SlideShare a Scribd company logo
1 of 6
Week 14 Discussion: Ethics and Information Management
(Click to Read Instructions)
Ethics and Information Management
Using University library and/or other sources, read at least four
(4) academically reviewed articles on the ethical issues that may
arise in information management. Please note that Wikipedia
articles will not be accepted for this discussion.
1. Write a comparative analysis of the articles noting the
similarities and differences.
2. Compare the information in those articles to the materials
in Chapter 14 of your textbook. Does the premise of those
articles support the overall theme of the materials in Chapter 14
of your textbook? Why or why not?
3. Discuss what you learned from those articles. In your
discussion, give example(s) of your organization handles ethic
concerns as they relate to information management.
Required:
Post your original discussion no later than day 5 of week 14.
Read and respond to at least 2 of your classmates’ posts.
Review discussion/posting requirements.
Be sure to support your work with specific citations using APA
format
Read a selection of your colleagues' postings using one or more
of the following ways:
• Share an insight from having read your colleagues' postings,
synthesizing the information to provide new perspectives.
• Offer and support an alternative perspective using readings
from the class materials or from your own research.
• Validate an idea with your own experience and additional
research.
• Make a suggestion based on additional evidence drawn from
readings or after synthesizing multiple postings.
• Expand on your colleagues' postings by providing additional
insights or contrasting perspectives based on readings and
evidence.
Return to this Discussion several times to read the responses to
your initial posting. Note what you have learned and/or any
insights you have gained.
Reply o class mates:
class mate1
:
Similarities:
The most understood authentic trouble in records improvement
join; automatic horrific behavior and facts System safety. This
infers there is a growing quantity of clients who makes use of
the net aid for entire bad conduct. The infringement which can
be submitted through statistics improvement join hacking, PC
illnesses, click on blackmail on advancing agencies, copyright
infringement going on to robbery of reducing part matters and
good buy misrepresentation through faux epitome. Of course
there's information form safety that normally incorporate smash
of a few different consumer's guarantee. This for the most thing
as a result of weak point inside the device, programming or PC
systems that gives Hackers Avenue to increment unapproved get
to. Unapproved get to, facts adversity, PC contaminations and
biometric recognizing affirmation are the troubles associated
with records device security (Laudon, 2015).
Differences:
Diverse issues that were no longer the equal due to the fact the
articles consolidate; weight on IT professionals who want to
paintings 24 hours due to the truth that that motives
imperfections. In like manner, automatic parcel wherein as tons
as improvement is advancing constantly couple of people have
the capability to control the unusualness that goes with it.
(Kenneth McBride, 2014).
The beginning of these articles strengthen the materials found
out to a point 14. This is through exceptional feature of it
factors out the two maximum vital moral issues in statistics
device route round cybercrime and assure troubles that is
associated with records form protection. Furthermore, those
articles organizes the ethical problem of weight on IT
professional and unpredictability that is going with development
as the ones that can be effects managed and controlled.
From those articles, strategies for turning away exploitative
practices in facts device fuse; the usage of sturdy and
extraordinary passwords, gift revived antivirus at the devices,
stay far from open Wi-Fi and unrecognized messages, compel
net sharing and continuously display singular statistics. At
Investment topics sport plans, passwords are specifically
combined with sturdy remarkable passwords hard to part, the
messages do now not permit unrecognized substance as it thusly
blocks to this point antivirus programming provided on the (PCs
Friedman, 2013).
References:
Laudon, K. C., & Laudon, J. P. (2015).
Management information systems
(Vol. 8). Prentice Hall.
Kenneth McBride, N. (2014). ACTIVE ethics: an information
systems ethics for the internet age.
Journal of Information, Communication and Ethics in Society
,
12
(1), 21-44.
Friedman, B., Kahn, P. H., Borning, A., & Huldtgren, A.
(2013). Value sensitive design and information systems. In
Early engagement and new technologies: Opening up the
laboratory
(pp. 55-95). Springer, Dordrecht.
class mate 2:
Information System has been made many achievements now a
days. These is no business running with out information system
for this there should be some ethical issues which people has to
select which is correct and incorrect choices. It is very hard to
set some sort of instructions to the information management
which they are varying day by day. Ethics is generally distinct
as code of morals which will depends on the person. There
should be some ethics while working in the organization to set
some examples and to work truth worthy to the organization you
are working then only we should be achieving the goals and
objectives of our own and the organizations.
Cyber Crime
It is the most important ongoing issue to the information
management. These cybercrimes are extending from minor
group of association to big economic loss and human loss these
are different types identity theft and hacking and computer virus
and etc.. these are done by growth of technology and increase of
smart phones. With these they are making the crimes in more
intelligent way by that they are making the hacking with out
knowing to other person so that the ethical issues will come
raise due to use of other credentials without their knowledge.
Secrecy
With these ethical issue’s secrecy should be maintained by an
individual to defend the data from unauthorized access. The
information management requires every employee in the
organization should know some basic knowledge about the
ethical policy so that they should know which information they
need to block, and which should let free.
What Ethics does?
The most important thing we should know about ethics is Trust.
Trust will rely on confidentially; social responsibility and they
will teach us how day to day activities will run in organization
and in society. Moreover, every employee in the organization
should be trained about ethics and organization should invest
more in security issues
References:-
Azari, R. (Ed.). (2003). Current security management & ethical
issues of information technology. IGI Global.
Stahl, B. C., Timmermans, J., & Flick, C. (2017). Ethics of
Emerging Information and Communication Technologies On the
implementation of responsible research and innovation. Science
and Public Policy, 44(3), 369-381.
Gerdes, A. (2015). IT-ethical issues in sci-fi film within the
timeline of the Ethicomp conference series. Journal of
Information, Communication and Ethics in Society, 13(3/4),
314-325.
Bowie, N. E., and Freeman, R. E. "Ethics and Agency Theory:
An Introduction," in Ethics and Agency Theory, N. E. Bowie
and R. E. Freeman (eds.), Oxford University Press, Oxford,
1992.

More Related Content

Similar to Week 14 Discussion Ethics and Information Management (Click to Read

Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Karen Graham
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxdunningblair
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
Research Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxResearch Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxronak56
 
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxPROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxwoodruffeloisa
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docxaulasnilda
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxPelorusTechnologies
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 

Similar to Week 14 Discussion Ethics and Information Management (Click to Read (20)

Essay On It Security
Essay On It SecurityEssay On It Security
Essay On It Security
 
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docx
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Research Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxResearch Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docx
 
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxPROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Review questions
Review questionsReview questions
Review questions
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 

More from nicolleszkyj

Select one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docxSelect one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docxnicolleszkyj
 
Select an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docxSelect an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docxnicolleszkyj
 
Select an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docxSelect an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docxnicolleszkyj
 
Select one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docxSelect one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docxnicolleszkyj
 
Select one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docxSelect one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docxnicolleszkyj
 
Select an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docxSelect an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docxnicolleszkyj
 
Select an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docxSelect an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docxnicolleszkyj
 
Select an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docxSelect an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docxnicolleszkyj
 
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docxSelect a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docxnicolleszkyj
 
Select a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docxSelect a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docxnicolleszkyj
 
Select a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docxSelect a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docxnicolleszkyj
 
Select a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docxSelect a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docxnicolleszkyj
 
Select a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docxSelect a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docxnicolleszkyj
 
Select a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docxSelect a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docxnicolleszkyj
 
Selecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docxSelecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docxnicolleszkyj
 
Select two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docxSelect two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docxnicolleszkyj
 
Selecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docxSelecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docxnicolleszkyj
 
Select two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docxSelect two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docxnicolleszkyj
 
Select the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docxSelect the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docxnicolleszkyj
 
Select one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docxSelect one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docxnicolleszkyj
 

More from nicolleszkyj (20)

Select one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docxSelect one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docx
 
Select an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docxSelect an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docx
 
Select an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docxSelect an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docx
 
Select one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docxSelect one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docx
 
Select one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docxSelect one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docx
 
Select an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docxSelect an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docx
 
Select an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docxSelect an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docx
 
Select an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docxSelect an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docx
 
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docxSelect a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
 
Select a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docxSelect a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docx
 
Select a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docxSelect a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docx
 
Select a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docxSelect a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docx
 
Select a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docxSelect a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docx
 
Select a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docxSelect a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docx
 
Selecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docxSelecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docx
 
Select two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docxSelect two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docx
 
Selecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docxSelecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docx
 
Select two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docxSelect two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docx
 
Select the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docxSelect the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docx
 
Select one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docxSelect one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Week 14 Discussion Ethics and Information Management (Click to Read

  • 1. Week 14 Discussion: Ethics and Information Management (Click to Read Instructions) Ethics and Information Management Using University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please note that Wikipedia articles will not be accepted for this discussion. 1. Write a comparative analysis of the articles noting the similarities and differences. 2. Compare the information in those articles to the materials in Chapter 14 of your textbook. Does the premise of those articles support the overall theme of the materials in Chapter 14 of your textbook? Why or why not? 3. Discuss what you learned from those articles. In your discussion, give example(s) of your organization handles ethic concerns as they relate to information management. Required: Post your original discussion no later than day 5 of week 14. Read and respond to at least 2 of your classmates’ posts. Review discussion/posting requirements. Be sure to support your work with specific citations using APA format Read a selection of your colleagues' postings using one or more of the following ways: • Share an insight from having read your colleagues' postings,
  • 2. synthesizing the information to provide new perspectives. • Offer and support an alternative perspective using readings from the class materials or from your own research. • Validate an idea with your own experience and additional research. • Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings. • Expand on your colleagues' postings by providing additional insights or contrasting perspectives based on readings and evidence. Return to this Discussion several times to read the responses to your initial posting. Note what you have learned and/or any insights you have gained. Reply o class mates: class mate1 : Similarities: The most understood authentic trouble in records improvement join; automatic horrific behavior and facts System safety. This infers there is a growing quantity of clients who makes use of the net aid for entire bad conduct. The infringement which can be submitted through statistics improvement join hacking, PC illnesses, click on blackmail on advancing agencies, copyright infringement going on to robbery of reducing part matters and
  • 3. good buy misrepresentation through faux epitome. Of course there's information form safety that normally incorporate smash of a few different consumer's guarantee. This for the most thing as a result of weak point inside the device, programming or PC systems that gives Hackers Avenue to increment unapproved get to. Unapproved get to, facts adversity, PC contaminations and biometric recognizing affirmation are the troubles associated with records device security (Laudon, 2015). Differences: Diverse issues that were no longer the equal due to the fact the articles consolidate; weight on IT professionals who want to paintings 24 hours due to the truth that that motives imperfections. In like manner, automatic parcel wherein as tons as improvement is advancing constantly couple of people have the capability to control the unusualness that goes with it. (Kenneth McBride, 2014). The beginning of these articles strengthen the materials found out to a point 14. This is through exceptional feature of it factors out the two maximum vital moral issues in statistics device route round cybercrime and assure troubles that is associated with records form protection. Furthermore, those articles organizes the ethical problem of weight on IT professional and unpredictability that is going with development as the ones that can be effects managed and controlled. From those articles, strategies for turning away exploitative practices in facts device fuse; the usage of sturdy and extraordinary passwords, gift revived antivirus at the devices, stay far from open Wi-Fi and unrecognized messages, compel net sharing and continuously display singular statistics. At Investment topics sport plans, passwords are specifically combined with sturdy remarkable passwords hard to part, the messages do now not permit unrecognized substance as it thusly
  • 4. blocks to this point antivirus programming provided on the (PCs Friedman, 2013). References: Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Prentice Hall. Kenneth McBride, N. (2014). ACTIVE ethics: an information systems ethics for the internet age. Journal of Information, Communication and Ethics in Society , 12 (1), 21-44. Friedman, B., Kahn, P. H., Borning, A., & Huldtgren, A. (2013). Value sensitive design and information systems. In Early engagement and new technologies: Opening up the laboratory (pp. 55-95). Springer, Dordrecht. class mate 2: Information System has been made many achievements now a days. These is no business running with out information system for this there should be some ethical issues which people has to select which is correct and incorrect choices. It is very hard to set some sort of instructions to the information management which they are varying day by day. Ethics is generally distinct as code of morals which will depends on the person. There should be some ethics while working in the organization to set some examples and to work truth worthy to the organization you
  • 5. are working then only we should be achieving the goals and objectives of our own and the organizations. Cyber Crime It is the most important ongoing issue to the information management. These cybercrimes are extending from minor group of association to big economic loss and human loss these are different types identity theft and hacking and computer virus and etc.. these are done by growth of technology and increase of smart phones. With these they are making the crimes in more intelligent way by that they are making the hacking with out knowing to other person so that the ethical issues will come raise due to use of other credentials without their knowledge. Secrecy With these ethical issue’s secrecy should be maintained by an individual to defend the data from unauthorized access. The information management requires every employee in the organization should know some basic knowledge about the ethical policy so that they should know which information they need to block, and which should let free. What Ethics does? The most important thing we should know about ethics is Trust. Trust will rely on confidentially; social responsibility and they will teach us how day to day activities will run in organization and in society. Moreover, every employee in the organization should be trained about ethics and organization should invest more in security issues References:- Azari, R. (Ed.). (2003). Current security management & ethical
  • 6. issues of information technology. IGI Global. Stahl, B. C., Timmermans, J., & Flick, C. (2017). Ethics of Emerging Information and Communication Technologies On the implementation of responsible research and innovation. Science and Public Policy, 44(3), 369-381. Gerdes, A. (2015). IT-ethical issues in sci-fi film within the timeline of the Ethicomp conference series. Journal of Information, Communication and Ethics in Society, 13(3/4), 314-325. Bowie, N. E., and Freeman, R. E. "Ethics and Agency Theory: An Introduction," in Ethics and Agency Theory, N. E. Bowie and R. E. Freeman (eds.), Oxford University Press, Oxford, 1992.