Preview

Chapter 3 Information System

Better Essays
Open Document
Open Document
1958 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 3 Information System
CHAPTER 3

Describe the major ethical issues related to information technology and identify situations in which they occur.

Utilitarian approach. This action provides most goods benefit or least harm. This action usually happens in corporate action. The affected parties for example customers, employees, share holder and the community. CEO choose to promote ‘go green campaign’ so that this campaign will create an awareness through the staff about the importance of environment.

Rights approach. This action that is the one that best protects and respects the moral rights of the affected parties. Moral rights mean the right to make one’s own choices about what kind of life to lead. Most people acknowledge that every people deserved some moral rights. Every employee has their rights to voice out all the things that they are not satisfy with the management accordingly.

Fairness approach. Ethical actions that treat all human being equally or fairly based on some defensible standard. People believed that their salary should be paid to what type of work that they already done. For example, a clerk should be paid based on clerk’s salary and not with the manager’s salary.

Common good approach. Common good approach is interlocking relationship that underlie all societies. It emphasize the common condition that are important to the welfare of everyone. For example, system of law, health care and public educational system.

Describe any four (4) threats to information security and explain any two (2) methods of defense mechanism used to protect information systems.

Espionage or trespass. This thing occurs when unauthorized person attempt to gain illegal access to organizational information. It is important to distinguish between competitive intelligence and industrial espionage.

Information extortion. This this occurs when an attacker seal the information from a company. The perpetrator demands payment for not stealing the information, for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Discussion

    • 841 Words
    • 4 Pages

    One of the four approaches to solving ethical dilemmas by which ethical behavior is guided by respect for impartial standards of fairness and equity.…

    • 841 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    situation is the justice approach, it holds that moral decisions must be based on standards of…

    • 347 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The management information system helps the managers with reports by giving them access to the organisations Management information systems MIS: are the computer systems in an enterprise that provides information about its business operations. The management information system is the centrally coordinated system of a computer expertise and management, The MIS is the computerized database of financial information organizes and programed to produce regular reports on operations. At ICT4Students we use MIS to give feedback on our performance and are used to monitor the company as a whole oppose to separate departments so we can check the product sale levels and the rate of refurbishment of products. The MIS helps us to measure our progress to reach our goals.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ethics Paper--Bailout

    • 1783 Words
    • 8 Pages

    The Rights Approach focuses on protecting and respecting the moral rights of entities affected by an ethical situation or dilemma. The approach says that each human being…

    • 1783 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Moral-Rights approach- ethical concept that moral decisions are those that best maintain the rights of those people affected by them.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Numerous problems can arise in a society which emphasizes both individual rights and the common good because the two goals are often conflicting in nature. Everyone desires individual rights, but to protect the common good a social contract must be in effect. This means that some personal rights must be sacrificed for the good of the community. The natural rights philosophy considered the rights of the individual to be of primary…

    • 592 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information system

    • 3772 Words
    • 32 Pages

    According to the graph below, if a country is currently producing at point X, the opportunity cost of producing another consumer good is…

    • 3772 Words
    • 32 Pages
    Good Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    Accessing data within an organization on a regular basis is much easier with the help of an insider, and security firms are reporting an increase in the number of data breach incidents that can be linked to an insider who has been coerced by the hackers into co-operating.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Taking money, goods or property without permission. This can include theft, fraud, exploitation or putting pressure on someone to make a will, transfer the ownership of property or carry out other financial transactions.…

    • 419 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The principle of rights says that people have a dignity based on their ability to choose freely what they do with their lives. On the basis of such dignity, they have a right to pursue freedom of speech, choice, happiness, and self-respect. It is a fairly common belief that these rights imply duties, and in…

    • 645 Words
    • 3 Pages
    Good Essays