SlideShare a Scribd company logo
1 of 3
Discussion 14
by
Santan Reddy Putchakayala
- Friday, 10 August 2018, 4:49 PM
In Today’s world most of the organizations are successful
because of Information System. But using this information in a
wrong way creates a lot of problem to organization and
employees. Organization use internet and collect user data for
their business. Now the main task for organizations is to secure
the data. Now a days all organizations are facing issue with
hackers attacks for confidential information. Information
technology is facing lot of ethical issues and challenges like
lack of security and privacy for confidential information.
Hackers look for all possible loop holes to get the information.
Cybercrime also growing so fast as information technology.
Ethics is social values and it assumes that society is working on
trust factor. It is important that the technology users should
make ethical decisions when anyone in the organization is
engaged in unethical behavior, organization entire have to face
the issue. Organizations face this issues either with internal or
outside parties so companies have to ensure that their data is
secure.
Most of the organizations which are in digital market are
becoming victims for the cybercrime. Below are some of the
ethical challenges faced by information technology.
Security: With growing technology tools like internet, it is easy
for hackers to use IP address and track the user’s activity on
internet. Cookies are used on browsers to collect the
information. Companies use this cookies to decide what content
has to show to the user. But for banking sector hackers will
track the transaction and changes the transaction as they desired
for their use.
Privacy Issue: Information technology is explored in such a way
we can find information online. But this is also causing issues
to privacy.
Prosperity: Ownership of information and ownership of
channels through which the information is transmitted.
Accessibility: Amount of information accessible for
organization employees. And the access they have to get
information.
Respond to the above post with 150 words.
Be sure to support your work with specific citations using APA
format
Read a selection of your colleagues' postings using one or more
of the following ways:
• Share an insight from having read your colleagues' postings,
synthesizing the information to provide new perspectives.
• Offer and support an alternative perspective using readings
from the class materials or from your own research.
• Validate an idea with your own experience and additional
research.
• Make a suggestion based on additional evidence drawn from
readings or after synthesizing multiple postings.
• Expand on your colleagues' postings by providing additional
insights or contrasting perspectives based on readings and
evidence

More Related Content

Similar to Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
IBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageIBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageMark Terry
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence ApproachIntelegia Group
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking PresentationDoug Cornelius
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
ETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATION
ETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATIONETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATION
ETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATIONBeliev-In Technologies
 

Similar to Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx (16)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
IBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust AdvantageIBM 20th Global C-Suite Study - Build Your Trust Advantage
IBM 20th Global C-Suite Study - Build Your Trust Advantage
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
EIS-Webinar- Generative-AI-KM-2023-04-19.pdf
EIS-Webinar- Generative-AI-KM-2023-04-19.pdfEIS-Webinar- Generative-AI-KM-2023-04-19.pdf
EIS-Webinar- Generative-AI-KM-2023-04-19.pdf
 
Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence Approach
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
ETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATION
ETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATIONETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATION
ETHICAL WEB DEVELOPMENT: BALANCING USER PRIVACY AND INNOVATION
 

More from theresiarede

Each student will be required to write a formal letter to an elect.docx
Each student will be required to write a formal letter to an elect.docxEach student will be required to write a formal letter to an elect.docx
Each student will be required to write a formal letter to an elect.docxtheresiarede
 
Each single computer on a specific computer network should have a .docx
Each single computer on a specific computer network should have a .docxEach single computer on a specific computer network should have a .docx
Each single computer on a specific computer network should have a .docxtheresiarede
 
Each should be 200 to 300 words nothing more and Apa formatWhat .docx
Each should be 200 to 300 words nothing more and Apa formatWhat .docxEach should be 200 to 300 words nothing more and Apa formatWhat .docx
Each should be 200 to 300 words nothing more and Apa formatWhat .docxtheresiarede
 
Each question must be more than 200 words.1.List the myths r.docx
Each question must be more than 200 words.1.List the myths r.docxEach question must be more than 200 words.1.List the myths r.docx
Each question must be more than 200 words.1.List the myths r.docxtheresiarede
 
Each part of the United States has at least one ecological crisis ba.docx
Each part of the United States has at least one ecological crisis ba.docxEach part of the United States has at least one ecological crisis ba.docx
Each part of the United States has at least one ecological crisis ba.docxtheresiarede
 
Each day there is speculation in the news about what could happen to.docx
Each day there is speculation in the news about what could happen to.docxEach day there is speculation in the news about what could happen to.docx
Each day there is speculation in the news about what could happen to.docxtheresiarede
 
Each part of the United States has at least one ecological crisis .docx
Each part of the United States has at least one ecological crisis .docxEach part of the United States has at least one ecological crisis .docx
Each part of the United States has at least one ecological crisis .docxtheresiarede
 
Each child approaches, interacts, and processes their world in uniqu.docx
Each child approaches, interacts, and processes their world in uniqu.docxEach child approaches, interacts, and processes their world in uniqu.docx
Each child approaches, interacts, and processes their world in uniqu.docxtheresiarede
 
Each discussion answer must be a minimum of 400 words. Also nohe.docx
Each discussion answer must be a minimum of 400 words. Also nohe.docxEach discussion answer must be a minimum of 400 words. Also nohe.docx
Each discussion answer must be a minimum of 400 words. Also nohe.docxtheresiarede
 
E10-6 According to the accountant of Ulner Inc., its payroll taxes.docx
E10-6 According to the accountant of Ulner Inc., its payroll taxes.docxE10-6 According to the accountant of Ulner Inc., its payroll taxes.docx
E10-6 According to the accountant of Ulner Inc., its payroll taxes.docxtheresiarede
 
Durkheim maintained that social institutions have an obligation to e.docx
Durkheim maintained that social institutions have an obligation to e.docxDurkheim maintained that social institutions have an obligation to e.docx
Durkheim maintained that social institutions have an obligation to e.docxtheresiarede
 
During the revising phase of the writing strategy, why is reading th.docx
During the revising phase of the writing strategy, why is reading th.docxDuring the revising phase of the writing strategy, why is reading th.docx
During the revising phase of the writing strategy, why is reading th.docxtheresiarede
 
During the 1970s and early 1980s, physicians were generally reimburs.docx
During the 1970s and early 1980s, physicians were generally reimburs.docxDuring the 1970s and early 1980s, physicians were generally reimburs.docx
During the 1970s and early 1980s, physicians were generally reimburs.docxtheresiarede
 
During the 1950s and 1960s, female pop music groups became wil.docx
During the 1950s and 1960s, female pop music groups became wil.docxDuring the 1950s and 1960s, female pop music groups became wil.docx
During the 1950s and 1960s, female pop music groups became wil.docxtheresiarede
 
During the Watergate scandal in 1974, many policy pundits wrote colu.docx
During the Watergate scandal in 1974, many policy pundits wrote colu.docxDuring the Watergate scandal in 1974, many policy pundits wrote colu.docx
During the Watergate scandal in 1974, many policy pundits wrote colu.docxtheresiarede
 
During the Reagan Bush years there were many changes in America. P.docx
During the Reagan  Bush years there were many changes in America. P.docxDuring the Reagan  Bush years there were many changes in America. P.docx
During the Reagan Bush years there were many changes in America. P.docxtheresiarede
 
During the 1950s and 1960s, female pop music groups became wildly .docx
During the 1950s and 1960s, female pop music groups became wildly .docxDuring the 1950s and 1960s, female pop music groups became wildly .docx
During the 1950s and 1960s, female pop music groups became wildly .docxtheresiarede
 
Due Week 8 and worth 50 points Peer reviews should provide feedbac.docx
Due Week 8 and worth 50 points Peer reviews should provide feedbac.docxDue Week 8 and worth 50 points Peer reviews should provide feedbac.docx
Due Week 8 and worth 50 points Peer reviews should provide feedbac.docxtheresiarede
 
Due Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docx
Due Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docxDue Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docx
Due Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docxtheresiarede
 
Due Week 4 Part C ConflictConduct and present research that eval.docx
Due Week 4 Part C ConflictConduct and present research that eval.docxDue Week 4 Part C ConflictConduct and present research that eval.docx
Due Week 4 Part C ConflictConduct and present research that eval.docxtheresiarede
 

More from theresiarede (20)

Each student will be required to write a formal letter to an elect.docx
Each student will be required to write a formal letter to an elect.docxEach student will be required to write a formal letter to an elect.docx
Each student will be required to write a formal letter to an elect.docx
 
Each single computer on a specific computer network should have a .docx
Each single computer on a specific computer network should have a .docxEach single computer on a specific computer network should have a .docx
Each single computer on a specific computer network should have a .docx
 
Each should be 200 to 300 words nothing more and Apa formatWhat .docx
Each should be 200 to 300 words nothing more and Apa formatWhat .docxEach should be 200 to 300 words nothing more and Apa formatWhat .docx
Each should be 200 to 300 words nothing more and Apa formatWhat .docx
 
Each question must be more than 200 words.1.List the myths r.docx
Each question must be more than 200 words.1.List the myths r.docxEach question must be more than 200 words.1.List the myths r.docx
Each question must be more than 200 words.1.List the myths r.docx
 
Each part of the United States has at least one ecological crisis ba.docx
Each part of the United States has at least one ecological crisis ba.docxEach part of the United States has at least one ecological crisis ba.docx
Each part of the United States has at least one ecological crisis ba.docx
 
Each day there is speculation in the news about what could happen to.docx
Each day there is speculation in the news about what could happen to.docxEach day there is speculation in the news about what could happen to.docx
Each day there is speculation in the news about what could happen to.docx
 
Each part of the United States has at least one ecological crisis .docx
Each part of the United States has at least one ecological crisis .docxEach part of the United States has at least one ecological crisis .docx
Each part of the United States has at least one ecological crisis .docx
 
Each child approaches, interacts, and processes their world in uniqu.docx
Each child approaches, interacts, and processes their world in uniqu.docxEach child approaches, interacts, and processes their world in uniqu.docx
Each child approaches, interacts, and processes their world in uniqu.docx
 
Each discussion answer must be a minimum of 400 words. Also nohe.docx
Each discussion answer must be a minimum of 400 words. Also nohe.docxEach discussion answer must be a minimum of 400 words. Also nohe.docx
Each discussion answer must be a minimum of 400 words. Also nohe.docx
 
E10-6 According to the accountant of Ulner Inc., its payroll taxes.docx
E10-6 According to the accountant of Ulner Inc., its payroll taxes.docxE10-6 According to the accountant of Ulner Inc., its payroll taxes.docx
E10-6 According to the accountant of Ulner Inc., its payroll taxes.docx
 
Durkheim maintained that social institutions have an obligation to e.docx
Durkheim maintained that social institutions have an obligation to e.docxDurkheim maintained that social institutions have an obligation to e.docx
Durkheim maintained that social institutions have an obligation to e.docx
 
During the revising phase of the writing strategy, why is reading th.docx
During the revising phase of the writing strategy, why is reading th.docxDuring the revising phase of the writing strategy, why is reading th.docx
During the revising phase of the writing strategy, why is reading th.docx
 
During the 1970s and early 1980s, physicians were generally reimburs.docx
During the 1970s and early 1980s, physicians were generally reimburs.docxDuring the 1970s and early 1980s, physicians were generally reimburs.docx
During the 1970s and early 1980s, physicians were generally reimburs.docx
 
During the 1950s and 1960s, female pop music groups became wil.docx
During the 1950s and 1960s, female pop music groups became wil.docxDuring the 1950s and 1960s, female pop music groups became wil.docx
During the 1950s and 1960s, female pop music groups became wil.docx
 
During the Watergate scandal in 1974, many policy pundits wrote colu.docx
During the Watergate scandal in 1974, many policy pundits wrote colu.docxDuring the Watergate scandal in 1974, many policy pundits wrote colu.docx
During the Watergate scandal in 1974, many policy pundits wrote colu.docx
 
During the Reagan Bush years there were many changes in America. P.docx
During the Reagan  Bush years there were many changes in America. P.docxDuring the Reagan  Bush years there were many changes in America. P.docx
During the Reagan Bush years there were many changes in America. P.docx
 
During the 1950s and 1960s, female pop music groups became wildly .docx
During the 1950s and 1960s, female pop music groups became wildly .docxDuring the 1950s and 1960s, female pop music groups became wildly .docx
During the 1950s and 1960s, female pop music groups became wildly .docx
 
Due Week 8 and worth 50 points Peer reviews should provide feedbac.docx
Due Week 8 and worth 50 points Peer reviews should provide feedbac.docxDue Week 8 and worth 50 points Peer reviews should provide feedbac.docx
Due Week 8 and worth 50 points Peer reviews should provide feedbac.docx
 
Due Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docx
Due Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docxDue Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docx
Due Week 8 and worth 200 pointsThis Assignment 2” writing assignm.docx
 
Due Week 4 Part C ConflictConduct and present research that eval.docx
Due Week 4 Part C ConflictConduct and present research that eval.docxDue Week 4 Part C ConflictConduct and present research that eval.docx
Due Week 4 Part C ConflictConduct and present research that eval.docx
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx

  • 1. Discussion 14 by Santan Reddy Putchakayala - Friday, 10 August 2018, 4:49 PM In Today’s world most of the organizations are successful because of Information System. But using this information in a wrong way creates a lot of problem to organization and employees. Organization use internet and collect user data for their business. Now the main task for organizations is to secure the data. Now a days all organizations are facing issue with hackers attacks for confidential information. Information technology is facing lot of ethical issues and challenges like lack of security and privacy for confidential information. Hackers look for all possible loop holes to get the information. Cybercrime also growing so fast as information technology. Ethics is social values and it assumes that society is working on trust factor. It is important that the technology users should make ethical decisions when anyone in the organization is engaged in unethical behavior, organization entire have to face the issue. Organizations face this issues either with internal or outside parties so companies have to ensure that their data is secure. Most of the organizations which are in digital market are becoming victims for the cybercrime. Below are some of the ethical challenges faced by information technology. Security: With growing technology tools like internet, it is easy for hackers to use IP address and track the user’s activity on internet. Cookies are used on browsers to collect the information. Companies use this cookies to decide what content
  • 2. has to show to the user. But for banking sector hackers will track the transaction and changes the transaction as they desired for their use. Privacy Issue: Information technology is explored in such a way we can find information online. But this is also causing issues to privacy. Prosperity: Ownership of information and ownership of channels through which the information is transmitted. Accessibility: Amount of information accessible for organization employees. And the access they have to get information. Respond to the above post with 150 words. Be sure to support your work with specific citations using APA format Read a selection of your colleagues' postings using one or more of the following ways: • Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives. • Offer and support an alternative perspective using readings from the class materials or from your own research. • Validate an idea with your own experience and additional research. • Make a suggestion based on additional evidence drawn from
  • 3. readings or after synthesizing multiple postings. • Expand on your colleagues' postings by providing additional insights or contrasting perspectives based on readings and evidence