Security, Privacy &
Ethical Issues in Information Systems and the Internet
‘Effective
advertising is the key to keeping the Internet free, and personalized ads allow
consumers to see information about goods and services that are relevant to
their lives’- Josh Isay
Computer crime is a serious and rapidly growing area of
concern requiring management attention (Chiu, 2000). Intentional computer crime
is rapidly increasing throughout the world due to the advancement in the IT
industry especially IT Finance industry. Many hackers intentionally create
crime to steal the information from the IT Finance industry and sell to others
to make high amount of profits. Intentional computer crime requires the
attention of management and security specialists to prevent the loss of importance
data and privacy of the clients.
The use of information systems and technology impacts
individuals, groups, and societies. Technology must be used ethically and designed
to avoid injuring humans. There are two common kind of ethical issues in
information systems which are computer waste and computer mistakes.
Computer Waste and
Mistakes
Computer waste and mistakes contribute to computer problems,
high costs, lost profits, and angry customers.
What computer waste
mean?
Computer waste refers to the inappropriate use of computer
technology and services in an organization or community. Many employees inside
the organizational have no idea what is computer waste.
What you understand
about Computer Waste?
Computer waste represents 2 percent of American’s trash in
landfills, but it equals to 70 percent of overall toxic waste. The extreme amount
of lead in electronics alone causes damage in the central and peripheral
nervous system, the blood and the kidneys. There are about 20 to 50 million
metric tons of computer waste are disposed worldwide every year. It is a
terrible amount of toxic produced by human. However, there are only 12.5
percent of total computer waste is currently recycled. The develop countries
such as United States of America, United Kingdom, Canada and German are the
leading countries in recycling the computer waste, four of the develop
countries have 80 percent from the 12.5 percent.
Computer waste is widespread in the public and private
sectors, and is usually caused by the improper management of information system
technology. Some organizations discard usable hardware and software that could
be used elsewhere in the organization, or sold or donated. Another example of
computer waste occurs when significant resources are invested in the
development of an information system, and then it is never used to its fullest
extent. This happens for many reasons, but poor design and inadequate training
are major causes. Employees playing computer games or surfing the Web at their
desks on working time is also a source of waste, as are junk e-mail and junk
faxes from other organizations or hackers.
What Computer Mistake
mean?
Computer mistakes include errors, failures, and related
problems that cause computer output to be incorrect or not useful. Most of the
computer related mistakes are caused by human error. There are few common
mistakes that employees or normal households will involve such as clicking on
advertisements. For example, a free iPod! Worth $500 gift card! From the famous
website such as Amazon.com, Walmart.com and etc. which the design is 99.99% seem
alike but not the official company promotion. The hackers will replicate and use
the well-known company website to attract and make the individual believe on
it. Then they will steal the data from the computer not only the personal data
but also the clients’ data.
How to avoid computer
waste and mistakes?
Policies and procedures must be established to avoid computer
waste and mistakes. Although often unintentional, computer waste and mistake
can be costly. Organizational policies and procedures can help to avoid losses.
Many employees tend to make the unintentional computer waste and mistake that
caused the organization to pay a high amount to settle and repair the waste and
mistake.
Preventive policies and procedures typically address the
issues listed above. Procedures relating to the acquisition and use of
computers can avoid both waste and mistakes. For example, procedures could
ensure that computers no longer needed in one part of the organization would be
used in another part of the organization, rather than discarded the computers.
Employees and groups are less likely to make mistake of using
the applications and technology if they have been properly trained with ethics
and the proper usage of organization’s computers. Many organizations require
that systems or applications meeting certain criteria must be approved by a
committee or the Information System department before the manager of any
department acquire d and implemented, to ensure they are compatible with the
existing systems, database and technology. It also must be cost-effective.
Besides that they also established procedures to ensure that all systems
including those developed by end users, have adequate documentation.
Security and Privacy of
Information Systems and the Internet
What is computer crime?
Computer crime us relatively risk free, compared to crimes
such as bank robbery which might involve murdering of human. And yet it can
often escape detection. Furthermore, due to computer processing speed and data
communications, large amounts of money can be quickly stolen or diverted with
the right know-how and equipment. Computer Crime in the recent world involve of
wide range of categories, such as introducing Viruses, Stealing Credit Card
Numbers from online systems, and crashing Websites. The computer crimes have
causes more than 10 Billion USD lost in the European countries. Even with
policies in place, computer crimes can occur in an organization.
How computer being as a
Tool to Commit Crime?
Computers can be used to access valuable information or steal
funds. Individuals need to know how to gain access to the target computer
system and know what to do to the system to achieve their objectives. Often,
criminals gain the critical computer passwords or access codes needed simply by
talking to employees. This is what we called the “Social Engineering”.
How to Prevent from
Computer Crime?
Installed Firewalls in the computer. Firewall can help secure
an organization’s information system from unauthorized external access. It is
very important for organizations to develop and enforce effective Internet
Security policies for all the employees. Many companies have taken steps to
fight computer crime such as BERJAYA University College of Hospitality (BERJAYA
UCH) has banned some unauthorized websites such as high potential forum (Crack
Code Forum USA).
Since preventing computer crime requires additional controls
on information systems, organizations must identify potential computer-related
crime, the consequences of that crime, and the cost and complexity of the
controls needed to protect against loss from the crime. Sometimes, the cost of the controls may
outweigh the potential for loss.
What is Privacy?
Privacy is the right to be out of public view or to be left
alone. With today’s information systems
and networks, the right to privacy has become a challenge (IBM, 2013). Data is continually collected and stored
about personal details and often transmitted over networks without the user
knowledge. Data collected normally will store inside countless database throughout
the world.
Right to Privacy
The Internet poses major privacy issues which majorly involve
private data about individuals is easily accessible, sometimes without
charge. The European Union has enacted
privacy legislation that applies to all firms doing business in Europe.
Although there is legislation before the U.S. Congress addressing Internet
privacy, US citizens and businesses are skeptical about government involvement.
The Online Privacy Alliance, a group supported by large companies such as
AT&T, Microsoft and Walt Disney, is developing a voluntary code of conduct
for Internet businesses to employ (US Department of Justice, 2013).
In conclusion, government has to play an important role in preventing the computer crime as well as the computer waste. Government can impose the new cyber laws to regulate the problem. However, government has to be careful when dealing with the cyber laws because every countries have different rules and regulations. International laws are much suitable for any country government to in use as it more accepted by most countries in the world.
References
Chiu.A.S (2007). The ethics of Internet Privacy.
IBM (2013). Protect Data Privacy. [online]. Availabe at http://www-01.ibm.com/software/data/optim/protect-data-privacy/
Isay.J (2002).
Director of Public Policy at DoubleClick, Inc. [online]. Available at http://www.doubleclick.net/company_info/press_kit/pr.00.03.02.htm
US Department of Justice. (2013). [online]. Available at
http://www.justice.gov/