Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Ethics in Information systems Overview Ethics is an important part of informatio

ID: 3571925 • Letter: E

Question

Ethics in Information systems
Overview
Ethics is an important part of information system development. System designers must protect things like corporate and customer data. In addition, that data must be used in ways that do not violate applicable laws and regulations. Even when a law or regulation does not apply, ethics must be considered from a public relations point of view. If an organization’s customers perceive that an organization is unethical, they may be driven away. This is especially true if the organization is a non-profit charity.
In this discussion, students will identify and discuss ethical issues that organizations need to be aware of.
Objectives
Describe and discuss the ethical implications of information systems.
Instructions
Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important. Backup your analysis with article(s) that you find that address each issue. Ethics in Information systems
Overview
Ethics is an important part of information system development. System designers must protect things like corporate and customer data. In addition, that data must be used in ways that do not violate applicable laws and regulations. Even when a law or regulation does not apply, ethics must be considered from a public relations point of view. If an organization’s customers perceive that an organization is unethical, they may be driven away. This is especially true if the organization is a non-profit charity.
In this discussion, students will identify and discuss ethical issues that organizations need to be aware of.
Objectives
Describe and discuss the ethical implications of information systems.
Instructions
Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important. Backup your analysis with article(s) that you find that address each issue. Ethics in Information systems
Overview
Ethics is an important part of information system development. System designers must protect things like corporate and customer data. In addition, that data must be used in ways that do not violate applicable laws and regulations. Even when a law or regulation does not apply, ethics must be considered from a public relations point of view. If an organization’s customers perceive that an organization is unethical, they may be driven away. This is especially true if the organization is a non-profit charity.
In this discussion, students will identify and discuss ethical issues that organizations need to be aware of.
Objectives
Describe and discuss the ethical implications of information systems.
Instructions
Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important. Backup your analysis with article(s) that you find that address each issue.

Explanation / Answer

Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. When using information systems, it is essential to ask, “What is the ethical responsible course of action?”

Information Systems raise new ethical questions because they create possibilities for intense social change,threatening existing distributions of power,money,rights and obligations and new kind of crimes.

Ethics in an information society:

Before we discuss about ethics dilemas in information systems,let's discuss some of basic concepts like Responsibility, Accountability, and Liability. Responsibility is a key element and means that you accept the potential costs, duties, and obligations for the decisions you make.Accountability is a feature of systems and social institutions and means mechanisms are in place to determine who took responsible action, and who is responsible. Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations.

Key techonology trends that raise ethical issues in information systems:

Technology can be a double-edged sword. It can be the source of many benefits but it can also create new opportunities for invading your privacy, and enabling the reckless use of that information in a variety of decisions about you. The computer has become a part of our lives – personally as well as socially, culturally, and politically. It is unlikely that the issues and our choices will become easier as information technology continues to transform our world. The growth of the Internet and the information economy suggests that all the ethical issues will be heightened further as we move into the first digital century.

Major ethical issues are these-

PRIVACY: Does information's availability justify its use?

Governments collect massive amounts of data on individuals and organizations and use it for a variety of purposes: national security, accurate tax collection, demographics, international geopolitical strategic analysis, etc. Corporations do the same for commercial reasons; to increase business, control expense, enhance profitability, gain market share, etc. Technological advances in both hardware and software have significantly changed the scope of what can be amassed and processed. Massive quantities of data, measured in petabytes and beyond, can be centrally stored and retrieved effortlessly and quickly. Seemingly disparate sources of data can be cross-referenced to glean new meanings when one set of data is viewed within the context of another.

Should organizations' ability to collect and process data on exponentially increasing scales be limited in any way? Does the fact that information can be architected for a particular purpose mean it should be, even if by so doing individual privacy rights are potentially violated?

OWNERSHIP: What can employers expect from employees with regard to nondisclosure when going to work for another firm?

Many people are required to sign NDAs (nondisclosure agreements) and noncompete clauses in employment contracts, legal documents that restrict their ability to share information with other future employers even to the point of disallowing them to join certain companies or continue to participate in a particular industry.

What about the rest of us, who have no such legal restrictions? In the course of our work for employer A, we are privy to trade secrets, internal documents, proprietary processes and technology, and other information creating competitive advantage. We can't do a brain dump when we leave to go to work for employer B; we carry that information with us. Is it ethical to use our special knowledge gained at one employer to the benefit of another? How do you realistically restrict yourself from doing so?

CONTROL: Do employees know the degree to which behavior is monitored?

Organizations have the right to monitor what employees do (management is measurement) and how technology systems are used. It's common practice to notify employees that when they use organizational assets such as networks or Internet access, they should have no expectation of privacy. Even without that disclaimer, they really don't need the warning to know this monitoring is, or could be, taking place.

Do organizations have an obligation to notify employees as to the extent of that monitoring? Should an organization make it clear that in addition to monitoring how long employees are using the Internet, it's also watching which Web sites they visit? If the organization merely says there's no expectation of privacy when using the e-mail system, is it an ethical violation when employees later find out it was actually reading their e-mails?

ACCURACY: Is accuracy an explicit part of someone's responsibility?

Business has always had a love/hate relationship with accuracy. Effective decision making is driven by accurate information, but quality control comes with a cost both in terms of dollars and productivity. (If you're checking, you can't also be doing.)

EXAMPLE-

CODE OF ETHICS OR ACCEPTABLE USE POLICY RELATED TO IT RESOURCES OF IOWA STATE UNIVERSITY-

1-Policy Statement

Unless otherwise specified in this policy or other university policies, use of university information technology resources is restricted to purposes related to the university's mission. Eligible individuals are provided access in order to support their studies, instruction, duties as employees, official business with the university, and other university-sanctioned activities. Individuals may not share with or transfer to others their university accounts including network IDs, passwords, or other access codes that allow them to gain access to university information technology resources.

Colleges, departments, and other administrative units have considerable latitude in developing complementary technology use policies and procedures, as long as they are consistent with this policy and any other applicable technology use policies of the university.

2-Unacceptable Use

Users are prohibited from engaging in any activity that is illegal under local, state, federal, or international law or in violation of university policy. The categories and lists below are by no means exhaustive, but attempt to provide a framework for activities that fall into the category of unacceptable use.

2.1. Excessive Non-Priority Use of Computing Resources

Priority for the use of IT resources is given to activities related to the university's missions of teaching, learning, research, and outreach. University computer and network resources are limited in capacity and are in high demand. To conserve IT resource capacity for all users, individuals should exercise restraint when utilizing computing and network resources. Individual users may be required to halt or curtail non-priority use of IT resources, such as recreational activities and non-academic, non-business services.

2.2. Unacceptable System and Network Activities

Unacceptable system and network activities include:

2.2.1. Engaging in or effecting security breaches or malicious use of network communication including, but not limited to:

2.2.1.1. Obtaining configuration information about a network or system for which the user does not have administrative responsibility.

2.2.1.2. Engaging in activities intended to hide the user's identity, to purposefully increase network traffic, or other activities that purposefully endanger or create nuisance traffic for the network or systems attached to the network.

2.2.1.3. Circumventing user authentication or accessing data, accounts, or systems that the user is not expressly authorized to access.

2.2.1.4. Interfering with or denying service to another user on the campus network or using university facilities or networks to interfere with or deny service to persons outside the university.

top

2.3. Unauthorized Use of Intellectual Property

Users may not use university facilities or networks to violate the ethical and legal rights of any person or company protected by copyright, trade secret, patent, or other intellectual property, or similar laws or regulations. Violations include, but are not limited to:

2.3.1. Except as provided by fair use principles, engaging in unauthorized copying, distribution, display, or publication of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books, or other copyrighted sources; copyrighted music or video; and the installation of any copyrighted software without an appropriate license.

2.3.2. Using, displaying, or publishing licensed trademarks, including Iowa State University's trademarks, without license or authorization or using them in a manner inconsistent with the terms of authorization.

2.3.3. Exporting software, technical information, encryption software, or technology in violation of international or regional export control laws.

2.3.4. Breaching confidentiality agreements or disclosing trade secrets or pre-publication research.

2.3.5. Using computing facilities and networks to engage in academic dishonesty prohibited by university policy (such as unauthorized sharing of academic work or plagiarism).

2.4. Inappropriate or Malicious Use of IT Systems

Inappropriate or malicious use of IT systems includes:

2.4.1. Setting up file sharing in which protected intellectual property is illegally shared.

2.4.2. Intentionally introducing malicious programs into the network or server (e.g., viruses, worms, Trojan horses, email bombs, etc.).

2.4.3. Inappropriate use or sharing of university-authorized IT privileges or resources.

2.4.4. Changing another user's password, access, or authorizations.

2.4.5. Using an Iowa State University computing asset to actively engage in displaying, procuring, or transmitting material that is in violation of sexual harassment policy or laws, hostile workplace laws, or other illegal activity.

2.4.6. Using an Iowa State University computing asset for any private purpose or for personal gain.

top

2.5. Misuse of Electronic Communications

Electronic communications are essential in carrying out the activities of the university and to individual communication among faculty, staff, students, and their correspondents. Individuals are required to know and comply with the university's policy on Mass Email and Effective Electronic Communication(see Resources below).

Key prohibitions include:

2.5.1. Sending unsolicited messages, including "junk mail" or other advertising material, to individuals who did not specifically request such material, except as approved under the policy on Mass Email and Effective Electronic Communication.

2.5.2. Engaging in harassment via electronic communications whether through language, frequency, or size of messages.

2.5.3. Masquerading as someone else by using their email or internet address or electronic signature.

2.5.4. Soliciting email from any other email address, other than that of the poster's account, with the intent to harass or to collect replies.

2.5.5. Creating or forwarding "chain letters" or solicitations for business schemes.

2.5.6. Using email originating from Iowa State University provided accounts for commercial use or personal gain.  

2.5.7. Broadcasting e-mail from a university account to solicit support for a candidate or ballot measure, or otherwise using e-mail systems in a concerted effort to support a candidate or ballot measure.

3. Enforcement

The Acceptable Use of Information Technology Resources policy is enforced through the following mechanisms.

3.1. Interim Measures

The university may temporarily disable service to an individual or a computing device, when an apparent misuse of university computing facilities or networks has occurred, and the misuse:

3.1.1. Is a claim under the Digital Millennium Copyright Act (DMCA)

3.1.2. Is a violation of criminal law

3.1.3. Has the potential to cause significant damage to or interference with university facilities or services

3.1.4. May cause significant damage to another person

3.1.5. May result in liability to the university

An attempt will be made to contact the person responsible for the account or equipment prior to disabling service unless law enforcement authorities forbid it or Information Technology Services staff determine that immediate action is necessary to preserve the integrity of the university network. In any case, the user shall be informed as soon as possible so that they may present reasons in writing why their use is not a violation or that they have authorization for the use.
top

3.2. Suspension of Services and Other Action

Users may be issued warnings, may be required to agree to conditions of continued service, or may have their privileges suspended or denied if:

3.2.1. After hearing the user's explanation of the alleged violation, an IT provider has made a determination that the user has engaged in a violation of this code, or

3.2.2. A student or employee disciplinary body has determined that the user has engaged in a violation of the code.

3.3. Disciplinary Action

Violations of the Iowa State University Acceptable Use of Information Technology Resources policy may be referred for disciplinary action as outlined in the Student Disciplinary Regulations and applicable faculty and staff handbooks or collective bargaining agreement. The university may assess a charge to offset the cost of the incident.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote