Security of Information in a Workplace: Three Distinct Perspectives of Applied Ethics
Verified
Added on ย 2023/06/09
|9
|2709
|268
AI Summary
This essay discusses the ethical dilemmas faced by IT organizations, specifically the security of information in a workplace. It analyzes the issues from professional, philosophical, and sociological/descriptive ethics perspectives. The essay also provides recommendations to address the ethical issues.
Contribute Materials
Your contribution can guide someoneโs learning journey. Share your
documents today.
SCCMAD MAS Charles SturtniversityHOOL OFOPUTINGNTH ,U Security of information in a workplace Assignmenthree Distincterspectives of Appliedthics1: TPE ourameYN Student Number Word Count: 1500
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Security of information in a workplace 1.Introduction thics can be described as a set of principles that are to be followed by anE organizationsociety or an individualhe law of the nation does not bind these principles,. T. Some principles might be legal according to the law of nation but it might not be ethical for an organizationorganizations face various ethical dilemmas such as dilemma in decision. IT- makingsecurity issues and many more,(Ifinedo, 2014)he dilemma that would be. T discussed in this essay is security of information in a workplace of company A CowadaysB . N employers are able to monitor the use of technologies like social media emails and many, more by their workers Monitoring their activities lead to several ethical problems faced by the. employershese problems might be from the perspective of the profession philosophical or. T, sociologicalhese issues are mentioned in details in the discussion part of the essay. T. 2.Professional Ethics Perspectives ๏ทManual handling of data the handling of some information is done manually in: the A C organizationhe data that are manually handled in the organizationB. T are registers that are maintained for various purposes like noting down the number of workers in the employeescollecting the resumes of new joiners, and many more Manual handling of data may cause many ethical issues such. as misplacingofinformationwhich leads ina mishap occurred inthe, organization(Ortmeier, 2017)his process consumes a lot of ti me which might. T, create a negative impact on the operations of the organizationhe issue faced. T by the organization is that the data that are handled manually could be done, through a machine but it would involve a huge amount if investment and the manual handling crates problem for the organization. ๏ทoyalty of employees in some of the organizations employees are required toL:, sign a nondisclosure agreement paperhis maintains a security of information. T regarding the organizationsAccording to the principles of this paperthe., employees are not allowed to share any information about the organization or its operations to anyone(Chu, Chau & So, 2015)n some organizations they. I, do not have any such agreement such as the company A Che employeesB . T might share the important information with people who do not belong to the organizationhis might harm the organization in various ways and the data. T obtained can be used for illegal purposes. ourameYN
Security of information in a workplace ๏ทrand imagethe leakage of information from any source of the organizationB: might lead in affecting the brand image of the companyhe customers would. T not feel safe to purchase services or products from the organizationAny. purchase done from the organization would include fi nancial transaction(Hsu, Shih & Hung, 2015)he customers would not agree to provide their bank. T details for any kind of transaction because the leakage of bank details of a customer would not only affect the organization but also the customerA. company spends a lot of ti me in creating a good brand image and it takes hardly fi ve minutes to destroy it irrespective of the reason. 3.Philosophical Ethics Perspectives ๏ทCustomer dissatisfactionone of the most effective ethical issues faced due to: improper security of the organization is customer satisfactionf the personal. I information regarding a customer were leaked by the organization through any meanswould leadin customerdissatisfaction(Blythe,2015)Dissatisfaction. among customers would result in loosing loyal customers. ๏ทMishaps due to leakage of information leakage of information causes mishap in: the organization as well as among the customershis creates an ethical issue. T in the organization(Grunwald, 2015)he leakage of data regarding customers. T and employees might cause a problem to both of them. ๏ทClients loyaltythe loyalty of the client is affected if data regarding personalโ: information of customers is revealed by any meansSometimes customers go. through fi nancial transactions through their atm cards that are carried out by the organization After transaction is over customers are given an opportunity to., save their details for further use(Arnold, 2014)Most of the ti mes customers. agree with the terms because saving the details allow them to pay directly for the products or services enjoyed by themAccess of bank details of the. customers to an outsider would have a negative impact on the loyalty of the clients. ๏ทse of social mediause of social media in organization has become anU: emerging trend to gain information for various purposeshe use of social. T media itself results in creating ethical dilemmas in the organizationeakage of. L information through social media creates worse ethical issues that affect the ourameYN
Security of information in a workplace organization and the customers as well(Gritzalis, Kandias & Stavrou, 2014). Manycustomersshareimportantinformationregardingtheorganization through social media such as sharing about their working schedule or the project that they are working on presently and many morehis information is. T accessible by everyone because these posts are kept publicnformation. I gathered from social media might be used for ill purpose which might harm, the organization. ๏ทAngry customersan organization holds various categories of customersA:. particular category of customer might be satisfied with a product or service provided by an organization but the same product or service might not satisfy a different category of customers Sometimes customers might get furious due to. some problems occurred in services provided by organization(Kosinski, Matz & Gosling, 2015)his might lead the customer in damaging the image of. T organization by posting the problems on their site or on the official site of the organizationutsiders might take advantage of this and damage the image as. O well as the customer base of the organization. 4.Sociological/Descriptive Ethics Perspectives ๏ทData breaches official site of the organizations often ask various security questions: to the users while logging in to their sitehese questions are used when the. T user losses or forgets his passwordhis is done in order to recognize. T weather the user is the one who he claims to berganizations follow these. O steps for protecting the personal details of their customers(Chang, Liu & Lin, 2015)he ethical issue here is that the security questions are asked by. T website of the organization in order to maintain privacy of their account and the website saves this information to authenticate the user laterf data breach. I takes place this information might be stolen and the account of the customer, might be used for ill purposes. ๏ทAccess controlmost of the ti me organizations have various departments that: perform their individual tasks Department that is responsible for tasks such. as handling the personal information of the customerslooking after whether, the organization is operating well or deals with fi nancial transactions done by the ourameYN
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Security of information in a workplace customers have access to the detailed information regarding the customers. he members of that particular department have access to this informationT (Gritzalis, Stavrou & Kandias, 2014)his multiple access of the information. T regarding the customers might result in leakage of datahe data leakage. T would cause great damage to the customers as well as the organizationn. I order to maintain privacy the organization should provide access of personal information about the customers to limited number of employeesere occurs. H an ethical issue that the limited number of employees might not be able to handle the information of all the customers An organization holds a customer. base of around lacks(Gritzalis, Stavrou & Kandias, 2014)A big team is. required to handle the detailed information of customersust couple of. J people would not be able to do it. ๏ทSocialinfluencetheinfluenceofsocialmediahasaffectedsocialmedial:, stakeholders as well as the customersrganizations have been integrating. O social media into their business for growing their customers and revenue. his has resulted in social engagement of the employeesmployees postT. E regarding every activity in their job(Hajli & Lin, 2016)his allows the outside. T world to get access of the whereabouts of organizationhe revealing of. T internal information about operations of organization might cause harm to the organization as well as customersack of privacy in the social usage of. L employees may lead to disastrous changes in the organization. ๏ทse of big data there has been huge number of privacy concerns related toU: big datahe use of big data allows organizations the right to track every. T online activity of the customerhis helps the customer to fulfill his needs by. T not wasting much ti me(Kosinski, Matz & Gosling, 2015)nline habits reflect. O various details regarding the personality of the user such as the type of products preferred by the user the sites preferred by him and many more,. Some breaches occurred in the organization s system might cause stealing ofโ information related to the customers. ourameYN
Security of information in a workplace 5.References Gritzalis, D., Kandias, M., Stavrou, V., & Mitrou, L. (2014). History of information: the case of privacy and security in social media. In Proc. of the History of Information Conference (pp. 283-310). Arnold, D. G. (2014). Ethical theory and business. T. L. Beauchamp, & N. E. Bowie (Eds.). Pearson. Blythe, J. (2015). Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours (Doctoral dissertation, Northumbria University). Chang, S. E., Liu, A. Y., & Lin, S. (2015). Exploring privacy and trust for employee monitoring. Industrial Management & Data Systems, 115(1), 88-106. Chu, A. M., Chau, P. Y., & So, M. K. (2015). Explaining the misuse of information systems resources in the workplace: A dual-process approach. Journal of business ethics, 131(1), 209-225. Gritzalis, D., Stavrou, V., Kandias, M., & Stergiopoulos, G. (2014, March). Insider Threat: Enhancing BPM through Social Media. In NTMS (pp. 1-6). Grunwald, A. (2015). Technology assessment. In Encyclopedia of Information Science and Technology, Third Edition (pp. 3998-4006). IGI Global. Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111-123. Hsu, J. S. C., Shih, S. P., Hung, Y. W., & Lowry, P. B. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282-300. Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79. ourameYN
Security of information in a workplace Kosinski, M., Matz, S. C., Gosling, S. D., Popov, V., & Stillwell, D. (2015). Facebook as a research tool for the social sciences: Opportunities, challenges, ethical considerations, and practical guidelines. American Psychologist, 70(6), 543. Ortmeier, P. J. (2017). Introduction to security. Pearson. ourameYN
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Security of information in a workplace Do not remove the following marking sheet. Marking Sheet CriteriaStandards Marks award ed Use professional, philosophical, and sociological/descri ptive ethics perspectives to analyse the ethical issues involved in the case. (Value 70%) HD: Comprehensive understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through in-depth discussion and analysis of three most relevant ethical issues involved in your chosen case.(59.5-70) DI: Mostly comprehensive understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through in-depth discussion and analysis of three most relevant ethical issues involved in your chosen case.(52.5-58.8) CR: Some understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through some discussion and analysis of two relevant ethical issues involved in your chosen case.(45.5-51.8) PS: Basic understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through some discussion and analysis of two relevant ethical issues involved in your chosen case.(35-44.8) FL: Major omissions in understanding of the professional, philosophical, and sociological/descriptive ethics perspectives and irrelevant ethical issues are identified and analysed.(0-34.3) Writing & structure (Value 20%) HD: Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation errors.(17-20) DI: Well developed skills in expression & presentation of ideas.Fluent writing style appropriate to assessment task/document type.Grammar & spelling accurate.(15-16.8) CR: Good skills in expression & clear presentation of ideas.Mostly fluent writing style appropriate to assessment task/document type. Grammar & spelling contains a few minor errors.(13-14.8) PS: The text contains frequent errors in spelling, grammar, word choice, and structure, lacks clarity, and is not concise, but the meaning is apparent to the reader with some effort.(10-12.8) FL: Rudimentary skills in expression & presentation of ideas.Not all material is relevant &/or is presented in a disorganised manner.Meaning apparent, but writing style not fluent or well organised.Grammar & spelling contains many errors.(0-9.8) Referencing (Value 10%) HD: Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.(8.5-10) DI: Very good referencing, including reference list and citations.High quality references.(7.5-8.4) CR:Good referencing, including reference list and citations. Good quality references.(6.5-7.4) PS:Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some minor errors or omissions in style and formatting choices (e.g. italics, punctuation, etc) donโt impact on the transparency ourameYN
Security of information in a workplace and traceability of the source, or demonstration of academic integrity.(5-6.4) FL: Sub-standard (or no) referencing. Poor quality (or no) references.(0-4.9) Total Marks ourameYN