle of data administration. The aspects are identifiable as key control measures that ensure sanity in data management (Quigley, 2004, p. 2). This idea encourages accountability, responsibility, or liability in case of defaults by individuals. Additionally, it prompts adherence to due processes. The scholars assert that if the protocols are observed, rampant cases of privacy defaults are averted. The use of controls measures are viable and facilitate data management. Professional principles to an application domain of current and emerging technologies Several individuals or institutions are currently refocusing their synergies to facilitate data privacy through adoption of viable professional principles. They are keen on instituting conventional information control systems, integration of effective software’s, development of noble ethical guidelines and legal standards to streamline information management. The authorities have also set pertinent social standards to ensure that client data is properly administered (Quigley, 2004, p. 2). They affirm that data privacy is a noble element that cannot be ignored in the competitive environment where clients are seeking services within institutions that enhance confidentiality during data administration. Clients and customers prefer confidentiality and expect that any information should serve its intended purpose. Conclusion Effective data administration entails adherence to ethical, social and legal standards that guide individuals or institutions when transmitting information. The standards are important in the current environment where various institutions are facing immense challenges in data management. Institutions that seek to leverage their performance and confidence levels should adopt effective data management systems. The systems should enhance data privacy to ensure sanity in the management of client information. Reference List Duquenoy, P., Jones, S., & Blundell, B 2008, Ethical, legal and professional issues in Computing, Australia, Thomson. Moon, S 2010, Professional, Ethical, and Legal Issues and Violations in Human Services, Viewed 19th Nov 2012 at http://voices.yahoo.com/professional-ethical-legal-issues-violations-7405420.html Quigley, M 2004, Information security and ethics: social and organizational issues, Hershey PA, IRM Press. Wilson, L 2004, Ethical, Legal and Social Issues of Genomic Research: Striking a Balance between Science and Law, Journal of Legal, Ethical and Regulatory Issues, 7(1), pp. 119-140. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Privacy Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1461921-privacy
(Privacy Essay Example | Topics and Well Written Essays - 1500 Words)
Privacy Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1461921-privacy.
“Privacy Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1461921-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical, Social, and Legal Issues Relevant to Information Systems

Ethical Issues of Sell Side Commerce

Because of the vastness of online advertising, a website can be open to millions of individuals the world over for almost zero cost and with information being capable of changing almost instantly, the website can, at all times, be updated with all the newest products to match with clients' demands (Berthon et al 261).... Whereas e-commerce has undergone extensive growth in the last 10 years, consumers' concerns about ethical issues continue to increase, as well....
10 Pages (2500 words) Case Study

Ethical versus Unethical Hacking

However, the term's definition has two sides: the good side, which entails gaining knowledge about systems for purposes of enhancing security, and the bad side, which involves gaining illegal access to systems so as to steal or damage information.... However, not all hackers and hacking is wrong, and some do assist in developing robust systems and guarding them against attacks.... The paper "Ethical versus Unethical Hacking" highlights that the boundary between ethical and unethical hacking is slim, and it calls for qualities such as trustworthiness to ensure that system administrators do not use sensitive information maliciously....
10 Pages (2500 words) Research Paper

Defining the Ethical Problem and Relevant Research in Ethics

This is a systems versus systems scenario in which the social worker must consider community needs with individual needs in order to determine his or her responsibility related to group privacy and disclosure ethics.... hellip; There is another member of this same therapy group who refuses to sign consent forms for the release of information that will include knowledge of the group's activities with the social worker, thus complicating the NASW Code of Ethics in terms of disclosure....
12 Pages (3000 words) Essay

Social, Ethical, and Professional Aspects of Intellectual Property

Apart from asset-related or personal intellectual properties, there is also a type named 'digital intellectual property' which is technical and information technology-oriented.... n this paper, the value of the intellectual property for information technology professionals has been discussed in order to know what they need to do for the protection of intellectual property.... Some of the most common digital intellectual property issues include open source code, competitive intelligence....
14 Pages (3500 words) Coursework

Ethical Issues in Criminal Justice

The general definition of deception can be presented in the form of believing or convincing others about considering a particular set of information to be true or false depending on varied scenarios.... The approach involves dishonesty and lies but certainly ensures the compilation of positive information during the process of policy integration in most of the scenarios.... In order to obtain proper information and confession from the end of the criminals, deception is deemed to be a highly effective approach....
12 Pages (3000 words) Coursework

Social, Professional and Ethical Issues in Information Systems

This coursework "Social, Professional and Ethical Issues in information systems" focuses on the observed behavior from internet chat rooms that announces the study of participants involved in influencing their behavior and effect on the research result.... Obtaining relevant consent from Instagram participants through web-based searches is difficult based on the researcher with the likelihood of meeting the Instagram participants by a person.... Obtaining relevant consent from Instagram participants through web-based searches is difficult based on the researcher with the likelihood of meeting the Instagram participants by a person....
15 Pages (3750 words) Coursework

The Ethical Issues of Information Security

The expansion of global networks has facilitated the smooth operations of trade and commerce because of increased use and dependence on computing systems and communication.... The expansion of global networks has facilitated the smooth operations of trade and commerce because of increased use and dependence on computing systems and communication.... Securing these systems has had organizations develop their own pool of information security to ensure that they have secure computing environments....
8 Pages (2000 words) Term Paper

Computer Ethics for IT Professionals

It has been attempted to be explained by many researchers, however, Bynum and Rogerson (1996) defined it comprehensively as the field of analysis that identifies the effects of information technology on the health, wealth, intellect, freedom, privacy, security and work of individuals in the society.... The actions that may seem futile in their own eyes may create great ethical issues.... hellip; The compliance with the ethical standards will result in safer, reliable and effective computer environments....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us