Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
2 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Ethical Issues in Information Systems Technology Essay

Essay Instructions:

Choose one (1) ethics issue found within Chapter 4 of the Bidgoli textbook.
You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.
Write a two to three (2-3) page research paper in which you:
Summarize the issue that you have chosen.
Express your own opinion of, or position on, the issue that you have chosen.
Identify two to three (2-3) human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one (1) solution to address each problem in question. Provide a rationale to support your response.
Use at least three (3) quality references. Note: Wikipedia and other Websites do not quality as academic resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe how and why information systems are used today.
Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.
Explain how to secure information systems resources that focus on both human and technological safeguards.
Identify how to mitigate risks as well as plan for and recover from disasters.
Use technology and information resources to research issues in information systems.
Write clearly and concisely about management information systems using proper writing mechanics.

Essay Sample Content Preview:

Ethical issues in information systems
Name
Strayer University 
Date
 Background 
It is important to respect the privacy of internet and information system users this protects their rights, and especially the sensitive data, which is personal data that would result in discriminatory treatment that should not be made public. Freedom of speech is protected under the First Amendment, the Fourth Amendment protects against unreasonable search and seizure, while there are different federal statutes, which offer protection including the privacy Act of 1974. Configuring privacy settings and encryption, improves privacy protection and this targets unauthorized persons and manipulation by third parties.
Human and technological protective measures 
Configuring privacy settings helps protect personal life includes configuring personal online accounts are that information is only visible to the intended people. Similarly, when accessing personal information, it is necessary to ensure that the access points are secure since this would compromise privacy even when the accounts are configured (Sánchez & Viejo, 2017). For instance, making transactions using open Wi-Fi places one at a risk. If the visited sites have no encryption it is more challenging to protect safety since it is possible to track the users’ online activities and this is especially when there is no configuration of privacy in the online accounts.
 Websites ought to encrypt their information so that is private data and information is not disclosed or intercepted by third parties. When there is encryption web users have more confidence that their online information is protected.  Encryption protects protecting users’ rights, and this requires that both the sites and users focus on the encryption for sensitive data. However, the online users should also take measures’ like ensuring that they visit websites where the online forms are secure and where possible opt out of sharing information with third parties (Chen, Beaudoin & Hong, 2017).   When the encryption software are installed, this scrambles data making it harder for others...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!