SECURITY AND ETHICAL ISSUES IN IT: AN ORGANIZATION’S PERSPECTIVE
Devendra Kumar Tiwary Assistant Professor*, Department of Computer Application, Technical Education & Research Institute, Post-Graduate College, Ravindrapuri, Ghazipur, Uttar Pradesh (INDIA)
_________________________________________________________________________
ABSTRACT
Information Technology is changing the face of contemporary World. The IT has not only connected the World at one single platform but it is also helping in the integration of various traditional societies into modern societies. Information systems raise new and oftenperplexing security and ethical problems. This is truer today than ever because of the challenges posed by the Internet and electronic commerce to the protection of privacy and intellectual property. Information technology has raised new possibilities for behavior for which laws and rules of acceptable conduct have not yet been developed. Information technology is introducing changes that create new security and ethical issues for societies to debate and resolve. Increasing computing power, storage, and networking capabilities— including the Internet—can expand the reach of individual and organizational actions and magnify their impacts. The ease and anonymity with which information can be communicated, copied, and manipulated in online environments are challenging traditional rules of right and wrong behavior. Ethical issues confront individuals who must choose a course of action, often in a situation in which two or more ethical principles are in conflict. This paper argues that we must reconsider our approach to information security from the ground up if we are to deal effectively with the problem of information risk. Keywords: Challenges, Ethics, Information System, Information Technology, Security.
References: [1] [2] [3] Anthony D. Miyazaki and Ana Fernandez, “Consumer Perceptions of Privacy and Security Risks for Online Shopping”, 2006. ACM Code of Ethics and Professional Conduct (1992). Communications of the ACM, 35(5), 94-99.Computer Security Institute ~ US FBI, "Computer Beynon-Davies P., Business Information Systems. Palgrave, Basingstoke, 2009. Computing International Journal of Enterprise Computing and Business Systems 2230ISSN (Online) : 2230-8849 http://www.ijecbs.com Vol. 1 Issue 2 July 2011 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Bynum, Terrell Ward, A very short history of computer ethics, Southern Connecticut State University, 2008. Computer Security Institute and US FBI, Computer Security Issues & Trends, CSI 2000. Forester, T. and Morrison, P. Computer Ethics, MIT Press, Cambridge, Mass., 1990. Harrington, S.J., The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, MIS Quarterly, 20, 3 (1996), 257–278. http://www.acm.org/about/code-of-ethics. IEEE code of ethics. http://ieee.org. ISO/IEC 17799 Code of practice for Information Security Management, International Organization for Standardization. Kling, R., Computer abuse and computer crime as organizational activities, Computers and Law J. 2 (Spring 1980). Margaret, A, & Henry, J., Journal of business ethics, Computer Ethics: The Role of Personal, Informal, and Formal Codes, 15(4), 425. Mason, R.O., Four ethical issues of the information age, MIS Quarterly, 10, 1 (1986), 5–12. O 'Brien, J A., Introduction to information systems: essentials for the e-business enterprise, McGraw-Hill, Boston, MA, 2003. Parker, D.B., Swope S., & Baker, B.N., Ethical Conflicts in Information and Computer Science, Technology and Business, 1990, Wellesley, MA: QED Information Sciences. Praveen Dalal, ICT Trends in India, 2006 Wood, W.A., Computer Ethics and Years of Computer Use. Journal of Computer Information Systems, 23- 27, 1993 [16] [17]