Implementing Ethics in Information Technology
$19.95 Buy and instantly download this paper now
This paper explores the ethical issues that arise from the use of information and communication technology in business contexts. The paper addresses the security, confidentiality, honesty and copyright concerns, and considers how to implement ethical practices in information technology usage. The paper looks at the development of training and information literacy programs and improving the protection of customer data. The paper posits that enhanced ethical practices will result in improved customer confidence and trust in the firm and a corresponding improvement in the business performance.
From the Paper:"The unprecedented advancement in information technology has for a long time elicited mixed feelings with regard to issues surrounding privacy and security of the online services users. With the increased use of computers and the internet, many people have signed up with numerous social and business network sites. This requires that they provide vast private and personal information which is stored in virtual databases making the individual quite vulnerable. Some of these sites have been known contravene privacy policies by sharing private information of clients without their consent. These irresponsible practices contrast privacy expectations of the client as well as the ethical duty of the service provider (Hay, 2001).
"Failure by the information technology experts to accord adequate attention to the issues of right and wrong with regard to the use of information technology has further elicited concerns about security among users. This is caused by lack of adequate security measures to protect users from possible loss of personal data to malicious entities. Increased incidences of data mining by irresponsible agencies both commercial and non-commercial lead to decreased security in use of information technology. For instance, exposure of personal card details to online hacking has contributed to considerable financial losses among clients. Likewise, clients are exposed to threats and physical attacks by gangs which access their personal information on the internet as a result of inadequate security measures."
Sample of Sources Used:
- Hay, D. (2001). The Ethical Perception of Undergraduate Students in Computer-Related Situations: An Analysis of the Effects of Culture, Gender, and Prior Education. Teaching Business Ethics .
- Krisanda, J., & Peslak, A. (2009). The Effect of Gender on the Application of Ethics within Information Technology: A Meta-analysis. Retrieved April 11, 2011, from http://proc.conisar.org/2009/4353/CONISAR.2009.Krisanda.pdf
- Peslak, R. A. (2008). Current Information Technology Issues and Moral Intensity Influences. The Journal of Computer Information Systems .
- Reynolds, G. (2006). Ethics in Information Technology. Boston: Course Technology.
- StanfordUniversity. (2005). Phenomenological Approaches to Ethics and Information Technology. Retrieved April 11, 2011, from http://plato.stanford.edu/entries/ethics-it-phenomenology/
Cite this Research Paper:
Implementing Ethics in Information Technology (2013, June 17) Retrieved January 23, 2021, from https://www.academon.com/research-paper/implementing-ethics-in-information-technology-153573/
"Implementing Ethics in Information Technology" 17 June 2013. Web. 23 January. 2021. <https://www.academon.com/research-paper/implementing-ethics-in-information-technology-153573/>