StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology Ethics - Essay Example

Cite this document
Summary
The paper "Information Technology Ethics" describes that system security is generally limited to guaranteeing the right to access a system's data and resources by setting up authentication and control mechanisms that ensure that the users have rights that are only granted to them…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Information Technology Ethics
Read Text Preview

Extract of sample "Information Technology Ethics"

Technology today makes it very easy to gather, store, communicate, and likewise, and manipulate data. Consequently, developments in information systems also involve social and political relationships-and thus ethical consideration in how information is used is all the more important. Government records, workplaces, and private lives of the people are within the reach of the system and it is a vital responsibility now to balance the needs and rights of everyone.
While everything with online security systems seems very user-friendly and tends to make life easier for a management team, there is also a significantly dangerous side to the use of online information systems. One of them happens to be a cybercrime. Typically, cyber crime can be divided into four categories; theft, fraud, copyright infringement, and attacks. With the popularization of the internet and its several weak links, hackers find it possible to break into security systems where they have access to a person's key personal data such as social security numbers, date of birth, driver's license numbers, and credit card information. Affected individuals have experienced fraudulent financial transactions, and false accusations of crimes they have never committed which begin showing against their names on their record files.

Information systems are vulnerable to physical attacks, electronic hacking, viruses, and natural disasters. With computer systems serving as the backbone of many organizations, managers must be aware of both: the risks and the opportunities to minimize the risks to information systems. A virus is a computer program designed to infect another computer without the permission or knowledge of the user. It can spread from one computer to another, by either sending it over a network, for instance, the internet or by carrying it on removable media such as CDs, DVDs, USB drives, etc. A virus tends to destroy an information system, deleting the data and making it forever irrecoverable.

To look on the bright side, these threats to information systems can be fought with some security measures. The main goal is to protect the confidentiality, integrity, and availability of information.

To ensure that there is no vulnerability of an information system being attacked, the following must be kept in mind:
• Identify the security needs and the IT risks of the company.
• Outline the rules and procedures that must be implemented.
• Monitor and detect the information system's vulnerability and keep updated about the system's flaws
• Define the actions to be taken in case a threat is detected.

However, security must also go beyond employee knowledge and cover the following areas as well:
• A physical and logical security mechanism that requires employees to continuously supervise the information system.
• A procedure for managing updates.
• A properly planned backup strategy.
• An up-to-date documented system.
• An active firewall to fight malware.

Even though an information system is prone to many attacks, it can be overcome by taking into account such measures and while there is no denying the fact that a computer information system is the vital key to the success of an expanding company, it is justifiable to say that such consideration be given to its information system. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E potfolio Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1424165-e-potfolio
(E Potfolio Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1424165-e-potfolio.
“E Potfolio Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1424165-e-potfolio.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology Ethics

Balancing of Technology Developed from Human Ingenuity

The author of the paper titled "Balancing of technology Developed From Human Ingenuity" argues that the important goal is learning to balance our technology developed from human ingenuity, but not lose the human spirit which has thrived since the beginning.... In counter perspective, the development of technology has granted humans the ability to take life away through the development of conventional, biological, and nuclear weapons.... Probably the market which has seen the greatest increase in the development of technology is the communications industry with computers, cell phones, webcams, etc....
2 Pages (500 words) Coursework

Computer and Information Technology Ethics in Saudi Arabian Business Organizations: Attitudes and Approaches

This report ''Computer and Information Technology Ethics in Saudi Arabian Business Organizations: Attitudes and Approaches'' focuses on certain theoretical study work based on the institutional theories on IT and organizational learning to provide with a fundamental understanding on the ethical issues related to information systems.... Be it in the education system or the organizational cultures, the information technology is one of the most flexible applications to provide huge benefits to its users....
8 Pages (2000 words) Report

Computing and Information Technology

The essay "Computing and information technology" focuses on the critical analysis of the issues on computing and information technology.... Since the introduction of computer and information technology, much advancement has been made in various sectors.... Similarly, information technology has been assimilated into business activities.... In a nutshell, information technology can be defined as the software, hardware, and management database amongst other technologies used to process, distribute and store information....
4 Pages (1000 words) Essay

Ethical Decision-making and High Technology

blems of information technology and computing ethics, this research will explore the academic literature on workplace computing, computer ethics and ethics compliance strategies.... This broader scope of computer ethics examines the impact of computing and information technology upon human values using concepts, theories and procedures... businesses monitor their employees Internet use and largely due so to reduce loss and enforce ethics compliance (Conlin, 1997)....
4 Pages (1000 words) Essay

Internet Explosion - Protecting Our Future

This may result in the braking of professional ethics as one tries to manage emerging challenges.... ommittee on Advances in technology and the Prevention of Their Application to Next Generation Biowarfare Threats, 2005).... This has not eliminated all security gaps though, as criminals have also been exposed to the ever-growing technology.... Identify potential ethical challenges that may be faced by security professionals as technology advances, applications become more mobile, and computer criminals become more innovative....
1 Pages (250 words) Assignment

Identify the ethical issues within the field of Information Technology

Ethical aspects in Information and Communication technologies can be identified at four spheres as one's personal identity, social relations, political participation and Identify the ethical issues within the field of Information Technology Ethics is generally identified as “a system of moral principles, rules, and accepted standards of conduct” (22).... Such software can be associated with plagiarism, reverse engineering, open source code and cybersquatting(Ethics in information technology - Auburn University)....
2 Pages (500 words) Essay

Ethics, Pirated Software and Spyware

Corporate social responsibility and Computer Sciences and Information Technology Ethics, Pirated Software, and Spyware What are ethics, and how do ethics apply to business?... An individual's moral judgment remains the ethics' primary concern.... ethics can be defined as the principles that govern a groups or an individual's actions in any given situation.... An individual's moral judgment remains the ethics' primary concern....
2 Pages (500 words) Essay

Microsoft Corp: Information Technology Ethics and Policy

On petition from a grant of a beginning, the court The paper "Microsoft Corp: Information Technology Ethics and Policy" is a good example of a case study on information technology.... technology, and in this case where Microsoft is a subject, it has generally given media practitioners more control over the whole communication process....
3 Pages (750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us