5
Initial draft – Report on Security and Ethical issues in Development of Business Systems Page 1 Introduction Within legal boundaries, what you say and do in the privacy of your own home is your business. Particularly when it comes to digital information, that privacy and moral flexibility does not extend to the workplace. Common sense dictates that your actions in a public place are no longer private. People by nature consider their surroundings before saying or doing something that would embarrass them or offend others. When it comes to the workplace, the burden of maintaining a politically and morally correct environment falls on the employer as well as the employee. Apart from that, we are also discussing the threats in against and in defense needed for the performance and security of the business information systems, as well as their societal impacts and ethical implications of information technology, which also includes the slight change into the job description of business managers and business professionals, where they not only have to manage the business related matters but also be able to utilize the successful uses of the information technologies in a global environment and scenario ( s) . Why technology for business managers? By using the term successful use of the informational technologies and certain other gadgets, we mean how they apply themselves to comply with newer technologies, with respect to their managerial activities and how they’ll be reducing the cost and increasing the efficiency level of both employers, and business organization, because in this era only those organizations are getting successful and become a bluefish, which opt for latest t echnology at the right place at right time, because it let them reducing the cost of production/services by efficiently utilizing their available resources. Technology, should it or should it not? There’s no question that the appliance of latest technology has brought many easiness in business matters and has had beneficial results as well, but as well as the detrimental effects on the society which gives rise to the security and ethical issues regarding invasion of privacy and certain other issues in significant ways, that’s why in this report, we’re mostly concerned with several ethical issues regarding the use and application of information & technologies while affecting the employment, individuality, working environment and conditions, privacy factor and invasion of privacy, areas of crime and criminal activities such as cyber crimes etc, health and several other issues with their solutions to societal problem(s ) . In the digital age, the record of an the discussion can be important. If an employee views a website that another employee finds offensive, the record of that site visit can become hard evidence in a court of law. It's an attorney's dream to build a case with such evidence. Because the employee was not only at the workplace when the offence took place, but using the employer's equipment to commit the offense both will be held liable for the action. Only unambiguous evidence of the fact that the employee clearly understood stated rules against such conduct will limit the employer's liability. Employers can also seek to limit the content that is

M.I.S. Initial Draft - Ethical and Security Issues in Development of Business Systems

Embed Size (px)

Citation preview

8/4/2019 M.I.S. Initial Draft - Ethical and Security Issues in Development of Business Systems

http://slidepdf.com/reader/full/mis-initial-draft-ethical-and-security-issues-in-development-of-business 1/5

Initial draft – Report on Security and Ethical issues in Development of Business Systems

Page 1 

Introduction

Within legal boundaries, what you say and do in the privacy of your own home is your business.

Particularly when it comes to digital information, that privacy and moral flexibility does not extend

to the workplace. Common sense dictates that your actions in a public place are no longer

private. People by nature consider their surroundings before saying or doing something that

would embarrass them or offend others. When it comes to the workplace, the burden of

maintaining a politically and morally correct environment falls on the employer as well as the

employee. Apart from that, we are also discussing the threats in against and in defense needed

for the performance and security of the business information systems, as well as their societal

impacts and ethical implications of information technology, which also includes the slight change

into the job description of business managers and business professionals, where they not only

have to manage the business related matters but also be able to utilize the successful uses of the

information technologies in a global environment and scenario(s) .

Why technology for business managers?

By using the term successful use of the informational technologies and certain other gadgets, we

mean how they apply themselves to comply with newer technologies, with respect to their

managerial activities and how they’ll be reducing the cost and increasing the efficiency level of

both employers, and business organization, because in this era only those organizations are

getting successful and become a bluefish, which opt for latest technology at the right place at right

time, because it let them reducing the cost of production/services by efficiently utilizing their

available resources.

Technology, should it or should it not?There’s no question that the appliance of latest technology has brought many easiness in

business matters and has had beneficial results as well, but as well as the detrimental effects on

the society which gives rise to the security and ethical issues regarding invasion of privacy and

certain other issues in significant ways, that’s why in this report, we’re mostly concerned with

several ethical issues regarding the use and application of information & technologies while

affecting the employment, individuality, working environment and conditions, privacy factor and

invasion of privacy, areas of crime and criminal activities such as cyber crimes etc, health and

several other issues with their solutions to societal problem(s ).

In the digital age, the record of an the discussion can be important. If an employee views a

website that another employee finds offensive, the record of that site visit can become hard

evidence in a court of law. It's an attorney's dream to build a case with such evidence. Because

the employee was not only at the workplace when the offence took place, but using the

employer's equipment to commit the offense both will be held liable for the action. Only

unambiguous evidence of the fact that the employee clearly understood stated rules against such

conduct will limit the employer's liability. Employers can also seek to limit the content that is

8/4/2019 M.I.S. Initial Draft - Ethical and Security Issues in Development of Business Systems

http://slidepdf.com/reader/full/mis-initial-draft-ethical-and-security-issues-in-development-of-business 2/5

Initial draft – Report on Security and Ethical issues in Development of Business Systems

Page 2 

available to the employees, but this can be an even heavier burden. Determining which content to

block and how to effectively block may represent an overwhelming task. The censorship of

information will pose a difficult ethical situation for an employer. In addition, blocking unwanted

content while still maintaining open access to the Internet can be virtually impossible. The

appropriate use of digital communications such as email and text messaging is another area that

must be clearly understood by the employee and it is the employer's responsibility to set the

guidelines. Many employees need to be taught that text based communications can be more

often misinterpreted than spoken communications because other verbal and body language cues

are not present. An offhand remark while both parties are laughing can have a markedly different

connotation when viewed as an email message on a bad day. It is also necessary for the

employee to understand that once the email is sent, there is little control over who else sees it.

And again, there is a digital record of this communication that lasts far longer than the spoken

word. In this digital age, it is the responsibility employers to guide their employees on the proper

use of information systems. Without such guidance, the workplace can become an offensive

atmosphere with significant ethical and legal consequences for the employer.

Apart from that we’re also concerned with several types of security management precedence, and

strategies with their defense theories, which explains how these can be used in order to ensure

the security concerns of business related applications related to information technologies.

Although in this report, we are not only concerned with putting light onto the problems, business

organizations face with regards to information systems and information technologies regarding

security and ethical grounds, we also tried our level best to put give some proposed suggestions,

which we feel can reduced the effect of the security and ethical concerns for business

requirements and environments, which is the main criteria of compilation of this report, because

we feel that with every problem, there should be some solutions to them so that challenges faced

by the business organizations can be reduced and/or minimized to a certain extend.

Our responsibilities as business professionals

Risk and business are said to have a side-by-side relationship, therefore as business

professionals, we should always remember that there’s risk in every step we take which we

always have to have at the back of our minds, apart from that responsibility also falls onto our

shoulders to promote ethical usage of information technology whether at the work place, which

includes proper performance of our roles as the vital human resource in the business systems,

which could help us enabling and developing your skills in the organization, as being a managerof business professional it’d be our responsibility to make decisions about business activities and

the use of information technologies/gadgets which can pose a direct or an indirect security cum

ethical threat.

Several security and ethical instances

For instance; you tend to record all business activities of your organization but on the same time,

you’re creating privacy and ethical problems for your workforce, in compiling records of their

8/4/2019 M.I.S. Initial Draft - Ethical and Security Issues in Development of Business Systems

http://slidepdf.com/reader/full/mis-initial-draft-ethical-and-security-issues-in-development-of-business 3/5

Initial draft – Report on Security and Ethical issues in Development of Business Systems

Page 3 

private made phone-calls or emails, which could be made either to the supplier or a manufacturer

who could be a close friend of yours, so in that case, you won’t be talking with him in serious and

formal tone, but because there’s record keeping procedure going on, the employee might get into

some sense of uncomfortable mode.

The only way such situations can be handled is can be having mutual understand andcommunication between higher and lower personnel and on the same time, a simultaneous

horizontal and vertical communication between the masses so that a mutual understanding can

be made between both ends.

 Situation in Pakistan

Even in Pakistan, we experience such cases where branded computer systems which are

imported to Pakistan, at times do come with software with legal and valid license keys,

which includes operating systems that includes such information like the person’s name

and other information on the barcodes, because of which a user in Pakistan is privileged

to use a legal software on the name of other person who lives thousands of miles away

from him.

 Situation for a home user 

Similar is the case when it comes to networking with portable devices where most of the

data is transferred through wireless medium like WIFI and Bluetooth, which can be easily

extracted in-between (by in-between we mean between sender and the receiver) ,

therefore a person with a technical mind would not suggest sharing vulnerable, precious,

or confidential data or information on a fragile medium. There have been such instances,

that a person was able to decode a WIFI device password in neighbor and started using

internet using that account, that’s also ethical and moral issue which should be addressed

on large scale.

Public Places

This was on micro level, when it comes to macro level, when in an organization like

banks, airports, railway stations, coffee shops etc which are referred to as public arenas,

and therefore sharing your valuable and/or confidential data like your passwords or credit

card numbers, on that scale is not recommended because it can easily be extracted and

can be used in terrorists or spamming purpose. That’s why in places like mentioned

above are not recommended places to share personal data.

Ethical problems in organizations

On the other hand, organizations do emphasize with their employees not to store their

passwords, credit card numbers, and software license keys (when it comes to system

administrators) on organization’s network, and if they’ve account of some sort i.e. email

8/4/2019 M.I.S. Initial Draft - Ethical and Security Issues in Development of Business Systems

http://slidepdf.com/reader/full/mis-initial-draft-ethical-and-security-issues-in-development-of-business 4/5

Initial draft – Report on Security and Ethical issues in Development of Business Systems

Page 4 

addresses, bank account etc, their passwords should be different from the ones they use

in the in organization when they access organization’s network like intranet etc.

Similar is the case when organizations outsource just to cut-out their cost, but it also

overheads private and confidential data of their organization which can include the data of

their consumer base, to the third party, which is the risk organizations take when theyoutsource, although there’s a legal obligation in contracting the terms but still there’s not

certainty of any kind that the information can’t be forwarded ahead.

Ethical Dilemma on micro level like students in educational institutions

Even in school, colleges and universities where websites like Facebook, MySpace, Orkut,

and Google+ are prohibited to be used by the students within institution jurisdiction, but

still there have been many cases that pupil bypass such proxies by different software and

gadgets (gadgets like USB stick, or portable wireless modem and connecting

through the internet on that medium ) to view them, which also creates an ethical

dilemma, by violating the internet usage policy of the institution.

In a nutshell

In a nutshell, we can say that Information is a source of power and, increasingly, the key to

prosperity among those with access to it. Consequently, developments in information systems

also involve social and political relationships-- and so make ethical considerations in how

information is used all the more important. Electronic systems now reach into all levels of

government, into the workplace, and into private lives to such an extent that even people without

access to these systems are affected in significant ways by them. New ethical and legal decisions

are necessary to balance the needs and rights of everyone. with the advancement of technology,apart from some pros, there have been cons along with, and therefore being a business manager,

it’s our responsibility to tackle with such issues, as they can create problems or some sort for the

organization in near future, as we are concerned with business management, managers do need

themselves to equipped with latest technological knowledge so as to they can have a look into

business activities and can efficiently manage their operations in-office and out-of-the-office

activities, which also enables them to reduce cost and on the other hand allows them to keep note

of the activities in-the-office but on the other hand posed issues like security when you outsource

and ethical problems when you take note of the employees or employers in-office-activities

whether they’re breaching the company’s terms and conditions or not, which can pose such

doubts in one’s mind like invasion of privacy, sharing of personal data when outsourcing ( which

can be sold to third party or can be used in spamming ), or decrypting a limited usage network

into full by means of using proxy’s, hacking, cracking, creating fake serial numbers etc are only

some of the widely experienced social and ethical issues, which we’re going to be discussing

more briefly in the report.

Further, Ethics include moral choices made by individuals in relation to the rest of the community,

standards of acceptable behavior, and rules governing members of a profession. The broad

8/4/2019 M.I.S. Initial Draft - Ethical and Security Issues in Development of Business Systems

http://slidepdf.com/reader/full/mis-initial-draft-ethical-and-security-issues-in-development-of-business 5/5

Initial draft – Report on Security and Ethical issues in Development of Business Systems

Page 5 

issues relating to electronic information systems include control of and access to information,

privacy and misuse of data, and international considerations. All of these extend to electronic

networks, electronic databases, and, more specifically, to geographic information systems.

Specific problems within each of the three areas, however, require slightly different kinds of

ethical decisions.

In continuation we also discussed legal decisions in technical developments. Ethics filling the gap

as people negotiate how use of electronic information should proceed. The following notes define

the broad ethical issues now being negotiated. Since laws deciding some aspects of these issues

have been made, these notes should be read in conjunction with Legal Issues in Electronic

Information Systems.

Further, we’ll also discuss why Electronic networks ARE  established as a reliable means of

communication and as a means for exchanging information efficiently! Large networks represent

new sources of power. In order to create reliability and efficiency in communication, networks

were structured so that the movement of information would not depend on --and could not be

controlled by--another person or computer. As a result, the larger networks have become

anarchic. Ordinary people with relatively few resources can communicate ideas and information,

however uncommon, unpopular, or politically sensitive those ideas or information may be, to

millions of other people around the world. No government, no hierarchical system exerting either

repressive or benign influence, not even the simple constraints of time and money, will have quite

the same control they once had over the flow of information as long as the networks operate as

they now do. For some people, the networks therefore contain exciting possibilities; for others

they have become a threatening, even subversive, new presence.