preview

Ethics – Information Systems Assignment 2 - 11981634 Executive Summary- In the 21st century,

Better Essays

Ethics – Information Systems Assignment 2 - 11981634

Executive Summary-

In the 21st century, information systems are being heavily integrating into our everyday routiunes. Such systems present numerous morally questionable situations for humans (Mumford 2003). aforementioned notion is explored within the case study, allowing us to analyse potential problems that could arise via exploration of Masons 1986 PAPA Framework which includes Privacy, accessibility, property and accuracy.

Privacy -
The power that current and future information systems afford us with to gather information about people, their preferences, and their activities by way of surveillance, communication, storage and retrieval is increasing (Mason, 1986). Thus, laws …show more content…

Jenny has divulged confidential information that her business has tried to keep secret. Such information included business plans and technical information that could have a significant commercial value. It is evident that her business was trying to protect their asset as they classified the information on their ERP system as “secret and confidential information”.

Jenny could run into law problems as it is a common law duty to not take unfair advantage of confidential information if received from someone else unless the person who gave it provides consent (Is4Profit). However, as Jenny has obtained the information in an illicit manner, she has little to no right to disclose the private information.

Furthermore, Jenny's hacking has revealed an obvious security loophole within her company that could be used to violate numerous privacy policies and steal personal data that could be used for illegal or unethical purposes.

Accuracy -
Even if data collection is ethical, there are still questions raised regarding the accuracy of the data. In information systems, we depend intemperately upon the accuracy of such information as inaccurate information can present many problems for a business (Altschuller 2004).

There is no way of determining that the data Jenny has provided to the competitor business is accurate. If the competitor decided to use the information in their systems for financial decisions, inaccuracies could have

Get Access