Sunday, October 4, 2009

Ethical Issues for Information Technology(IT) Users!!!

Ethical Issues for Information Technology(IT) Users!!!

This article discussing most common ethical issues dealing with the use of Information Technology (I.T.). The software piracy, Unethical use of Computing Resources and Unethical sharing of information .

What is software piracy, it is the act of illegally making copies of software or enabling others to access software to which they are not entitled. Software piracy in a business setting can be directly traceable to I.T professionals, they might allow it to happen or they actively engage with it. Sometimes the one who commit software piracy are the I.T users. A common violation done when the user copy software for backup. However, this is still a piracy if no one had paid for another license to use as a backup or on the others means.

What is Unethical use of Computing Resources and how this was occurs. This was done when some employees use’s their computers to surf on web sites that have nothing to do with their jobs, participate in the chat rooms during working hour, view pornographic site and playing computer game during office hours. These activities can reduce production of the work force or consume away at worker productivity and waste of time. Furthermore, viewing of sexually explicit materials and other related topics can encourage those people who is behind these production. And how the companies handled this kind of activities? Most companies handled the problem by firing the offenders or taking disciplinary actions.

What is Unethical Sharing of Information? How this was occurs and who is behind them? Vast amount of data or information can be classified either private, confidential or public by an organization who owe it. Private data is classified or describe individuals information for example, health records, salary information, bank account data and a lot more. Confidential information classified as, building blueprint, company or organization operation, strategic and tactical plan, etc. Public information include are they information that is posted and free to view public example ads. The unethical sharing of information occur when an I.T. user shares the information without authorizations. These is commonly violated privacy of an organization, company or an institutions.

3 comments:

  1. That first part was interesting because I have always assumed that I.T. users always had authorization to backup their software. But I guess not all of them are going to have licenses.
    Also that second part about the workers using computer for other purposes during shift hours was interesting. I guess I got my perception of office workers from movies and TV. They seem to always be playing solitare instead of working. But I didn't realize that it was wrong (just the playing games thing, not the porn), if they finished their work early. But I guess they should ask permission, or get ahead on the next days work.
    This blog made some intersting points that I sort of new in the back of my head, but never actually thought about.

    ReplyDelete
  2. Paid phone search services usually go with access to unlimited lookups, discounted background and cell phone reports, and an advanced People Search. You can use the peop search application to find old classmates, long lost relatives, or former co-workers. https://businessbooks.cc/your-next-five-moves/

    ReplyDelete
  3. Thank you for another great article. Where else could anyone get that kind of information in such a perfect way of writing? I have a presentation next week, and I am on the look for such information. premium notebooks to buy in Singapore

    ReplyDelete