Ethical Considerations in Information Technology Research Paper

Exclusively available on Available only on IvyPanda® Written by Human No AI

Information security is denying access to system data and also preventing entry of any information to unauthorized individuals. This also means protection from the direct use of information, their modification, disruption and also disclosure of such. As organizations keep sharing their information electrically, it is required that such organizations continue to understand what is expected so as to secure their information technologically. (Mayur S. D., & Thomas, J., 2008). Ethics is the basic guideline that is meant to be followed when there is no clear direction for a particular circumstance. Some of these rules of ethics in security information include respect to matters of privacy and anonymity, taking responsibility, respect to intellectual property, and provision of diligent and professional services to principals and even acting honorably, justly, legitimately and legally (Allen, & Merrill, 2008)

The threat possessed by anyone who wants to protect sensitive data is the ease in which computers and networks can be accessed efficiently, store and retrieve data. In such cases, individual privacy is likely to be at risk. Anonymity and privacy can be useful in concealing information such as those of health, medical record and security. On the other hand, anonymity and privacy can be used to carry out illegal activities such as terrorism and money laundering. However, there are factors that undermine computer privacy and such include data matching and mining, rise of world- wide- web and processing power of computers (Jason, Segolene, & Juan, 2009).

Computer professionals have an obligation to act responsibly. Great power comes with extensive responsibility, and more often than not, their interest will differ forcing them to come into conflict with their fellow employees. Professionals should be able to take responsibility for their own defaults. Therefore, it is advisable such professional be aware of such potential conflicts and avoids them. That is what ethical responsibility is all about. (Jason, Segolene, & Juan, 2009).

Respect for intellectual property is extremely important when it comes to information security. Intellectual property in this case would mean ownership in terms of software and other applications. Whereas some programs and software distributed to the public are available and can easily be obtained in copies, there are still those programs that are not free and organizations that created them use them for investments. (Mayur S. D., & Thomas, J., 2008) Investors complain about losing a substantial amount of money despite this kind of enormous industry. This substantial loss is as a result of criminal piracy. It is therefore essential for professionals to act ethical and respect intellectual property (Mayur & Thomas, 2008).

The certification that is earned by the information system security is viewed as a privilege that must not only be earned but also maintained. This is the reason as to why all personnel of information system security must commit fully towards the support of the code of ethics in information system security. They must guard an

References

Allen C., & Merrill W. (2008) Information privacy compliance in the healthcare industry, 6, 5 – 19.

Jason B., Segolene B., & Juan R. (2009). Reaching escape velocity: A practiced approach to information security management system implementation. 32, 49 – 57.

Mayur, S. D., & Thomas, J. (2008). Managing electronic information: an ethics perspective, 4, 20 – 27.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 29). Ethical Considerations in Information Technology. https://ivypanda.com/essays/ethical-considerations-in-information-technology/

Work Cited

"Ethical Considerations in Information Technology." IvyPanda, 29 Mar. 2022, ivypanda.com/essays/ethical-considerations-in-information-technology/.

References

IvyPanda. (2022) 'Ethical Considerations in Information Technology'. 29 March.

References

IvyPanda. 2022. "Ethical Considerations in Information Technology." March 29, 2022. https://ivypanda.com/essays/ethical-considerations-in-information-technology/.

1. IvyPanda. "Ethical Considerations in Information Technology." March 29, 2022. https://ivypanda.com/essays/ethical-considerations-in-information-technology/.


Bibliography


IvyPanda. "Ethical Considerations in Information Technology." March 29, 2022. https://ivypanda.com/essays/ethical-considerations-in-information-technology/.

If, for any reason, you believe that this content should not be published on our website, you can request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1