Personal Identifiable Information (PII)
Introduction & Background
This paper will discuss Information Technology (IT) and how there is value in the philosophy about ethical issues related to IT, chiefly, though not completely, issues concerning individuality and identity management, unequivocally in terms of respect for individual privacy and the responsibility of operators who access such personal identifiable information (PII) and understand the core values of IT ethics (Dillon, 2010).
The problem to be investigated in this paper is the challenges associated with the ethical usage of Information Technology (IT) within modern corporations and the mitigating factors associated with protecting Personal Identifiable Information (PII) within society.
Many scholars claim that societies are changing due to the advancements of IT. Their primary argument is that IT is creating ethical challenges to organizations and societies (Brooks, 2010). The ethical challenges associated with IT consist of privacy violations, job reductions, personal gain, security related issues, intellectual property, fraud, etc. Brooks (2010) found that the challenges of IT (when referring to PII) is stemmed from the lack of ethical standards, while (Cone, 2008) claims that the challenges of IT is caused by the lack of social responsibility. The principle of social responsibility is that everyone within the organization (in this case we will call it XYZ Company) has the responsibility to maintain the welfare of the privacy information at their fingertips (Jennings, 2012). In contrast, the lack of computer ethics is causing societies to change due to the advancements of IT and the violations associated with the lack of computer ethics (Brooks, 2010). Computer ethics was first identified in the early 1950s, but due to the lack of proper training in the IT field in the 1950s, the topic of computer ethics was ignored. Roughly
Bibliography: Data Breach Cost Part one: risks, costs and mitigation strategies for data breaches. (2011, Sept). Retrieved Jul 19, 2012, from Zurich American Insurance Corporation: www.zurichna.com Cost and Budget Estimators Chatterjee, S. (2008). Unethical behavior using information technology. Washington State University , College of Business. Ann Arbor: ProQuest LLC. Desai, M. S., & von der Embse, T. J. (2008). Managing electronic information; an ethics perspective. Information Management & Computer Security, 16(1), 20-27. doi:10.1108/09685220810862724 Dillon, R Federal Reserve Bank of Atlanta. (2008, Sep). Retrieved Jul 18, 2012, from Federal Reserve Bank of Atlanta: http://www.frbatlanta.org/ Friedenberg, M Griffiths, M. (2010). Internet abuse and internet addiction in the workplace. Journal of Workplace Learning, 22(7), 463-472. doi:10.1108/13665621011071127 Hardy, Q Mullane, J. V. (2002). The mission statement is a strategictool: when used porperly. Management Decision, 40(5), 448-455. Retrieved August 9, 2012 National Institute of Standards and Technology (NIST) Sandford, P., Parish, D. J., & Sandford, J. M. (2007, Apr). Understanding Increasing Traffic Levels for Internet Abuse Detection. Security Journal, 20(2), 63-76. doi:http://dx.doi.org.proxy1.ncu.edu/10.1057/palgrave.sj.8350051 Schweitzer, M US Identity Theft Solutions, LLC. (2012). Business Risks. Retrieved Jul 18, 2012, from US Identity Theft Solutions, LLC: http://www.usidtsolutions.com/risks.html Wilbanks, L