Information Systems: Ethical, Legal, and Security Issues Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

The rapid development of information technologies has offered many opportunities to individuals, businesses, and public organizations. However, it has also given rise to many problems such as Internet fraud, privacy violation or data theft.

This report is aimed at discussing the ethical, social, and legal issues related to the use of information systems. In most cases, they emerge when a person’s right to privacy is disregarded. The problems identified in this paper require close attention of managers and legislators who must make sure that people know how their personal information can be collected, stored or shared.

Overall, the term information system can be defined as a combination of technologies, software solutions, and procedures that are needed for the collection, storage, and transfer of data (Prakken 38). At first, it is necessary to examine moral aspect of these tools. As a rule, ethical issues arise when businesses or organization use private data without the consent of customers or users. For example, one can refer to the activities of data brokers or organizations that collect information and sell it businesses (Dempsey 250).

Very often, this information can be collected with the help of cookies or data mining techniques that can throw light on people’s interests or values (Dempsey 250). Yet, these organizations do not receive people’s informed consent and customers do know much about their activities. This behavior violates the principles of public or interpersonal relations, established in the community. Moreover, the problem of consent is closely related to the work of medical institutions.

These organizations have to collect, store and share records about patients’ health (Goodman 59). To a great extent, these activities ensure the effective work of healthcare organizations (Goodman 59). The problem is that this information is very confidential and people do not want it to be accessible to others. It is probable that these records can be made public, and an individual may be able to address this risk. So, the use of information systems can violate a person’s rights without his/her consent.

Additionally, it is important to remember about social issues that can be explained by some widespread changes in people’s behavior and their attitude toward such concepts as privacy and confidentiality. First of all, the development of information systems has enabled people to learn more about one another (Stair and Reynolds 392).

For instance, such social networks as Facebook, MySpace, or Twitter enable users to post information about themselves, and it should be available only to their friends or relatives (Stair and Reynolds 392). Nevertheless, this information can be easily used against them. For instance, their postings can be considered by law-enforcement agencies in order to detect people who can pose a threat to the society. This is one of the problems that should not be overlooked.

Similarly, it can be used by people who may want to obtain users’ emails, phone numbers, addresses, and sometimes even credit card information. Therefore, it is possible to say that information systems have become public, and this situation can imperil the security of people’s data.

It is also important to remember about legal problems that are closely related to the information systems. This issue is particularly important to many businesses that should defend their data from potential competitors (Calder & Watkins 316). This is one of the reasons why these organizations face legal issues and disputes. These problems occur in those cases, companies cannot secure of their patents, the information about their clients, trademarks, inventions or other forms of intellectual property (Calder & Watkins 316).

It should be noted that many businesses depend on the security of their intellectual property, and in some cases, they have to pursue those individuals who could use their intellectual property without the official permission of the company (Calder & Watkins 316). These legal problems can be very expensive and time-consuming for many organizations.

Thus, one can argue that private companies and public organizations should pay close attention to the security of their information systems that should be protected from intruders. The same problems are encountered by individuals who have to make sure that their confidential information is properly protected. In many cases, they have to create a system of passwords that prevent unauthorized access to their information. Provided no precautions are taken, a great number of people can be affected.

On the whole, these examples suggest that information systems give rise to a variety of ethical, social, and legal problems relevant to businesses, governmental organizations, and separate individuals. As a rule, they occur in those situations when a person’s confidential information is used by other parties without his/her explicit agreement.

These issues should be addressed by policy-makers, legislators, and the leaders of businesses or public organizations. The most important task is to make sure that the users of information systems should know how their confidential data can be used by third parties. This is the main argument that can be advanced.

Works Cited

Calder, Alan, and S. Watkins. IT Governance: An International Guide to Data Security, New York: Kogan Page Publishers, 2012. Print.

Dempsey, John. Introduction to Private Security, New York: Cengage Learning, 2007. Print.

Goodman, Kenneth. “Ethics, information technology, and public health: new challenges for the clinician-patient relationship.” Journal of Law, Medicine & Ethics 38. 1 (2010): 58-63. Print.

Prakken, Ben. Information, Organization and Information Systems Design: An Integrated Approach to Information Problems, New York: Springer, 2000. Print.

Stair, Ralph, and G. Reynolds. Fundamentals of Information Systems. Boston: Cengage Learning, 2011. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, December 11). Information Systems: Ethical, Legal, and Security Issues. https://ivypanda.com/essays/information-systems-ethical-legal-and-security-issues/

Work Cited

"Information Systems: Ethical, Legal, and Security Issues." IvyPanda, 11 Dec. 2018, ivypanda.com/essays/information-systems-ethical-legal-and-security-issues/.

References

IvyPanda. (2018) 'Information Systems: Ethical, Legal, and Security Issues'. 11 December.

References

IvyPanda. 2018. "Information Systems: Ethical, Legal, and Security Issues." December 11, 2018. https://ivypanda.com/essays/information-systems-ethical-legal-and-security-issues/.

1. IvyPanda. "Information Systems: Ethical, Legal, and Security Issues." December 11, 2018. https://ivypanda.com/essays/information-systems-ethical-legal-and-security-issues/.


Bibliography


IvyPanda. "Information Systems: Ethical, Legal, and Security Issues." December 11, 2018. https://ivypanda.com/essays/information-systems-ethical-legal-and-security-issues/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1