Preview

It Security

Powerful Essays
Open Document
Open Document
4378 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It Security
Computing International Journal of Enterprise Computing and Business Systems 2230ISSN (Online) : 2230-8849 http://www.ijecbs.com Vol. 1 Issue 2 July 2011

SECURITY AND ETHICAL ISSUES IN IT: AN ORGANIZATION’S PERSPECTIVE
Devendra Kumar Tiwary Assistant Professor*, Department of Computer Application, Technical Education & Research Institute, Post-Graduate College, Ravindrapuri, Ghazipur, Uttar Pradesh (INDIA)
_________________________________________________________________________

ABSTRACT
Information Technology is changing the face of contemporary World. The IT has not only connected the World at one single platform but it is also helping in the integration of various traditional societies into modern societies. Information systems raise new and oftenperplexing security and ethical problems. This is truer today than ever because of the challenges posed by the Internet and electronic commerce to the protection of privacy and intellectual property. Information technology has raised new possibilities for behavior for which laws and rules of acceptable conduct have not yet been developed. Information technology is introducing changes that create new security and ethical issues for societies to debate and resolve. Increasing computing power, storage, and networking capabilities— including the Internet—can expand the reach of individual and organizational actions and magnify their impacts. The ease and anonymity with which information can be communicated, copied, and manipulated in online environments are challenging traditional rules of right and wrong behavior. Ethical issues confront individuals who must choose a course of action, often in a situation in which two or more ethical principles are in conflict. This paper argues that we must reconsider our approach to information security from the ground up if we are to deal effectively with the problem of information risk. Keywords: Challenges, Ethics, Information System, Information Technology, Security.



References: [1] [2] [3] Anthony D. Miyazaki and Ana Fernandez, “Consumer Perceptions of Privacy and Security Risks for Online Shopping”, 2006. ACM Code of Ethics and Professional Conduct (1992). Communications of the ACM, 35(5), 94-99.Computer Security Institute ~ US FBI, "Computer Beynon-Davies P., Business Information Systems. Palgrave, Basingstoke, 2009. Computing International Journal of Enterprise Computing and Business Systems 2230ISSN (Online) : 2230-8849 http://www.ijecbs.com Vol. 1 Issue 2 July 2011 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Bynum, Terrell Ward, A very short history of computer ethics, Southern Connecticut State University, 2008. Computer Security Institute and US FBI, Computer Security Issues & Trends, CSI 2000. Forester, T. and Morrison, P. Computer Ethics, MIT Press, Cambridge, Mass., 1990. Harrington, S.J., The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, MIS Quarterly, 20, 3 (1996), 257–278. http://www.acm.org/about/code-of-ethics. IEEE code of ethics. http://ieee.org. ISO/IEC 17799 Code of practice for Information Security Management, International Organization for Standardization. Kling, R., Computer abuse and computer crime as organizational activities, Computers and Law J. 2 (Spring 1980). Margaret, A, & Henry, J., Journal of business ethics, Computer Ethics: The Role of Personal, Informal, and Formal Codes, 15(4), 425. Mason, R.O., Four ethical issues of the information age, MIS Quarterly, 10, 1 (1986), 5–12. O 'Brien, J A., Introduction to information systems: essentials for the e-business enterprise, McGraw-Hill, Boston, MA, 2003. Parker, D.B., Swope S., & Baker, B.N., Ethical Conflicts in Information and Computer Science, Technology and Business, 1990, Wellesley, MA: QED Information Sciences. Praveen Dalal, ICT Trends in India, 2006 Wood, W.A., Computer Ethics and Years of Computer Use. Journal of Computer Information Systems, 23- 27, 1993 [16] [17]

You May Also Find These Documents Helpful

  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    20142321 SIYIWANG TACC403

    • 2051 Words
    • 7 Pages

    4. K. Himma. (2004). The Ethics of Tracing Hacker Attacks Through the Machines of Innocent Persons. International Journal of Information Ethics. vol. 2, pp. (4), p1-13.…

    • 2051 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    Gotterbarn, Don (1991). "Computer Ethics: Responsibility Regained," National Forum: The Phi Kappa Phi Journal, Vol. 71, No. 3, Summer, 26–31.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Good Essays

    The major issues concerning ethics with Information technology are: Privacy and Confidentiality, Freedom of Speech, Security, and Computer. When it comes to communicating on the web ones conversation are subject to another person listening or seeing the transmitted message. “Browsers track activities in history files, while Cookies dumped by web sites into information about a person and the things they look at. With the information collected by cookies from online e-commerce sites trace the purchasing patterns of the consumer.” (Introna) The information gathered can give specifics on the identities of individual consumers and this information can be sold whereas leading to a breach of privacy and confidentially. If one can respect others PRIVACY on Internet or just in general the activity on the Internet can limit the chances for identity theft or other criminal activities.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The 21st century has been dubbed ”the digital age” because of the monumental achievements witnessed in the Information, Communication and Technology (ICT) fields, which have impacted every aspect of human life. The internet has become one of the most lucrative Information Technology (IT) tool which has made communication and exchange of information faster and efficient. Consequently, it has transformed how people consume information. In spite of its benefits, the internet has led to a severe decline in ethics among internet users (Salman, Saad & Ali, 2013). The widespread use of internet has led to increased and sophisticated crimes, terrorism and wars (May, 2004). This essay will be based on a case involving hackers who hold Personal Computers (PC) hostage. It will outline the potential computer ethics issues associated with holding computers hostage. It will also highlight methods that computer users could use to prevent this type of attack. Moreover, it will highlight governmental legislations that could be enacted against this type of attack.…

    • 1067 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Accepted and approved in partial fulfillment of the requirements for the Degree of Bachelor of Science in Information Technology.…

    • 1068 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a) Encryption is preserved in full disk encryption when a file is copied from one media to another…

    • 1476 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    info security

    • 2065 Words
    • 8 Pages

    Confidentiality refers to the information should be secret for the person except the authorized person. If information is confidential attacks cannot steal or copy the information. Confidentiality is much more valuable in passwords and cryptographic keys. It is a shield contrary to unapproved person.…

    • 2065 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    remote system controller

    • 1880 Words
    • 8 Pages

    Since the advent of mobile phone, (the first experimental handheld in 1973 by Dr Martin Cooper and first hand-held to be…

    • 1880 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Information System Security

    • 2782 Words
    • 12 Pages

    1) In computer networks, bandwidth is often used as a synonym for data transfer rate - the amount of data that can be carried from one point to another in a given time period (usually a second). This kind of bandwidth is usually expressed in bits (of data) per second (bps). Occasionally, it's expressed as bytes per second (Bps). A modem that works at 57,600 bps has twice the bandwidth of a modem that works at 28,800 bps. In general, a link with a high bandwidth is one that may be able to carry enough information to sustain the succession of images in a video presentation.…

    • 2782 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    References: Cho, A. (2008). University hackers test the right to expose security concerns. 322(5906):p.1322–1323. Science,…

    • 11954 Words
    • 48 Pages
    Good Essays
  • Better Essays

    Entertainment

    • 1441 Words
    • 6 Pages

    Ethical Issues of Internet Privacy Internet privacy is a major concern of today. Privacy over the Internet has raised certain ethical issues, which need to be dealt with. While catering to the privacy needs of the Internet users, we need to implement certain ethics. For more on the ethical issues of Internet privacy, read on... Privacy is a status wherein an individual can work on his/her information in seclusion, resulting in a selective revelation of one's identity and information. Privacy can mean anonymity in case a person wants to remain unidentified. Privacy can also be related to the security aspect of an individual or information. The definitions of privacy can differ across individuals and cultures. The invasion of privacy can be avoided by the issue of privacy laws. With Internet, hosting an enormous information base, a new concept has evolved - information privacy. The information on the Internet has security needs. Unauthorized access to information is undesirable. Data privacy refers to the association between technology and the legal rights that come with it. Whenever any information about a person or a person's data is stored, privacy needs arise. Internet privacy is the control one has over what information about oneself, the person wishes to disclose. Internet privacy deals with controlling the access to information on the Internet. Internet Privacy and Ethics Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another…

    • 1441 Words
    • 6 Pages
    Better Essays