INFORMATION MANAGEMENT
QUESTION 1
Ethical issues in information systems have been given new urgency by the rise of the internet and electronic commerce. Internet and digital firm technologies make it easier than ever to assemble, integrate, and distribute personal privacy, and the protection of intellectual property. Discuss in detail the ethical, social, and political issues raised by information systems?
QUESTION 2
Systems are vulnerable due to the large amounts of data they store in an electronic from. Vulnerabilities can occur at different layers in the network and in the communication between those layers in the business. Explain the security concern identity theft, how this would likely occur and the solutions to this type of security concern
Answer 1: The ethical, social and political issue is that these firms heavily compromising the individual’s data can go to any extent to remain competitive and profit making so they play with the privacy of people around world. They do not have corporate social responsibilities and tends to act in a way least concerned with the society and its impact on people life. The social factors are also ignored. Political actions also take time to understand the issue and before they act, a lot of harm by these firms in this information age is already committed. Laws take time to be created and thus become difficult to deal with such privacy and intellectual property issues.
There has to be accountability of these firms. In many cases, for breaching laws, the owner of these business and firm are also convicted however in the information age, the framework shall be stricter for these firms to operate so that they cannot simply put individuals personal data at risk to the world.
INFORMATION MANAGEMENT QUESTION 1 Ethical issues in information systems have been given new urgency by the...
Please see the articles below… 1. What is your opinion on the subject? 2. Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...