Preview

Ethics of Online Air Ticket Reservations Systems

Satisfactory Essays
Open Document
Open Document
305 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics of Online Air Ticket Reservations Systems
ETHICAL ISSUES
Ethical issue is the belief in right or wrong with a particular area or system. In any organization ethical issue should be followed for the achievement of business objectives. Precision air reservation system, ethical issues are being considered for the achievement of company goal. The following are ethical issues relating to airline reservation system
Security; Information’s which are being provided by users should be secure. The system will ensure the safety of customers. All transaction activities will be secured. Nobody will be able to gain access to see bank accounts and other relevant information’s.
Privacy issue; Personal information should not be sold to third parties (other people apart from administrator and end-user) for their benefit. All booking information collected in the booking form, payment form should be kept confidential according to how privacy policy of the system claims.
Equality of Access in the system; All people are allowed to use the system anytime they want for booking purpose only.
METHODS WHICH WILL BE USED TO ADDRESS ETHICAL ISSUES
Security; by providing the best and stable system to make customer’s information secure from unauthorized people to gain it. Through creation of administrator account who will be the only person who has access to view this kind of information in the system. This will make system secure especially for transaction.
Privacy policy; through providing privacy policy page in the system, Customers will be aware of how their information are being used in an organization. And make sure that customer’s information is not released to other organization without customers consent.
Equality of accessing system and performing regular functions such as book for flight, viewing schedule etc. anybody can be able to view the system and make book for flight. Equality will be for only unregistered members. Registered member will be given priority and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The information stored by an organisation must be kept safe and secure at all times. This is to make sure that the organisation satisfies all of the legal requirements relating to the information which it keeps. The organisation has a duty of care to safeguard the information in its possession. This is to protect the security of its customers as well as its staff.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Store all recorded information securely in line with confidentiality law to ensure the privacy of all service users.…

    • 1515 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Xmgt 216 Code of Ethics

    • 264 Words
    • 2 Pages

    * One of the most important things is to always ensure the confidentiality of all customers and employees information. We are trusted with their information and need to prove why we can be trusted by placing a high standard on the security of all…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    Security – This is when there are numbers of different ways to secure customers and websites information, this should make sure that they are able to adopt this to reassure their customers.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    209

    • 584 Words
    • 2 Pages

    It is very important to keep information secure and private that individuals and staffs private information will stay protected from unauthorised viewing. It is their right to to have their private information to be protected. It is important to protect information to avoid indentity theft. As well as to keep service users trust between services and service users. To gain their trust, they have to know that their private information is safe and protected and can`t be used against them or seen by someone who has no permission to see it. Without all these things services can`t have confidentiality and trust from service users and their services wouldn`t have any users as people wouldn`t be able to feel safe and protected and would leave them feeling vulnarable as their information could be accessed by anyone.…

    • 584 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NCFE LEVEL 2 UNIT 2

    • 737 Words
    • 3 Pages

    This is in protecting the rights and promoting the interests and independence of service users. Respecting dignity, privacy, culture and religion of service users. Maintaining the trust and confidence of the service users by keeping confidential information except the one that will pose danger to them.…

    • 737 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays