StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Role of the Professional Code of Ethics in Addressing Security Threats - Essay Example

Cite this document
Summary
The paper "The Role of the Professional Code of Ethics in Addressing Security Threats" highlights that in an increasingly globalized world, when interconnectivity across geographies is becoming easier than ever before, there is a great necessity for ensuring the safety of computer networks. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
The Role of the Professional Code of Ethics in Addressing Security Threats
Read Text Preview

Extract of sample "The Role of the Professional Code of Ethics in Addressing Security Threats"

The Role of the Professional of Ethics in addressing Security Threats: Late last century, we saw the rapid rise of Information Technology, replacing erstwhile manufacturing based industrial societies into knowledge based ones. With this transformation came attendant risks and threats to security of information. This aspect of the new digital age has invoked much debate and concern among stakeholders. Some IT companies have come up with anti-piracy and data protection security systems. Some others have emphasised the importance of adhering to ethical codes of conduct that would prevent unsafe and unethical practices on part of IT employees. Organisations such as Association for Computer Machinery (ACM) and Australian Computer Society (ACS) are strong advocates of ethical practices by IT personnel and have laid out sets of recommendations. This essay will look at some of their codes and how they can have practical use in reducing clearly identified threats to computer systems. At the outset, it is important to remember that almost any sort of business enterprise today will have a dedicated IT department. Hence the code of ethics laid down by ACM and ACS are applicable to IT personnel of such departments, irrespective of the business domain of the particular organisation. Some of the frequently occuring information security breaches are common for almost all businesses that are enabled by Information Technology. Broadly speaking, the term system security threats refers to “the acts or incidents that can and will affect the integrity of business systems, which in turn will affect the reliability and privacy of business data”. (Lin, 2006). Irrespective of the size of the organisation, the threat is persistent, and hence measures have to be undertaken to curb security breaches and ensure business continuity. Beyond the commonly identified security threats such as Viruses, Spyware, Adware, etc, a major source of information leakage and misappropriation occurs due to the abuse/misuse of computer network by employees themselves. (Lin, 2006). Since IT personnel have privileged access to vital business information, it is often very tempting for them to misuse this privilege and undermine the prospects for their employers. Employees are also prone to using Internet connectivity for their personal use when in fact they were strictly meant for official use. For example while email and general Internet access are given to improve productivity, surveys have shown that employees (including IT personnel) use them for such activities as online-shopping, playing games, social networking websites, etc. Some of them use it to moonlight on other projects which fall outside the terms of agreement in the employee contract (Kolb & Abdullah, 2009). All these activities exposes the organisation to security threats as not all websites have robust security measures to counter these threats. Moreover, considering that using computer network facilities for personal use/gain is a breach of trust place by the employers, it is useful for employees to remember clause 1.3 of ACM code of ethics, which states that without honesty no amount of trust could be built. Lacking trust, an organisation will lose its cohesion and quickly disintegrate. Hence, the honest IT professional should abstain from making “deliberately false or deceptive claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and problems”. (ACM, Section 1.3, 1992) At the same time, the IT professional will ensure that there is no conflict of interest in his mind; and that his discharge of duties are as stated and undersigned in the employment agreement. Usually, the conflict of interest is between professional obligations and personal interests of the employee. Confronted with such as dilemma, the employee should always give preference to his ‘professional obligations’ so that the interests of his organisation are protected. A 2005 survey on American business corporations is quite instructive in this regard, for its findings are relevant to the Australian corporate world. The survey shows that 76% of organisations keep track of their employees web connections; one in two companies screen the content transmitted by employees. The survey further showed that one in four organisations being surveyed had terminated the employment of workers for misuse/abuse o the Internet. Similarly, about 25% of companies “have fired employees for misuse of e-mail; and 65% of those surveyed used software to block employee access to inappropriate websites” (Lin, 2006). Although most organisations allow limited personal usage of the Internet, it is prudent that organisations also have a written policy with respect to usage of computer systems. The key here is to constantly adapt the set of policies to the changing IT environment. In this respect, the code of ethics provided by ACM can be useful in informing employees of the consequences of their actions. For example imperative 2.8 of ACM Code of Ethics and Professional Conduct requires IT personnel to gain access to the companys networks and other IT facilities only after being authorised (ACS, 2005). This means “theft or destruction or trespassing of tangible and electronic property is prohibited...No one should enter or use anothers computer system, software, or data files without permission. One must always have appropriate approval before using system resources, including communication ports, file space, other system peripherals, and computer time.” (ACM, Section 2, 1992) According to Gartner research firm, leakage of proprietary/confidential company information can cost an organisation up to 12 percent of its total annual expenditure. With the cost of implementing security services expected to increase 20% this year, it would be unrealistic for organisations to fix security issues after the fact (Britt, 2007). Given that this much money is at stake, it is prudent on part of the IT department personnel to follow Code of Ethical conduct as prescribed by ACM or ACS. Acting upon such codes would prevent wasteful expenditures for the company. This especially makes sense when we realise that there is no correlation between the money spent on implementing security features and their eventual effectiveness. As per the same Gartner research report, the true measure of a successful security system is its cost effectiveness. (Britt, 2007) In this context, the motto of prevention is the best possible course for IT companies. IT personnel should also remember that their obligation extends beyond that of the organisation and to the larger society. The IT departments of major banking institutions, public sector undertakings, government agencies, etc., thereby play a role that is beyond mere commerce. Security failures in these organisations can have ramifications that can affect general public from all walks of life. In this context, IT personnel will do well to remember the following set of personal pledges from ACS Code of Ethics document: “I must protect and promote the health and safety of those affected by my work. I must endeavour to understand, and give due regard to, the perceptions of those affected by my work. I must attempt to increase the feelings of personal satisfaction, competence, and control of those affected by my work.” (ACS, section 4.8, 2005) In conclusion, there is no doubt about the need for increased security standards in the digital age. But while drawing up security measures and implementing them is a costly affair, it saves both time, resources and business prospects to pro-actively counter such threats. The foremost among those proactive measures is to ensure that employees of organisation, especially from Information Technology departments, take an oath of allegiance to a set of ethical standards. The two sets discussed in this essay, from ACS and ACM are very well written, touching all aspects of an IT professionals work life. It is imperative that the top management ensures that the recommended professional behaviour stated in these two documents does see practical application. The Code of Ethics document, being abstract and generalised as it is, can give guidance up to a certain level. Hence, the individual employee must take personal interest in meeting those standards and also take the code in its true spirit. Otherwise reading and interpreting them literally, one can find loopholes and justifications for he worst kind of professional conduct (Cox, 2008). In conclusion, it is apt to say that in an increasingly globalized world, when interconnectivity across geographies are becoming easier than ever before, there is a great necessity for ensuring safety of computer networks. Such a safe computer system environment is not only in the interest of the business corporation and the IT organisation, but also in the interest of the general public, for they are also stakeholders in the success of these organisations. And top managers in IT organisations as well as those heading IT departments in other business firms should see to it that the recommendations given by organisations such as ACM and ACS are properly implemented within their purview and that their subordinates absorb the spirit of ethical conduct. With IT expected to expand into all aspects of life in the coming years, it is imperative that the culture of ethical conduct is developed and becomes entrenched during the industrys formative stages itself. References Journals: Britt, P. (2007, December). Technology: Just a Part of the Security Puzzle. Information Today, 24, 1+. Cox, B. (2008, July). Lock the Networks Back Door. Communications News, 45, 12. Kolb, N., & Abdullah, F. (2009). Developing an Information Security Awareness Program for a Non-profit Organisation. International Management Review, 5(2), 103+. Lin, P. P. (2006, July). System Security Threats and Controls. The CPA Journal, 76, 58+. Websites: Code of Ethics, 1992, Association for Computing Machinery, viewed on 20th October, 2010 from Code of Ethics, 2005, Australian Computer Society, viewed on 20th October, 2010, from Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Associations such as the ACM and the Australian Computer Society have Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1570894-associations-such-as-the-acm-and-the-australian-computer-society-have-developed-code-of-ethics-for-computing-professionals
(Associations Such As the ACM and the Australian Computer Society Have Essay)
https://studentshare.org/miscellaneous/1570894-associations-such-as-the-acm-and-the-australian-computer-society-have-developed-code-of-ethics-for-computing-professionals.
“Associations Such As the ACM and the Australian Computer Society Have Essay”, n.d. https://studentshare.org/miscellaneous/1570894-associations-such-as-the-acm-and-the-australian-computer-society-have-developed-code-of-ethics-for-computing-professionals.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Role of the Professional Code of Ethics in Addressing Security Threats

Avoiding Cyber Threats in E-Commerce

The paper "Avoiding Cyber threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... The global security technology and services were estimated to be $67.... The cybersecurity standards are prevailing security standards that enable various organizations to practice safe security techniques so as to reduce the number of successful cybersecurity attacks (Amoroso, 2012)....
6 Pages (1500 words) Essay

Social Support and Family Connectedness

The integrative awareness stage is inclusive of security senses and abilities to appreciate positive aspects for own culture as well as dominant cultures.... The paper "Social Support and Family Connectedness" tells that social support refers to the complex construction of elements that are illustrated by the function and structure of interpersonal relationships....
11 Pages (2750 words) Assignment

Security Planning and the History of Security Services

In 1917, Army and Navy intelligence were strengthened, the National security Agency was established and the first federal espionage law was enacted.... The author of this paper states that the counterfeiting of money posed a major problem for the US government.... Hence, it was treated as a capital crime....
9 Pages (2250 words) Assignment

Enhancing Employee-Management Relations

The research would discuss employee rights, employer responsibilities, disciplinary policy and procedures, and managerial or business ethics in employee relations.... Contemporary problems in employee – management relations would be presented with suggested solutions to address them....
9 Pages (2250 words) Term Paper

National Security, Fight Against Terror And The Police Ethics

he international terrorism has long been witnessed as one of the major threats for the US citizens.... The continuous threats from the international terrorist groups have become a major and critical concerning factor, which provided drastic effects to the national economy.... The writer of the paper "National security, Fight Against Terror And The Police Ethics" discusses the observation of different research articles and governmental reports concerning the involvement of the DHS employees with different smuggling and terrorist groups....
12 Pages (3000 words) Research Paper

The Ethical Issues of Information Security

Based on this organizations have formulated their own codes of ethics that their members should abide by which is a collaborative effort that aims to raise awareness of computer responsibility (Whitman & Mattord, 2009).... Technology exposes its users to various threats and so the need for legal systems to guarantee the safety of its users (Whitman & Mattord, 2009).... The paper "The Ethical Issues of Information security " looks at the ethical issues of information security as well as the various legislations that have been made to guarantee information security to individuals as well as to organizations and the empirical theories that explain behavior....
8 Pages (2000 words) Term Paper

Social Media, Networking, and IT Ethics - Cultural Perspective

SECURITY OVERVIEWSecurity is not simply about securing and protecting our personal information and business network from outside thefts and threats; it is well concerned about saving and protecting beside threats within the workplace.... In other words, it is significant for individuals and staff members to keep in mind not simply the possible threats however as well as how to stop/deal with those threats.... owever, a lot of internet threats and issues are simply preventable and immediately done because of employees who are only unaware of their occurrence....
12 Pages (3000 words) Essay

Ethics in Engineering

In his view, an overarching objective of ethics in the environment is to ensure consideration of the total immediate and the ultimate environmental impacts of the engineering designs, products, and practices to ensure the protection of the public and natural environment.... s Akhtaruzzaman et al (2011) argue, the codes of ethics in engineering practice are intended to consciously put public interest above the practicing engineers' interests.... From the paper "ethics in Engineering" it is clear that engineers have an obligation, to be honest, and fair while dealing with their clients, employers and the public and to uphold the integrity of the environment....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us