You are on page 1of 3

SUMMARY OF THE ARTICLE:

The organizations that are using information technology in their business


have mach opportunity to connects and communicate to their customers,
employees and partners in a better way. During sharing information to
customers, employees and partners that organization must check the way
that is secure or not If the way of sharing information is not secure than the
organization may face so many problems.
Many of the students have fun on snooping the others emails, and so many
hackers hacks the others accounts to steel there business information or to
damage or steel their business information. And some businessmen steel
their competitors business strategies such as marketing plan, pricing
strategy etc and employees leaks information to others for getting revenge
from their owners and one of another misuse of Information technology is
by terrorists .All of these misuses of information technology is due to non
availability of a proper monitoring and controlling system and
unauthorized access to the system.
Today technology is considered as a blood to any organization but security
problems also arise due to advancement in IT. The big issue of information
system is rising of ethical problems for the individuals and the society also.
Due to information technology it becomes possible the distribution of tasks
among the workers but it provide opportunities for those workers to misuse
their power, rights, money and obligation.
Ethical issues raise due to unavailability of proper guidelines for their uses.
The development of information technology produce benefits for many but
cost for many also. The using of IT in business is not bad but it must be
secure but managing such business needs mutual coordination and security
tools that can be used to secure their business information from harmful
elements such as
1. Hackers.
2. Bad employees.
3. Competitors.
4. Criminals.
We can controlled these security problems by implementing those
technologies or tools and steps that can secure our business from internal
and external factors such as from hackers, employees that have been fired,
competitors etc. in this scenario we can controlled these by
 Using only licensed software
 Using IT if it is necessary
 We can hire hackers for check and balance
 By centralizing the data
 By providing ethical guidelines to workers.
The ethical problem can be controlled by providing proper guidelines about
information technology’s use and misuses .but it is not enough because
most of the organizations that are using information systems monitors and
controlled their employees personally. Due to these acts by organizations
individuals feels unsecure during chatting or using internet in this scenario
individual privacy also violated .According to a research 62% employers
monitor their employees, 83% are monitoring through internet policy etc.
Another violation of privacy occurs in this scenario because in most of
organizations of developing countries such as Pakistan and India transfers
their information from one place to another place during outsourcing in
this way individual privacy also violated by these organizations.Computer
crimes also increasing rapidly. What is computer crime? Computer crime
means unauthorized use, access destruction of software and hardware
.Management of information system can be done in two levels
1. Macro level.
2. Micro level.
At macro level we can manage our data security by using an international
accepted framework where the chances of frauds, hacking etc are controlled
by the security experts.
But at the micro level we can control these issues by using security tools to
minimize the chances of frauds and losses.
We can provide key passwords to only those we can be trust upon them in
other case we can centralized our data ones this policy is implemented then
we must conduct check and balance and check its effectiveness in this way
we can handle these problems efficiently.