Now i choose the topic of Ethical Issues which is contained in chapter 2 that is Information Systems: Ethics, Privacy, and Security.
Information technology has make many benefits for individuals, organizations, and entire societies when it is use for a proper uses. However, information technologies can also be miused, often with devastating consequences for example, individuals can have their identities stolen, organization can have customer information stolen, leading to financial losses, erosion of customer confidence,and legal action and also our countries face the threat of cyberterrorism and cyberwarefare. These are the reasons why ethics, privacy, and security topics is being include in the syllabus. Ethics refers to the principle of right and wrong that individuals use to make choices to guide their behaviors. Fundamental tenets of ethics include of responsibility which means that you accept the consequence of your decisions and actions. Moreover, accountability which means a detrmination of who is responsible for actions that were taken. Lastly, liability is a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations or systems. A Frame for ethical issues consist of :
- Privacy issues, involve collecting, storing, and disseminating information about individuals. For examples, it's about what information about oneself should an individuals be required to reveal to others and what kind of surveillance can an employer ose on its employees.
- Accuracy issues, involve the authenticity, fidelity and accuracy of information that is collected and processed. It can be considered of, who is responsible for or how we can ensure that the process of the information is properly done and accurately being presented.
- property issues, involve the ownership and value of information which discuss on who owns the information or how should one handle software piracy.
- Accesibility issues, revolve around who shoould have access to information and whether they should have to pay for this access. It's consist of who is allowed to access the information and how much companies charge for permitting accessibility to information.
No comments:
Post a Comment