logo

SEU CS566 : Securing the Enterprise Infrastructure with Cyber Security Techniques

   

Added on  2021-11-05

14 Pages811 Words23 Views
THE BEHAVIORAL ROOTS OF
INFORMATION SYSTEM SECURITY

Use of information technology:
Extensive use of information technology is playing a
major role in the improvement of the business in the
different sector of the industry. The use helps in
Reducing the overhead cost of the business
Bringing the flexibility.
Helps to increase accountability and the correctness of
the data.
Enhancing the security.

Issues regarding the use of information
technology:
Security issues.
Technical issues.
behavioral issues
The main discussion in this context is the behavioral
issues regarding the use of information technology.

Ethical decision making in the use of the
technology:
There are two ethical perspectives:
Consequentialist schools: Judge the act by the rightness of
the act.
deontological schools: Judge the rightness of the act.
The behavioral aspects of unethical use of the technology
will be evaluated from both these ethical theories.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SEU CS566 : Securing the Enterprise Infrastructure with Cyber Security Techniques
|7
|3804
|36

Unethical Behaviour Against Muslims
|6
|1291
|82

Do You Own Your Data? - Information Technology Ethics
|7
|1812
|345

Theories of Ethics: Just Consequentialism, Utilitarianism, and Deontology in Information Ethics
|4
|731
|141

Topics in Information Technology Ethics
|6
|1434
|98

Report about IT Ethics 2022
|7
|1096
|26