The document discusses ethics in information systems and society. It provides 5 codes of conduct from the Association for Computing Machinery (ACM) that emphasize only accessing authorized resources, honoring contracts and responsibilities, thoroughly evaluating systems and risks, accepting professional review, and striving for high quality work. Privacy, data ownership, and monitoring employees are also discussed as important issues in an information society. The document concludes by discussing protecting computer equipment and files from crimes like illegal access, theft, and hacking.
The document discusses ethics in information systems and society. It provides 5 codes of conduct from the Association for Computing Machinery (ACM) that emphasize only accessing authorized resources, honoring contracts and responsibilities, thoroughly evaluating systems and risks, accepting professional review, and striving for high quality work. Privacy, data ownership, and monitoring employees are also discussed as important issues in an information society. The document concludes by discussing protecting computer equipment and files from crimes like illegal access, theft, and hacking.
The document discusses ethics in information systems and society. It provides 5 codes of conduct from the Association for Computing Machinery (ACM) that emphasize only accessing authorized resources, honoring contracts and responsibilities, thoroughly evaluating systems and risks, accepting professional review, and striving for high quality work. Privacy, data ownership, and monitoring employees are also discussed as important issues in an information society. The document concludes by discussing protecting computer equipment and files from crimes like illegal access, theft, and hacking.
System Security Anchal Mishra ETHICS IN INFORMATION SOCIETY
Ethics determine generally accepted and
encouraging activities within a company and the larger society. Ethical computer users define acceptable practices more strictly than just reframing from committing crimes. They consider the effects of their activities including Internet usage, on other people and organizations. There are many associations who have developed a code of ethics that provide useful guidance. The Association for Computing Machinery (ACM) has developed a numbers of specific professional responsibilities. These responsibilities include the following: • Access computing and communication resources only when authorized to do so. • Honour contracts, agreements and assigned responsibilities. • Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. • Accept and provide appropriate professional review. • Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work. The above 5 code of conduct for his deeds if a person accesses some data without proper authorization, he held responsible. The person cannot say that data should have been protected and get away with it. The information system and their impact must be audited like other systems. Information system is like any other product and the users must be aware of the risks involved. The unethical use of information system can devastate an organization. INFORMATION RIGHTS, PRIVACY AND FREEDOM IN AN INFORMATION SOCIETY
Privacy is an important social issue involved in information
society. Privacy deals with the collection and use or misuse of data. Data is constantly being collected and stored on each of us. This data is often distributed, sold or used without our knowledge. The health care provider and retail shops have, for instance, forms of data on its clients and customers. The fundamental question is “who owns this data and information?” We know for sure that we would not like to share our medical records with others, definitely not with insurance company or our employers. Cont…. The employer can use information technology to monitor the employees. The time spent by an employee on computer can be recorded along with his activities. The employer can use this data to estimate the number of breaks an employee takes. The employer can easily monitor electronic communication in the form email. At the same time, an employee can reveal company data to monitor employee’s emails. The deleted emails can be retrieved and used a evidence if required. Cont…. Privacy of hardware and software consumers is another important issue. If hardware companies give a unique identification to each major component, the software company can use this number to uniquely identify each electronic documents created. This could be useful in checking the piracy of users is compromised. LAN card is the only hardware component that has unique identification, which is used in communication. The Indian Constitution of 1950 doesn’t expressly recognize the right to privacy. However, the Supreme Court first recognized in 1964 that there is a right of privacy implicit in the constitution under Article 21, which states, “No person shall be deprived established by law”. PROTECTING COMPUTER EQUIPMENT AND FILES Crimes involving illegal system access and use of computer services are also a concern. The systems left unattended over weekends without proper security have been used for commercial use Computer magazines regularly report case where employees have used the facilities for their personal benefit sometimes at the cost of their employers. Cont…. Hackers make use of their computer knowledge to gain access to others computers. Sometimes, files passwords, programs, or processing power are stolen. An intruder may alter the data or destroy the data making it unusable and useless. A hacker writes a small password snifter that is hidde from the computer owner. A password snifter can steal passwords and gain access to data and files There are Ant sniff Programs that can detect and block a password snifter. Cont…. All types of computer systems and equipments have also been stolen from offices. In one recent incident, all hardware components from the computer age were removed and carried away, leaving the cage behind.
El-Khazindar Business Research and Case - Cases On Business and Management in The Mena Region - New Trends and Opportunities (2011, IGI Global Snippet) PDF