You are on page 1of 22

BBDM2023 BUSINESS

ETHICS
LECTURE 9
BUSINESS ETHICS AND INFORMATION TECHNOLOGY
INTRODUCTION

 Information technology (IT) is the use of any computers, storage, networking


and other physical devices, infrastructure and processes to create, process,
store, secure and exchange all forms of electronic data. Typically, IT is used in
the context of business operations, as opposed to technology used for personal
or entertainment purposes. The commercial use of IT encompasses both
computer technology and telecommunications.
 IT have a wide area of applications in education, business, health, industries,
banking sector and scientific research at a large level.
 With the leading advancement in information technology, it is necessary to have
the knowledge of security issues, privacy issues and main negative impacts of
IT. To deal with these issues in IT society it is important to find out the ethical
issues.
ETHICAL AND SOCIAL CONCERNS ON
INFORMATION TECHNOLOGY
 The growth and development of the Internet has made it possible to store a
large number of individuals’ personal data by relying on advanced information
systems and the abuse of personal data and privacy violations in the field of
information technology is increasing.
 The lack of scientific integrity in educational environments that make the
most use of technology is an issue that should be considered. Illegal
downloading of software is common among all social classes specially the
students. The use of social networks is an inseparable part of the lives of
many people and the nature of students. These cases have different effects
on their lifestyle, especially on their academic performance and the length of
their studies
ETHICAL AND SOCIAL CONCERNS ON
INFORMATION TECHNOLOGY
 On the other hand, the number of unethical sites is rising every day and the
conditions for access to these sites are easier than before and the mean age
of people who visit these sites is reduced.
 Being exposed to the unethical sites also has the dangers of high-risk sexual
behavior, social dilemmas and mental and psychological problems.
 Communicating with anonymous people and visiting them is increasing.
ETHICAL AND SOCIAL CONCERNS ON
INFORMATION TECHNOLOGY
 A large percentage of users are exposed to moral damages and IT
abnormalities, and having a virtual identity has become a commonplace cause
of many social abnormalities.
 The phenomenon of Internet addiction has long been considered in the
developed countries as one of the consequences of the ever increasing
development of the electronic communications network and has caused
various harms to the individual, family and society.
 The excessive use of social networks can lead to addiction and is not
tolerated by many physical communities. The theft of software, films, music,
etc. with copyrights has become common in some societies.
ETHICAL AND SOCIAL CONCERNS ON
INFORMATION TECHNOLOGY
 Unauthorized access to the systems (hacking) is done using different and new
methods and is increasing every day. Today hackers have posed the greatest
challenge against IT ethics and with a widespread violation, they make
numerous attempts to influence the commercial and banking accounts of
individuals and try to violate individuals’ privacy
 Many computer games are violent and stimulate aggressive antisocial behavior
in addition to violent thoughts and feelings.
ETHICAL AND SOCIAL CONCERNS ON
INFORMATION TECHNOLOGY
 Today, forging digital documents such as counterfeiting digital signatures,
digital images, etc. is an important topic in the field of information security
and computer ethics.
 Online gambling (using online websites where members can participate in a
variety of games without having to be present at the site, in which everything
is done online from opening an account to transferring funds, withdrawals,
playing games, etc.) is increasing.
ETHICAL AND SOCIAL CONCERNS ON
INFORMATION TECHNOLOGY
 Cases such as cyber bullying and communicating with anonymous individuals,
visiting them, sharing the stimulating content on the Internet, and sharing
personal information on the Internet have been recognized as the dangers of
Internet communications in the new era
SECURITY THREATS THAT AFFECT
INFORMATION TECHNOLOGY
 https://www.geeksforgeeks.org/threats-to-information-security/
 https://www.webroot.com/us/en/resources/tips-articles/computer-security-
threats
CURRENT ETHICAL ISSUES IN INFORMATION
TECHNOLOGY

Personal Access Harmful


Patents
privacy right actions

Trade
Copyrights Liability Piracy
secrets
 It is an important aspect of ethical issues in information
technology. IT facilitates the users having their own hardware,
operating system and software tools to access the servers that
are connected to each other and to the users by a network.
 Due to the distribution of the network on a large scale, data or
information transfer in a big amount takes place which leads to
the hidden chances of disclosing information and violating the
privacy of any individuals or a group. It is a major challenge for
IT society and organizations to maintain the privacy and Personal

integrity of data.
Accidental disclosure to inappropriate individuals and provisions
Privacy
to protect the accuracy of data also comes in the privacy issue.
 PERSONAL DATA PROTECTION ACT (2010)
 https://globaldatahub.taylorwessing.com/article/data-
protection-in-malaysia
 The second aspect of ethical issues in information
technology is access right.
 Access right becomes a high priority issue for the IT and
cyberspace with the great advancement in technology. E-
commerce and Electronic payment systems evolution on the
internet heightened this issue for various corporate Access Right
organizations and government agencies. Network on the
internet cannot be made secure from unauthorized access.
Generally, the intrusion detection system are used to
determine whether the user is an intruder or an appropriate
user.
 Harmful actions in the computer ethics refers to the damage
or negative consequences to the IT such as loss of important
information, loss of property, loss of ownership, destruction
of property and undesirable substantial impacts.
 This principle of ethical conduct restricts any outsiders from
the use of information technology in manner which leads to
any loss to any of the users, employees, employers and the
Harmful
general public. Actions
 Typically, these actions comprises of the intentional
destruction or alteration of files and program which drives a
serious loss of resources. To recover from the harmful
actions extra time and efforts are required to remove the
viruses from the computer systems.
 It is more difficult to deal with these types of ethical issues.
A patent can preserve the unique and secret aspect of an
idea. Obtaining a patent is very difficult as compared with
obtaining a copyright. A thorough disclosure is required with
the software. The patent holder has to reveal the full details
of a program to a proficient programmer for building a
program. Patent
 Patents protect the novel features, processes, and
design of a system that powers an “app” rather than
just the underlying source code.
 Airbnb. Automated determination of booking availability
for accommodation listings.
 The information security specialists are to be familiar with
necessary concept of the copyright law. Copyright law works
as a very powerful legal tool in protecting computer
software, both before a security breach and surely after a
security breach. This type of breach could be the
mishandling and misuse of data, computer programs,
documentation and similar material. In many countries,
copyright legislation is amended or revised to provide Copyright
explicit laws to protect computer programs.
 copyright only protects the “exact” source code, and a
competitor may be able to circumvent the legal
protection of a copyright registration and avoid
infringement by making even minor changes to the
code they employ.
 Trade secrets is also a significant ethical issue in information
technology. A trade secret secures something of value and
usefulness. This law protects the private aspects of ideas
which is known only to the discoverer or his confidants.
Once disclosed, trade secret is lost as such and is only
protected by the law for trade secrets. The application of
trade secret law is very broad in the computer range, where Trade secrets
even a slight head start in the advancement of software or
hardware can provide a significant competitive influence.
 One famous example: Google’s search algorithm.
 One should be aware of the liability issue in making ethical
decisions. Software developer makes promises and
assertions to the user about the nature and quality of the
product that can be restricted as an express warranty.
 Programmers or retailers possess the legitimate to
determine the express warranties. Thus they have to be
practical when they define any claims and predictions about
the capacities, quality and nature of their software or
hardware.
Liability
 Every word they say about their product may be as legally
valid as stated in written. All agreements should be in
writing to protect against liability. A disclaimer of express
warranties can free a supplier from being held responsible
of informal, speculative statements or forecasting made
during the agreement stages.
 Piracy is an activity in which the creation of illegal copy of
the software is made. It is entirely up to the owner of the
software as to whether or not users can make backup copies
of their software.

Piracy
 As laws made for copyright protection are evolving, also
legislation that would stop unauthorized duplication of
software is in consideration.
 The software industry is prepared to do encounter against
software piracy. The courts are dealing with an increasing
number of actions concerning the protection of software.
MANAGING INFORMATION SYSTEM
SECURITY
 ISMS stands for “information security management system.” An ISMS
is a documented management system that consists of a set of
security controls that protect the confidentiality, availability, and
integrity of assets from threats and vulnerabilities.
 By designing, implementing, managing, and maintaining an ISMS, an
organization can protect its confidential, personal, and sensitive data
from being leaked, damaged, destroyed, or exposed to harmful
elements.
 The point of an ISMS is to proactively limit the impact of a data
security breach.
PROTECTION AGAINST CYBER CRIME:
MALAYSIAN LEGAL FRAMEWORK
 Under the Ministry of Multimedia and Communications (MCMC), CyberSecurity
Malaysia is established as a cyber security specialist agency to provide a broad range of
services and strengthen Malaysia’s self-reliance in cyberspace.
 The organisation assists enforcement agencies in cyber forensics and analysis, such as
analysing evidence and providing expert witnesses for relevant cybercrime cases.
 It also aims to establish a culture of security through awareness programmes and best
practices among children, teenagers, parents and organisations.
Besides CyberSecurity Malaysia, there are also multiple sub-organisations
and services provided to cater to Malaysia’s growing need for online security.
 There also exist many cyberlaws and policies such as the Computer Crime Act
1997 and the Communication and Multimedia Act 1998 that act as a
safeguard against cyber-criminal activities in the country.
 That said, with the rise in cybercrime cases, there is an urgent need for
proactive steps to tackle the crime.
 CyberSecurity Malaysia for example has highlighted the shortcoming of its
agency in the lack of cyber security professionals. Hence, universities are
urged to offer more courses and programmes to educate the public and
create awareness on cyber security.

You might also like