Ethics – Information Systems Assignment 2 - 11981634
Executive Summary-
In the 21st century, information systems are being heavily integrating into our everyday routiunes. Such systems present numerous morally questionable situations for humans (Mumford 2003). aforementioned notion is explored within the case study, allowing us to analyse potential problems that could arise via exploration of Masons 1986 PAPA Framework which includes Privacy, accessibility, property and accuracy.
Privacy -
The power that current and future information systems afford us with to gather information about people, their preferences, and their activities by way of surveillance, communication, storage and retrieval is increasing (Mason, 1986). Thus, laws
…show more content…
Jenny has divulged confidential information that her business has tried to keep secret. Such information included business plans and technical information that could have a significant commercial value. It is evident that her business was trying to protect their asset as they classified the information on their ERP system as “secret and confidential information”.
Jenny could run into law problems as it is a common law duty to not take unfair advantage of confidential information if received from someone else unless the person who gave it provides consent (Is4Profit). However, as Jenny has obtained the information in an illicit manner, she has little to no right to disclose the private information.
Furthermore, Jenny's hacking has revealed an obvious security loophole within her company that could be used to violate numerous privacy policies and steal personal data that could be used for illegal or unethical purposes.
Accuracy -
Even if data collection is ethical, there are still questions raised regarding the accuracy of the data. In information systems, we depend intemperately upon the accuracy of such information as inaccurate information can present many problems for a business (Altschuller 2004).
There is no way of determining that the data Jenny has provided to the competitor business is accurate. If the competitor decided to use the information in their systems for financial decisions, inaccuracies could have
EC- 1.5 (F), ABA/EC-1- 1.5(A)- Legal assistant, Carl, breached the confidentiality of Jane when he allowed the client’s boyfriend Zeke, to sit in on the consultation. Carl then later continued to speak to the client about their case even when the client was outside of the privacy of attorney Howe’s office.
The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.
In the essay, “Why Privacy Matters Even if You Have ‘Nothing to Hide’”, published on May 15, 2011, Professor Daniel J. Solove is trying his best to convince his well sophisticated audience that the issue of privacy affects more than just the everyday people veiling a wrong doing. His argument focuses around ethos, and a lot of it. Although there are some logos and pathos, they aren’t as nearly as strong as his ethos. In the type of society that we live in today, privacy has become more and more broad. Everyone sees it on an everyday occurrence just about; including on social networking sites, HIPAA forms, or even with people just simply observing
Privacy is one of the most controversial, yet most essential topics in the discussion of civil liberties. Some treat it as a necessity along with life, liberty, and property, whereas other people see it as something that shouldn’t get in the way of things like security (Sadowski).
Privacy has expanded to more complex forms including people’s information displayed throughout technology (Kasper 71).
We do not exchange economic benefits of any inside information if we are not sure if it is sensitive information or what action should be taken, we can seek the advice of legal services and compliance.
Issue 3: Has Patricia improperly used company information to gain advantage for herself and/or her sister?
a. Identify the ethical dilemma faced by the CIO in this situation using the three normative theories of business ethics. Identify all stakeholders involved. How will each stakeholder group be affected by the decision taken by the management?
Confidentiality was explained to Lorena, and also the exceptions in which, confidentiality would have to be breached. Lorena was asked if she understood this, she replied “Yea”. ACA (2005, Section, 2.3.3.1. Breaching the confidentiality and therefore trust between Lorena and myself in this instance, was necessary and unavoidable, ACA, 2.3.4.1, (2008), and 2.3.4.3 and ACA, , B.2a, B.2c(2005).
Under the supervision of John Melnyk, Anna Hawkins writes Too Much Information. A case where a group of four students in a third-year business ethics course at a university gets a long and challenging assignment which was worth a substantial portion of the final grade. This assignment put the students in the role of ethical consultants to a group purchasing organization in the healthcare industry that had just come under public scrutiny. Here they need to draft a letter and present it to a board of directors on a later date. Board of directors would be represented by Professor Nash (their instructor) and one or two of his university colleagues or contacts from the business world. Along with this information this case also suggests that one of the group members ‘Jeff’ finds his part of the assignment on the internet. It was clear to other group members that he cannot use this information, as the assignment specified that this was off limits. Erica (one of the group members) is confused how to handle the situation. She comes with her own perspective, objectives and action plan.
Discuss the importance of data accuracy. Inaccurate data leads to inaccurate information. What can be some of the consequences of data inaccuracy? What can be done to ensure data accuracy? Data accuracy is important because inaccurate data leads may lead to such things as the closing down of business, it may also lead to the loosing of jobs, and it may also lead to the failure of a new product. To ensure that one’s data is accurate one may double check the data given to them, as well as has more than one person researching the data they are researching.
In this paper, the topic being discussed is how technological surveillance has evolved through the courts. Laws have been in place since the beginning of time. With all the new technological advances being made in the world, questions have arisen in court cases. For example, how much privacy can we expect to get if we disclose information on our networking sites? Is posting something on our wall protected as much as a message? What part of our calls are protected? These are questions the courts have been trying to answer and with technology advancing, questions will continue to increase.
Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices.
IT Professional is a publication (Keith W. Miller 2009), it is such like book publication, it also has copyright problem, plagiarism problem, and many problems like book publication, so, to be the Professionals, they must act like the book authors to solve these problems. In aspects of IT, the side of ethical problems are including advice on how professionals can recognize, analyze, and make judgments on challenging questions about right, wrong, and computing. Computers have become essential tools of modern humans, regardless life, entertainment, education, work, and business are related with computer. Computer impact on human society very much. So knowing the Information Technology Ethics is very important to everyone, because it is useful to everyone who lives in this
Technology is constantly upgrading everyday and it creates unique challenges for individuals privacy rights while there are regulators looking to preserve both privacy rights and technological innovation. For awhile now society has been struggling on how to balance privacy rights and emerging technologies. For example, early as 1890, Newspapers and Photographs were on the rise and legal scholars called for added privacy protections, including enshrining those rights in criminal law. As people have a right to protect their privacy, it is still a struggle while promoting innovation in this fast increasing technology world we live in today.