Unethical BehaviorIn the work environment may emerge somefactors that result in the issuance of unethicalbehavior, such as : Lack of obedience to superiors. Lack of respect for the laws and regulationsthat are in favor of work. Lack of loyalty and belonging to theinstitution.
Althacd and hatred between colleagues. Lack of patience and work under pressure. Lack of commitment to literature in thetreatment of others.
Not to respond to questions or uncertaintyabout the validity of the answers.Lack of diligence on the development of selfand continuing learning.Other factors.
One of the main reasons leading to suchmisconduct the following: Lack of appreciation for the efforts. Weak material and moral incentives. Inappropriate behavior for some users. Lack of promotion opportunities availableat work. constant pressure at work.
Lack of deterrent penalties for non-compliance with ethics. face of the employee for some special Thesocial conditions. Lack of users’ appreciations for the natureof work in the information center. Lack of clear standards governing the dailypractices.
Proposals to Strengthen the Ethical Aspects development of religious faith, which Theurges the Muslim to be watching Allah in hiswork. Adding a course on professional ethics inthe curriculum of the informationdepartments.
Preparation of codes of ethics that explainthe principles and values of the professionagreed. Organizing training programs for workers inthe information sector. Conciliation between the interests of workand personal interests through the adoptionof ethical rules of information profession.
Staff awareness of professional ethics throughlectures, seminars, publications, and e-mail. Accounting is committed to ethics ininformation institutions. Professional associations, and support forthe adoption of standards of ethical practices.
Information legislationThe information policy means action plan orstrategy developed by the institutionincluding laws and procedures related to allinformation activities : production,distribution of information , compilation anddissemination, retrieval , and storing.
The scope of information legislation mayextend to include many areas, includingtelecommunications, networks, protection ofpersonal data, e-government, the economicsof information, electronic publishing,information flow, privacy , data protection,information security, intellectual property,legal aspects, and others.
There are many issues related to access toinformation, privacy, and confidentiality, suchas access to personal records of employees,and their e-mail, which has not yet beenresolved. Also there are issues relating to theprotection of information and terroristattacks on information systems, so theremust be a moral framework that can beconsulted.
The Importance of Information legislation Works as a tool to adjust and control whereyou specify the acts that may occur. Helps to achieve the objectives of theorganization. Explains how to deal with sensitiveinformation.
Ensures that information management isgood. Optimal investment of available resources. Works to make information available to all. Transparency in dealing with variouscategories.
Preparation of information legislationIn the preparation of information policy weshould determine its scope, dimensions, drafting well, and taking intoaccount the evaluation and reviewperiodically, as well as the following:
First: define the scope Information policy includes large-scaleorganizational elements and community,technical and material resources, and skills.Policy designers must take into account theseaspects, determine the scope and purpose ofthe policy accuratly, depending on theobjectives of the institution and its potential.
Second: determine the dimensions Intended dimensions of internal andexternal sources that affect the policydesign, implementation, and maintenance. Itshould be born in mind the physicalenvironment , social environments, legal andadministrative knowledge , surroundings, andthe extent of community acceptance of thepolicy. Also policy should be flexible andsubject to change whenever the needoccurred.
Third: policy formulation Must take into account the legal andlanguage aspects when drafting the final formof the policy to be clear in its terminology,concise , easy to understand, and far fromconfusion, as well as complexity.
Fourth: dissemination of information policy Be published after the completion of thepolicy formulated on the foundationswebsite, make them available for employeesto express their opinions around, and takethem into account when reviewing the policy.
Five: Assessment of Information Policy Policy is evaluated periodically to ensureits validity, effectiveness and observance ofthe social, political and economic variables.
Six: Review of information policy The purpose of review is to ensurerepresentation of events , developments , andaddress the difficulties that may arise. Weshould determine who is responsible for thereview, and the time period required.
National Information PolicyPlan developed by the country regulates theflow of information in general, andcoordinates among the various sectorsconcerned with information on the nationallevel to ensure uniformity and integration.The importance of this policy is as follows:
coordinate efforts, and avoid duplication Toand repetition. reflect the desire of the country in Tomaking decisions on planning , economic, andsocial development.
organize information activities, and benefit Tofrom the information in all areas throughcooperation and collaboration, and exchangeof information locally and externally. determine the responsibility of all Toinstitutions concerned with information.
Information Security PolicyPreparation of a plan at the national level on theprotection of technical devices during use, andsecurity programs as the information and systemstargeted for acquisition or sabotage or disable itsorgans, so there was a need for the development ofregulations and laws for the application of technicalprocedures for the security of software, andsecurity of communication in information networks.
The importance of information security policy isthe following: provide a structure for institutions to help Tothem take appropriate decisions. provide a reference for use in the event Toof a disaster that threatens the informationsystem.
determine the availability of the means of Toinformation dissemination. facilitate the detection and identification Toof personal crimes perpetrators.
Elements should be taken into account in thepreparation of information security policy: Human side: the subordination of workers tosecurity checks prior to acceptance intosensitive positions , inform them of thesecurity policy.
Provide appropriate protection for thesecurity of information in computer: deletingfiles is important because it may lead to otherimportant information, make backup copiesoutside the computer, and provide for theirprotection.
Protect transmitted data, and secure all thecomponents of the network: by using securitysoftware such as firewalls that preventhackers, and give contact information. Prohibit input or output of any device ormedia without the permission of theinstitution.
Develop plans for emergency follow in eventof natural disasters or industrial. Develop a security policy for internet useaccording to the needs of theinstitution, prevent its employees fromunnecessary use, and explain the proceduresfor downloading software.
Develop a security policy to use e-mail, so asto clarify the management regime, determinethe right to scan messages, and determine itssize to prevent network congestion. Provide protection against viruses, includingthe purchase of original software needed bythe organization for its activities, and thepurchase of anti-virus software from reliablecompanies.
Areas of information policyInformation policy covers four main areas:Production of information. Dissemination.Organization.Use.
First: the production of informationThe most important issues in this area honestyand objectivity when conducting research,and intellectual property protection so that tomake the research is reliable. Weak studieshave increased with the emergence of theelectronic publishing. At the same time thereare programs capable of detecting the theft ofinformation. This has made electronicpublishing of academic materials easy to copyand reproduce.
Second: the dissemination of information The most important ethical issues in thedissemination of information are access,intellectual freedom, censorship, and privacy.
With regard to access, we must determine theinformation that is available free of charge .With regard to intellectual freedom, a citizenshould has a free access to sources ofinformation needed without any restrictions.The Internet represents an ideal tool in thisregard, although it contains some sites thatincite hatred and violence.
The third dimension is the censorship workingto limit the intellectual freedom for religious,political, economic considerations, andthrough the exclusion or picked up ofinformation.
The fourth dimension is the privacy representedin the individuals right not to share hispersonal information without his consent,and non-disclosure of personal informationheld by public bodies (medical records, bankstatements), as well as informing individualswhen collecting information about them forthe purpose of this process.
Third: organization of information Tools used in the organization ofinformation especially classification systems,and search engines not being neutral. Asthere is bias in some classification schemessuch as Dewey Decimal Classification, whichfocuses on American culture. Also the searchengines lack of external oversight andtransparency, and are affected by politicalpressures and local standards that differ fromone country to another.
Fourth: use of information A large proportion of countries are unableto use the information available in electronicform, resulting in the phenomenon ofinformation poverty. This is because of thepoor information infrastructure, the inabilityto use the techniques of moderncommunication and information efficiently,and lack of familiarity with the Englishlanguage.
Also included in this range the misuse of theinformation being unauthorized, copies of thedatabases to be distributed for profit, and theuse of non-genuine copies of copyrightedprograms.
Other ethical issues related are the misuse ofthe computer through the introduction ofmalware , viruses , worms, theft,embezzlement, sabotage, espionage andterrorism. Therefore, institutions shouldadopt ethical practices and make the workersdepend on the moral sense in their work.
In addition the internet misuse, and thisphenomenon includes the following aspects: E-mail: Sending messages containingpornographic materials, shopping forwebsites, causing damage to computers byviruses, or marketing of the mind of areligious or political beliefs contrary toprevailing in the society.
E-commerce: theft of credit card information,or bank account information, and securitybreach of corporate websites. Malicious sites: which broadcasts religiousand political radical ideas, or marketing forillegal activities such as selling drugs and soon.