Ethics, Privacy and Information Security

In a 3 to 5-page APA formatted written report (and a minimum of six [6] peer-reviewed sources), address the following concepts by providing in-depth analysis and details:

  • Is monitoring of Web surfing by managers ethical? (It is legal.) Support your answer.
  • Is employee Web surfing ethical? Support your answer.
  • Analyze why are computer systems so vulnerable?
  • Analyze why should information security be a prime concern to management?Mujtaba, B. G. (2003). Ethical implications of employee monitoring: What leaders should consider. 

    This article provides a brief outlook on the reasons that favor the employers to monitor their workforce and how Cyberloafing has been affecting the productivity at workplace. It brings out valid considerations for why electronic monitoring seem beneficial for protecting company’s interests and privacy.

     

    Alder, G. S., Schminke, M., Noel, T. W., & Kuenzi, M. (2008). Employee reactions to internet monitoring: The moderating role of ethical orientation

    This Paper proposes that employees of an organization have generalized attitude towards the ways of monitoring and organization control activities. Employee monitoring has become very prevalent with the development of technology such that 82% of the employers engage in electronic monitoring in one form or other.

     

    Ramayah, T. (2010). Personal web usage and work inefficiency. 

    This Paper talks about a study conducted on employees about the personal use of internet during work hours and how it contributes to work inefficiency which in turn lead to major loss of productivity. I will use this article to talk about ethical aspect of employee web surfing.

     

    Neray, P. (1997). Security on the internet: Is your system vulnerable?

    Internet technology has a wide reach in our every day life starting from ordering our coffee to purchasing a car and staggering amount of data exchange happening every day. This article talks about the potential causes and prevention methods to protect our data.

     

    Rossouw, v. S. (1998). Information security management (1): Why information security is so important. 

    Information security should be the prime importance in any organization for its success and sustain in the market. This paper put up valid arguments why information security has that significance. Data like user authentication and identification and confidential product or research data has to be protected against cyber attacks.

     

    Gorecki, A. T. (1994). Is your computer system sub-critical? 

    This article talks about how miniscule things in computer systems can trigger a chain reaction that can cause a substantial damage. Computer systems can be either sub critical or super critical and could potentially result in software developers could potentially become maintenance programmers.

     

    References

    Alder, G. S., Schminke, M., Noel, T. W., & Kuenzi, M. (2008). Employee reactions to internet monitoring: The moderating role of ethical orientation: JBE. Journal of Business Ethics, 80(3), 481-498. doi:http://dx.doi.org/10.1007/s10551-007-9432-2

    Gorecki, A. T. (1994). Is your computer system sub-critical? Journal of Systems Management, 45(2), 28. Retrieved from https://search.proquest.com/docview/199823495?accountid=158986

    Mujtaba, B. G. (2003). Ethical implications of employee monitoring: What leaders should consider. Journal of Applied Management and Entrepreneurship, 8(3), 22-47. Retrieved from https://search.proquest.com/docview/203906969?accountid=158986

    Neray, P. (1997). Security on the internet: Is your system vulnerable? Nursing Management, 28(7), 64. Retrieved from https://search.proquest.com/docview/231375724?accountid=158986

     

    Ramayah, T. (2010). Personal web usage and work inefficiency. Business Strategy Series, 11(5), 295-301. doi:http://dx.doi.org/10.1108/17515631011080704

     

    Rossouw, v. S. (1998). Information security management (1): Why information security is so important. Information Management & Computer Security, 6(4), 174-177. doi:http://dx.doi.org/10.1108/EUM0000000004533

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *