Ethical Issues for IT Security Personnel in Network Management
VerifiedAdded on 2020/02/19
|7
|1212
|56
Report
AI Summary
This report delves into the ethical considerations faced by IT security personnel, highlighting the importance of ethical conduct in handling sensitive data and maintaining network integrity. It identifies key ethical issues, such as the right to access private user information, the use of monitoring tools, and the impact of technological advancements on ethical decision-making. The report then explores professional codes of ethics from various organizations like AITP and ISSA, which provide guidelines for ethical business conduct and professional behavior. The report evaluates specific ethical dilemmas, such as accepting kickbacks and commissions, and justifies these evaluations based on the established codes of ethics. Overall, the report emphasizes the need for IT security professionals to uphold integrity, respect privacy, and maintain a high standard of knowledge and skill to build public trust and ensure responsible technology practices. The provided solution is available on Desklib, which is a platform that provides AI-based study tools for students.

Running head: NETWORK ORGANIZATION AND MANAGEMENT
Ethical Issues for IT Security Personnel
Name of the Student:
Name of the University:
Author Note:
Ethical Issues for IT Security Personnel
Name of the Student:
Name of the University:
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1NETWORK ORGANIZATION AND MANAGEMENT
Executive Summary:
The report discusses about the ethical issues of the IT security professionals. The report then
identifies the ethical issues of the IT professionals and discusses about the codes of ethics. The
code of ethics also answers few questions in the report and justify them accordingly.
Executive Summary:
The report discusses about the ethical issues of the IT security professionals. The report then
identifies the ethical issues of the IT professionals and discusses about the codes of ethics. The
code of ethics also answers few questions in the report and justify them accordingly.

2NETWORK ORGANIZATION AND MANAGEMENT
Table of Contents
Introduction......................................................................................................................................5
Identification of Ethical Issues........................................................................................................5
Code of Ethics for Analyzing the Issue...........................................................................................5
Evaluation of Issues and Justification..............................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Table of Contents
Introduction......................................................................................................................................5
Identification of Ethical Issues........................................................................................................5
Code of Ethics for Analyzing the Issue...........................................................................................5
Evaluation of Issues and Justification..............................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3NETWORK ORGANIZATION AND MANAGEMENT
Introduction
The IT security personnel have great deal of power in terms of accessing information
involving confidential data. Moreover, they can also access various information related to
companies and individuals that ensure them with a great deal of power. Often seen that such
power abused and therefore the need for the ethical issues springs up. Thus, the ethical issues
that IT personnel face is mostly related to privacy.
Identification of Ethical Issues
The common ethical issues confronted by the IT security personnel is whether they
should have the right to access the private email of the network users and monitor websites of
network users. Then there is the ethical issue that involves whether the professional should
install key loggers on the machine for capturing everything typed by the user. Moreover, certain
trends observed that seem to raise the ethical issue in question (Steinbock, London & Arras,
2013). The trends however involve the increasing dependency on computer systems for carrying
out critical operations, dependency on networking advances and the internet for copying data
from one location to another. Moreover, the advances in data analytics techniques that involves
acquiring data from multiple sources.
Code of Ethics for Analyzing the Issue
There are certain professional codes of ethics designed for helping the IT personnel to
ensure ethical business conduct. These codes of ethics not only describe the values of the
company or organization ethically but also help in reflecting their mission. These codes meant to
describe approaches to the employees for addressing different issues following particular
Introduction
The IT security personnel have great deal of power in terms of accessing information
involving confidential data. Moreover, they can also access various information related to
companies and individuals that ensure them with a great deal of power. Often seen that such
power abused and therefore the need for the ethical issues springs up. Thus, the ethical issues
that IT personnel face is mostly related to privacy.
Identification of Ethical Issues
The common ethical issues confronted by the IT security personnel is whether they
should have the right to access the private email of the network users and monitor websites of
network users. Then there is the ethical issue that involves whether the professional should
install key loggers on the machine for capturing everything typed by the user. Moreover, certain
trends observed that seem to raise the ethical issue in question (Steinbock, London & Arras,
2013). The trends however involve the increasing dependency on computer systems for carrying
out critical operations, dependency on networking advances and the internet for copying data
from one location to another. Moreover, the advances in data analytics techniques that involves
acquiring data from multiple sources.
Code of Ethics for Analyzing the Issue
There are certain professional codes of ethics designed for helping the IT personnel to
ensure ethical business conduct. These codes of ethics not only describe the values of the
company or organization ethically but also help in reflecting their mission. These codes meant to
describe approaches to the employees for addressing different issues following particular
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4NETWORK ORGANIZATION AND MANAGEMENT
standards (Whelan et al., 2014). However, the IT security personnel do not have a rule making
body but they do have specialized professional organizations to dictate the codes of professional
behavior. These organizations include Association of Information Technology Professionals
(AITP), Cyber Security Institute (CSI), Independent Computer Consultants (ICCA), Information
Systems Security Association (ISSA), Computing Technology Industry Association (Comp TIA)
and Association for Computer Operations Management (AFCOM).
The presence of these bodies thus acts as a reminder for the society to respect the existing
code of ethics. These bodies are also empowered to impose sanctions in cases of any ethical
violation. The bodies also promote corporate influence toward the interest of the specific group.
Such interest usually involves reduction of competition through limitation, enhancing the
difficulty of the function access, general price increment since they allow coordinated payment
fixing in monopolistic way, promotion of the practice for special treatment and recognizing those
that are specific activity dependent(Corey et al., 2014).
There are various independent groups implementing the IT code of ethics. However, the
guidelines include what the professional must abide by:
The IT security personnel must strive to know themselves and be honest to the
best of capability.
The personnel must conduct the business in a way so that professionalism and
integrity maintained.
The personnel must respect one’s privacy and confidentiality.
The personnel must possess a high standard of knowledge and skill
They should maintain a confidential relationship with the people they serve
standards (Whelan et al., 2014). However, the IT security personnel do not have a rule making
body but they do have specialized professional organizations to dictate the codes of professional
behavior. These organizations include Association of Information Technology Professionals
(AITP), Cyber Security Institute (CSI), Independent Computer Consultants (ICCA), Information
Systems Security Association (ISSA), Computing Technology Industry Association (Comp TIA)
and Association for Computer Operations Management (AFCOM).
The presence of these bodies thus acts as a reminder for the society to respect the existing
code of ethics. These bodies are also empowered to impose sanctions in cases of any ethical
violation. The bodies also promote corporate influence toward the interest of the specific group.
Such interest usually involves reduction of competition through limitation, enhancing the
difficulty of the function access, general price increment since they allow coordinated payment
fixing in monopolistic way, promotion of the practice for special treatment and recognizing those
that are specific activity dependent(Corey et al., 2014).
There are various independent groups implementing the IT code of ethics. However, the
guidelines include what the professional must abide by:
The IT security personnel must strive to know themselves and be honest to the
best of capability.
The personnel must conduct the business in a way so that professionalism and
integrity maintained.
The personnel must respect one’s privacy and confidentiality.
The personnel must possess a high standard of knowledge and skill
They should maintain a confidential relationship with the people they serve

5NETWORK ORGANIZATION AND MANAGEMENT
They should be able to build public reliance through their conduct and practice.
Evaluation of Issues and Justification
If one follows the formulated code of ethics, the IT security personnel need to follow then
marking up the software and equipments while cost implementation is against the code of ethics
as security personnel adopt dishonest means to carry out the business when should have been
honest enough to perform at the best of their capacities (Pager, Holden & Golenko, 2012).
Kickbacks are form of negotiated bribery where a certain amount of bribe paid to the taker in
return of the rendered services. In this case, there is a negotiation in the remuneration far ahead
of time. Therefore, taking kickbacks from manufacturers would mean accepting a form of
bribery on the part of the personnel that goes against the code of ethics. Moreover, it is also
against the ethical norms of the IT personnel to accept commissions from the manufacturers for
persuading clients for choosing their products (Inderst & Ottaviani, 2012). The personnel should
not forget that business should be in a manner where professionalism and integrity maintained to
the best of ability. Moreover, as per the code of ethics, the personnels should help build public
reliance and not take undue advantage of their belief by misguiding them towards the company
in which they hold stock with. The choice of products should be the clients call (Morrow et al.,
2013).
Conclusion
The report discusses about the ethical issues of the IT security personnel. There is also
discussion about the identification of the ethical issues and the various codes of ethics for the IT
security personnel. Based on the questions there are few given questions analyzed and then
justifications provided.
They should be able to build public reliance through their conduct and practice.
Evaluation of Issues and Justification
If one follows the formulated code of ethics, the IT security personnel need to follow then
marking up the software and equipments while cost implementation is against the code of ethics
as security personnel adopt dishonest means to carry out the business when should have been
honest enough to perform at the best of their capacities (Pager, Holden & Golenko, 2012).
Kickbacks are form of negotiated bribery where a certain amount of bribe paid to the taker in
return of the rendered services. In this case, there is a negotiation in the remuneration far ahead
of time. Therefore, taking kickbacks from manufacturers would mean accepting a form of
bribery on the part of the personnel that goes against the code of ethics. Moreover, it is also
against the ethical norms of the IT personnel to accept commissions from the manufacturers for
persuading clients for choosing their products (Inderst & Ottaviani, 2012). The personnel should
not forget that business should be in a manner where professionalism and integrity maintained to
the best of ability. Moreover, as per the code of ethics, the personnels should help build public
reliance and not take undue advantage of their belief by misguiding them towards the company
in which they hold stock with. The choice of products should be the clients call (Morrow et al.,
2013).
Conclusion
The report discusses about the ethical issues of the IT security personnel. There is also
discussion about the identification of the ethical issues and the various codes of ethics for the IT
security personnel. Based on the questions there are few given questions analyzed and then
justifications provided.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6NETWORK ORGANIZATION AND MANAGEMENT
References
Corey, G., Corey, M. S., Corey, C., & Callanan, P. (2014). Issues and ethics in the helping
professions with 2014 ACA codes. Nelson Education.
Inderst, R., & Ottaviani, M. (2012). Competition through commissions and kickbacks. The
American Economic Review, 102(2), 780-809.
Morrow, E., Cotterell, P., Robert, G., Grocott, P., & Ross, F. (2013). Mechanisms can help to use
patients' experiences of chronic disease in research and practice: an interpretive synthesis.
Journal of Clinical Epidemiology, 66(8), 856-864.
Pager, S., Holden, L., & Golenko, X. (2012). Motivators, enablers, and barriers to building allied
health research capacity. Journal of Multidisciplinary Healthcare, 5, 53.
Steinbock, B., London, A. J., & Arras, J. (Eds.). (2013). Ethical issues in modern medicine:
Contemporary readings in bioethics. McGraw-Hill.
Whelan, J. P., Hill, M., Ginley, M., & Meyers, A. W. (2014). Ethics in sport and exercise
psychology. American Psychological Association.
References
Corey, G., Corey, M. S., Corey, C., & Callanan, P. (2014). Issues and ethics in the helping
professions with 2014 ACA codes. Nelson Education.
Inderst, R., & Ottaviani, M. (2012). Competition through commissions and kickbacks. The
American Economic Review, 102(2), 780-809.
Morrow, E., Cotterell, P., Robert, G., Grocott, P., & Ross, F. (2013). Mechanisms can help to use
patients' experiences of chronic disease in research and practice: an interpretive synthesis.
Journal of Clinical Epidemiology, 66(8), 856-864.
Pager, S., Holden, L., & Golenko, X. (2012). Motivators, enablers, and barriers to building allied
health research capacity. Journal of Multidisciplinary Healthcare, 5, 53.
Steinbock, B., London, A. J., & Arras, J. (Eds.). (2013). Ethical issues in modern medicine:
Contemporary readings in bioethics. McGraw-Hill.
Whelan, J. P., Hill, M., Ginley, M., & Meyers, A. W. (2014). Ethics in sport and exercise
psychology. American Psychological Association.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





