Question

In: Computer Science

this is a five (5) paged report. you are to research and investigate on common social...

this is a five (5) paged report. you are to research and investigate on common social and ethical issues facing professional in the field of information technology. Describe the background; then identify the social and ethical issues, problems or questions that you may think are important.

Solutions

Expert Solution

Ethical & Social Issues in Information System

-------------------------------------------------------------------------------------------------------------------------------------

Information systems have made many businesses successful today. Some BIG companies such as Microsoft, Facebook, EBay, etc. would not exist without information technology. However, improper use of information technology can create problems for the organization and employees.

Criminals gaining access to credit card information can lead to financial loss to the owners of the cards or financial institute. Using organization information systems i.e. posting inappropriate content on Facebook or Twitter using a company account can lead to lawsuits and loss of business.

Why are ethical guidelines needed?

The education and training of IT professionals, including security specialists, usually focuses on technical knowledge and skills. You learn how to perform tasks, but with little consideration of how those abilities can be misused. In fact, many IT professionals approach their work with a hacker's perspective: whatever you can do, you're entitled to do. (Note: In this article, we're using the word hacker in the current common meaning, pertaining to "black hat" hackers who use their skills to break into systems and access data and programs without the permission of the owners. We're well aware that the term originally referred to anyone with advanced programming skills, and that there are "white hat hackers" who use their skills to help companies and individuals protect against the black hats.)

In fact, many IT pros don't even realize that their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions.

Some of the ethical and social issues are:

  • PRIVACY: Does information's availability justify its use?

Governments collect massive amounts of data on individuals and organizations and use it for a variety of purposes: national security, accurate tax collection, demographics, international geopolitical strategic analysis, etc. Corporations do the same for commercial reasons; to increase business, control expense, enhance profitability, gain market share, etc. Technological advances in both hardware and software have significantly changed the scope of what can be amassed and processed. Massive quantities of data, measured in petabytes and beyond, can be centrally stored and retrieved effortlessly and quickly. Seemingly disparate sources of data can be cross-referenced to glean new meanings when one set of data is viewed within the context of another.

In the 1930s and 1940s the volumes of data available were miniscule by comparison and the "processing" of that data was entirely manual. Had even a small portion of today's capabilities existed, the world as we now know it would probably be quite different.

Should organizations' ability to collect and process data on exponentially increasing scales be limited in any way? Does the fact that information can be architected for a particular purpose mean it should be, even if by so doing individual privacy rights are potentially violated? If data meant for one use is diverted to another process which is socially redeeming and would result in a greater good or could result in a financial gain, does that mitigate the ethical dilemma, no matter how innocent and pure the motivation?

  • PRIVACY: How much effort and expense should managers incur in considering questions of data access and privacy?

This is an issue with both internal and external implications. All organizations collect personal data on employees, data that if not properly safeguarded can result in significant negative implications for individuals. Information such as compensation and background data and personal identification information, such as social security number and account identifiers, all have to be maintained and accessed by authorized personnel. Systems that track this data can be secured, but at some point data must leave those systems and be used. Operational policies and procedures can address the proper handling of that data but if they're not followed or enforced, there's hardly any point in having them. Organizations routinely share data with each other, merging databases containing all kinds of identifiers.

What's the extent of the responsibility we should expect from the stewards of this data? Since there's no perfect solution, where's the tipping point beyond which efforts to ensure data can be accessed only by those who are authorized to do so can be considered reasonable and appropriate?

  • OWNERSHIP: What can employers expect from employees with regard to nondisclosure when going to work for another firm?

Many people are required to sign NDAs (nondisclosure agreements) and noncompete clauses in employment contracts, legal documents that restrict their ability to share information with other future employers even to the point of disallowing them to join certain companies or continue to participate in a particular industry.

What about the rest of us, who have no such legal restrictions? In the course of our work for employer A, we are privy to trade secrets, internal documents, proprietary processes and technology, and other information creating competitive advantage. We can't do a brain dump when we leave to go to work for employer B; we carry that information with us. Is it ethical to use our special knowledge gained at one employer to the benefit of another? How do you realistically restrict yourself from doing so?

  • OWNERSHIP: What part of an information asset belongs to an organization and what is simply part of an employee's general knowledge?

Information, knowledge, and skills we develop in the course of working on projects can be inextricably intertwined. You're the project manager for an effort to reengineer your company's marketing operations system. You have access to confidential internal memoranda on key organization strategic and procedural information. To build the new system, you and your team have to go for some advanced technical training on the new technology products you'll be using. The new system you build is completely revolutionary in design and execution.

Although there are areas of patent law that cover many such situations, there's not much in the way of case law testing this just yet, and of course laws vary between countries. Clearly, you've built an asset owned by your company, but do you have a legitimate claim to any part of it? Can you take any part of this knowledge or even the design or code itself with you to another employer or for the purpose of starting your own company? Suppose you do strike out on your own and sell your system to other companies. Is the ethical dilemma mitigated by the fact that your original company isn't in the software business? Or that you've sold your product only to noncompeting companies? What if we were talking about a database instead of a system?

  • CONTROL: Do employees know the degree to which behavior is monitored?

Organizations have the right to monitor what employees do (management is measurement) and how technology systems are used. It's common practice to notify employees that when they use organizational assets such as networks or Internet access, they should have no expectation of privacy. Even without that disclaimer, they really don't need the warning to know this monitoring is, or could be, taking place.

Do organizations have an obligation to notify employees as to the extent of that monitoring? Should an organization make it clear that in addition to monitoring how long employees are using the Internet, it's also watching which Web sites they visit? If the organization merely says there's no expectation of privacy when using the e-mail system, is it an ethical violation when employees later find out it was actually reading their e-mails?

  • CONTROL: Does data gathered violate employee privacy rights?

Many organizations have started adding a credit and background check to the standard reference check during the hiring process. Are those organizations obligated to tell us they're doing this and what results they've received? The justification for doing the credit check typically is that a person who can't manage his or her own finances probably can't be trusted with any fiduciary responsibility on behalf of the organization. Does this pass the smell test or is this actually an infringement of privacy?

Performing these checks is a relatively recent phenomenon, brought on in part by the desire of organizations to protect themselves in the wake of the numerous corporate scandals of the past few years but also because technology has enabled this data to be gathered, processed, and accessed quickly and inexpensively. Is technology responsible for enabling unethical behavior?

  • ACCURACY: Is accuracy an explicit part of someone's responsibility?

Business has always had a love/hate relationship with accuracy. Effective decision making is driven by accurate information, but quality control comes with a cost both in terms of dollars and productivity. (If you're checking, you can't also be doing.)

In a bygone era, there was less data to work with, and the only quality assurance that needed to be performed was on data…operations and procedures were manual, so it was the output of those functions that was most critical. Technology has enabled vastly more complicated and interconnected processes, such that a problem far upstream in a process has a ripple effect on the rest of the process. Sarbanes Oxley requires the certification of all internal controls in large part for this reason. Unfortunately, accuracy is one of those areas that always seems to be assigned to the dreaded "someone," which all too often translates to no one. On what basis should the level of accuracy in any given system be determined? How much accuracy is sufficient? How should responsibility for accuracy be assigned?

  • ACCURACY: Have the implications of potential error been anticipated?

Most assembly lines have a cord or chain that can be pulled when a worker notices a particular unit has a flaw. The line is brought to a halt and the unit can either be removed or repaired. The effect of the error can be contained. As complex interactions between systems and ever larger databases have been created, the downstream consequence of error has become vastly more magnified. So too has the growing dependence on highly distributed systems increased the potential for, and the cost of, error.

Do managers have a correspondingly greater responsibility to assess negative outcomes and the mitigations of costs and effects of errors? Can management or system owners be held accountable if unforeseen errors occur? Is this also the case for predictable but unmitigated error?

  • SECURITY: Have systems been reviewed for the most likely sources of security breach?

As we mentioned in the previous article on ethics, security used to be confined to locking the door on the way out of the office or making sure the lock on the safe was spun to fully engage the tumblers. Technology presents us with a whole new set of security challenges. Networks can be breached, personal identification information can be compromised, identities can be stolen and potentially result in personal financial ruin, critical confidential corporate information or classified government secrets can be stolen from online systems, Web sites can be hacked, keystroke loggers can be surreptitiously installed, and a host of others. (It's interesting to note at this point that statistics still show that more than 80 percent of stolen data is the result of low tech “dumpster diving,” and approximately the same percentage of oranizational crime is the result of an inside job.)

How far can—and should—management go in determining the security risks inherent in systems? What level of addressing those risks can be considered reasonable?

  • SECURITY: What's the liability exposure of managers and the organization?

Can system owners be held personally liable when security is compromised? When an organization holds stewardship of data on external entities—customers, individuals, other organizations—and that data is compromised, to what extent is the victimized corporation liable to the secondary victims, those whose data was stolen?

Organizations generally have internal policies for dealing with security breaches, but not many yet have specific policies to address this area. Managers who do not secure the systems for which they're responsible, employees who cavalierly use information to which they should not have access, and system users who find shortcuts around established security procedures are dealt with in the same fashion as anyone who doesn't meet the fundamental job requirements, anything from transfer or demotion to termination. Should compromised or ineffective security be held to a higher standard?

Real world ethical dilemmas

What if your perusal of random documents reveals company trade secrets? What if you later leave the company and go to work for a competitor? Is it wrong to use that knowledge in your new job? Would it be "more wrong" if you printed out those documents and took them with you, than if you just relied on your memory?

What if the documents you read showed that the company was violating government regulations or laws? Do you have a moral obligation to turn them in, or are you ethically bound to respect your employer's privacy? Would it make a difference if you signed a nondisclosure agreement when you accepted the job?

IT and security consultants who do work for multiple companies have even more ethical issues to deal with. If you learn things about one of your clients that might affect your other client(s), where does your loyalty lie?

Then there are money issues. The proliferation of network attacks, hacks, viruses and other threats to their IT infrastructures have caused many companies to "be afraid, be very afraid." As a security consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services, or is it a case of "whatever the market will bear?"

Is it wrong for you to mark up the equipment and software that you get for the customer when you pass the cost through? What about kickbacks from equipment manufacturers? Is it wrong to accept "commissions" from them for persuading your clients to go with their products? Or what if the connection is more subtle? Is it wrong to steer your clients toward the products of companies in which you hold stock?

Another ethical issue involves promising more than you can deliver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client's network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or switching to an open source operating system – which changes, coincidentally, will result in many more billable hours for you – on the premise that this is the answer to their security problems?

Here's another scenario: What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Should you "eat" the cost and install the extra security measures at no cost to the client? Should you refuse to do the job? Would it make a difference if the client's business were in a regulated industry, and implementing the lower security standards would constitute a violation of the Health Insurance Portability and Accountability Act, the Graham-Leach-Bliley Act, Sarbanes-Oxley or other laws?

References:

  • https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-professionals.html
  • https://www.guru99.com/mis-ethical-social-issue.html
  • https://www.ijecbs.com/July2011/45.pdf

Related Solutions

A 7 paged report on traits of an effectiveorganization
A 7 paged report on traits of an effective organization
a 7 paged report on communication dynamics
a 7 paged report on communication dynamics
Research and investigate Audio Amplifier circuits and submit a short report. You may use Operational Amplifier...
Research and investigate Audio Amplifier circuits and submit a short report. You may use Operational Amplifier LM741, Op741. Research should include: Prosed Circuit. Circuit analysis.
Dr. Blademan, who you recently paged to report an abnormal laboratory result, approaches you, shouting angrily,...
Dr. Blademan, who you recently paged to report an abnormal laboratory result, approaches you, shouting angrily, “Why did you page me with that report? You know I make rounds in the evenings, and I would have been here soon.” You attempt to explain that the patient was symptomatic, that the abnormal laboratory result was high enough to be labeled a critical value, and that you believe prompt reporting was in the best interest of the patient. You also are thinking...
You are to research, analyze, & write a report/essay of your findings on which Social media...
You are to research, analyze, & write a report/essay of your findings on which Social media channels impact business communication in an African nation or a Hispanic nation. In business, social media communications has become the norm rather than the choice. Social Media communications have stormed the business communicative world with its apparent new channels, terminologies, characters, and formats of communication; unbeknownst to mankind before now. As a result, we are pushed and pulled by multiple, sometime interrelated forces to...
The use of animals in research is controversial. Investigate this controversy using at least five resources...
The use of animals in research is controversial. Investigate this controversy using at least five resources from the South University Online Library. Do you think it is ethical to use animals in research? Explain your reasoning and support your answer with at least three sources from the South University Online Library (these sources must be different from the ones you already used in this assignment).
research about Fungal infection common in Oman and its emergence The research report will include the...
research about Fungal infection common in Oman and its emergence The research report will include the following information about Fungal infection a.MOT( mode of transmission) b.CA (causative agent) c.signs and symptoms of infection d.laboratory test e.treatment or antimicrobial therapy f. appropriate measures to prevent or control the infection.
Research and analyze a company or brand's use of social media. Craft a polished report that...
Research and analyze a company or brand's use of social media. Craft a polished report that demonstrates your ability to understand a business's use of social media for the following purposes: raise awareness, influence desire, encourage trial, facilitate purchase, and create loyalty. Pick one of the following companies or brands (or choose one on your own): Jet Blue, Samuel Adams, Sephora, Tiffany's, Carl's Junior, McDonalds, Prada, American Express, Absolut, Dove, Jell-O, Southwest Airlines, Chipotle, Whole Foods, Audi, The NFL, any...
Write short notes on five issues that may be addressed by a company’s social responsibility report.
Write short notes on five issues that may be addressed by a company’s social responsibility report.
Identify five (5) common communication barriers you are likely to encounter at the work place. Suggest...
Identify five (5) common communication barriers you are likely to encounter at the work place. Suggest ways to over come each of these 5 communication barriers.                           
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT