Information Systems - Cybersecurity, Employees, and Ethics
Running head: EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 1
Employees, Cybersecurity, and Ethical Concerns
Kyami Clarke
University of Maryland University College
Written Assignment 5 | Paper C1
IFSM 304 7982 Ethics in Information Technology (2188)
Professor Linda Beach
Fall 2018
EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 2
Introduction
Online media is always tied in with keeping up the security of its clients, yet the
organizations that utilize individuals check the profiles of their client and break the code of
ethics. Online networking mirrors a person's identity and demonstrates his exercises to his or
her devotees. Web-based life sites like Facebook, Twitter and Instagram guarantee that they
keep people's data undisclosed. It is anything but a mystery that individuals' ID's get hacked
each day. It incorporates the businesses checking a person's online account before employing
him or her. That also demonstrates an ethical dilemma.
The ethical piece of innovation is the most talked about section in the security of the
internet world. We do comprehend and concede that cybersecurity is essential and the
important one, and there is no bargain, yet the ethical part is additionally much essential.
Ethical values should not be ignored while keeping the cybersecurity intact.
Question 1: Is it secure to make online accounts for job search, where you enlist all of your
personal data that might be exploited?
As per a national review gathered information in the interest of Career Builder, these days
70% of the businesses utilize the strategy of Social Media Screening before the contracting of a
hopeful. It has been seen that this rate has ascended from 60% in 2017 and 11% in 2006 (Salm,
2017). Even though it is fundamental for employee recruitment, I cannot help contradicting the
idea of revealing personal online data to businesses. Employment contract arrangements should
not be based on an individual's personal online accounts.
Question 2: Organizations keep an eye on the social media activity of their employees. Is it
unethical or part of an employment contract?
EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 3
All stakeholders, employees, contractors and casual workers of the organization must all
adhere to this policy. All those affiliated to the organization and any third parties that make use of
the big data must comply with the policy. This policy will apply to all disciplines that in one way
or the other are linked to big data. The cradles of big data, the categories and the pre-defined
roles of the concept’s managers should as well comply with this law.
Question 3: Is it ethical to use workers social media account for marketing purposes, by the
organizations?
Numerous organizations require the consistent, coordinated effort of web-based life for their
client and deals administrations. Organizations screen the exercises of a worker via web-based
networking media might be acknowledged whether it depends on the accompanying reasons:
• Promotions of items: Employers guide the workers to advance an item on their online
social media account and pay them for it.
• Interaction with clients: Some workers are requested to connect with clients acting like
different clients, and commending their item. All of these exploitation tactics though fall
under marketing but against the ethical code and conduct.
Reviewing the Literature:
Ethical Laws for IT Security Professionals
Jan Kietzmann (2011) uncovers that there are a few codes presented for the data innovation
experts, which denies them from getting to fundamental information of the general population
and associations. As a rule, there is one code for moral contemplations utilized in the data
innovation division, named ACM code of ethics that restrict information sharing or breaking of
somebody's protection. The ACM code of ethics is one sort of contract that abrogates all long
range interpersonal communication spillages and offers different fundamental tenets and
EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 4
directions which educates the IT experts from any specialized offense which goes into any
individual's private circle. Other than that, ACM code likewise forbids the data innovation
experts that they ought not to distribute the data which is marvelous for somebody, without the
endorsement of the concerned individual (Kietzmann, 2011).
Jan Kietzmann (2011) uncovers another sanction of principles and directions for
information security that works under the IEEE code of ethics. The ten points constitution
endorsed in the IEEE arrangement of guidelines and regulations, ensure that nobody can
misuse the private information of somebody and extort him/her. This code likewise applies to
Information technology innovation and information security experts. This proposed
declaration was made all-inclusive by the world's most strong specialized proficient
affiliations and organizations for the advancement of innovation (Kietzmann, 2011).
I do agree with the point of view that large information applications are more inclined to
security dangers that are now and then identified with their representatives ideally the data
innovation experts who are in charge of the information security and approach the
information.
The cybersecurity experts should make themselves bound to ethical benefits of utilizing
the innovation. We have two particular codes as made reference to above, i.e., the ACM code
of ethics and direct, and the IEEE code, that control us well and shows us how to manage the
innovation and keep ourselves from any unfortunate behavior or bad behavior that can hurt
any individual or enters in the security of somebody. We should not utilize the Facebook or
any email account if somebody left open while leaving the recorded login-in.
The key is to make progress toward harmony between regarding a worker's entitlement to
security outside the organization yet at the same time keeping up a feeling of responsibility
EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 5
with regards to their particular employment inside the organization. A protection approach ought
to be set up to plot the components of the representatives' rights when it comes to web security.
Protection of Employees Data
We should give the most significance to the data security and innovative ways to keep
external factors from abusing information
Intermediary ensures the personality of a PC by keeping all the online information safe and
by making the client entirely unknown for the entire universe of the web. They are anything but
challenging to introduce also. They are best for youths since adolescents are incredibly aware of
their security via web-based networking media nowadays. Hacking (for different intentions) is
one reason why private intermediaries are favored by adolescents nowadays (Treem & Leonardi,
2016).
Security on the web is an industrious issue for IT experts. Work environment web protection,
adds another layer to an officially complex issue. There is too such an extent vagueness
encompassing what employers are and are not permitted to do when it comes web protection.
With ambiguous rules for work environment web security, it is fundamental to investigate and
talk about the structure for dealing with legitimate work environment web-protection approaches
ahead of time (Yedav, 2017). This will require IT, experts, to accept more prominent
accountability with regards to IT-related moral choices. It is essential to keep an expansive
outlook when settling on moral and ethical decisions.
Cybersecurity cannot be compromised, but Ethical values must be upheld
Shinder (2005) featured the issue with the reality, that it is a noteworthy problem in the
Information technology, since the experts who are in charge of the security of a technology,
regardless of whether it is an industry or business undertaking, doctor's facility or instructive
EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 6
foundation all over, can get to the information. That information can be an association, ace or
individual. It is an exploitative demonstration and safety efforts must be taken against it.
The Social Media sites must take more prominent measures to anchor the security of
individuals (Fogel & Nehmad, 2009). The ethical part of the innovation is the most talked about
element in the security of computer and Information technology. We do comprehend and concede
that the security of the internet web and social media is essential and there is no trade-off, yet the
ethical part is additionally much vital. The entrance to information makes a doubt which cannot
be dismissed. We have such vast numbers of models. There are cyber-attacks on the different
organizations and corporations, which is, apparently, a significant worry for everybody,
particularly the super ventures or the associations which manage national security. In this
manner, the data innovation security experts are more in charge of separating themselves from
access to the private information of individuals and associations.
Shinder (2005) depicted the hazard factors in the web-based social networking utilization
and said that the time spent by the clients of long-range informal communication sites is
probably going to confront various system components since the probability of information
sharing is expanded very and it is most extreme worry of today that how to anchor data while
being on the web on the interpersonal interaction sites. Other than that, there is an extensive
rundown of such occurrences where individuals are extorted based on their released private
data, and some of the time the banks and budgetary organizations confront the similar
dilemma.
EMPLOYEES, CYBERSECURITY, AND ETHICAL CONCERNS 7
References
Fogel, J., & Nehmad, E. (2009, January). Internet social network communities: Risk taking, trust,
and privacy concerns. Computer in Human Behavior, 25(1), 153-160. Retrieved from
https://www.researchgate.net/publication/2901092153_Internet_Social_Network_Commu
nities_Risk_Taking_Trust_and_Privacy_Concerns.
Kietzmann, J. H. (2011, January 5). Social Media ? Get serious ! Understanding the functional
building blocks of social media. Business Horizon, 54(3), 241-251. Retrieved from
https://doi.org/10.1016/j.bushor.2011.01.005
Shinder, D. (2005, August 2). Ethical issues for IT security professionals. Retrieved October 5,
2018, from Computerworld:
https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-
professionals.html
Treem, J. W., & Leonardi, P. M. (2016, May 18). Social Media Use in Organizations: Exploring
the Affordances of Visibility, Editability, Persistence, and Association. Annals of the
International Communication Association, 36(1), 143-189. Retrieved from
https://doi.org/10.1080/23808985.2013.11679130
Yedav, N. (2017, February 17). Technology as a threat to Privacy: Ethical Challenges to
Technology Professions. Retrieved November 1, 2018, from LinkedIn Pulse:
https://www.linkedin.com/pulse/technology-threat-privacy-ethical-challenges-profession-
neetu-yadav/
- Introduction