Information Systems - Cybersecurity, Employees, and Ethics



Employees, Cybersecurity, and Ethical Concerns

Kyami Clarke

University of Maryland University College

Written Assignment 5 | Paper C1

IFSM 304 7982 Ethics in Information Technology (2188)

Professor Linda Beach

Fall 2018



Online media is always tied in with keeping up the security of its clients, yet the

organizations that utilize individuals check the profiles of their client and break the code of

ethics. Online networking mirrors a person's identity and demonstrates his exercises to his or

her devotees. Web-based life sites like Facebook, Twitter and Instagram guarantee that they

keep people's data undisclosed. It is anything but a mystery that individuals' ID's get hacked

each day. It incorporates the businesses checking a person's online account before employing

him or her. That also demonstrates an ethical dilemma.

The ethical piece of innovation is the most talked about section in the security of the

internet world. We do comprehend and concede that cybersecurity is essential and the

important one, and there is no bargain, yet the ethical part is additionally much essential.

Ethical values should not be ignored while keeping the cybersecurity intact.

Question 1: Is it secure to make online accounts for job search, where you enlist all of your

personal data that might be exploited?

As per a national review gathered information in the interest of Career Builder, these days

70% of the businesses utilize the strategy of Social Media Screening before the contracting of a

hopeful. It has been seen that this rate has ascended from 60% in 2017 and 11% in 2006 (Salm,

2017). Even though it is fundamental for employee recruitment, I cannot help contradicting the

idea of revealing personal online data to businesses. Employment contract arrangements should

not be based on an individual's personal online accounts.

Question 2: Organizations keep an eye on the social media activity of their employees. Is it

unethical or part of an employment contract?


All stakeholders, employees, contractors and casual workers of the organization must all

adhere to this policy. All those affiliated to the organization and any third parties that make use of

the big data must comply with the policy. This policy will apply to all disciplines that in one way

or the other are linked to big data. The cradles of big data, the categories and the pre-defined

roles of the concept’s managers should as well comply with this law.

Question 3: Is it ethical to use workers social media account for marketing purposes, by the


Numerous organizations require the consistent, coordinated effort of web-based life for their

client and deals administrations. Organizations screen the exercises of a worker via web-based

networking media might be acknowledged whether it depends on the accompanying reasons:

• Promotions of items: Employers guide the workers to advance an item on their online

social media account and pay them for it.

• Interaction with clients: Some workers are requested to connect with clients acting like

different clients, and commending their item. All of these exploitation tactics though fall

under marketing but against the ethical code and conduct.

Reviewing the Literature:

Ethical Laws for IT Security Professionals

Jan Kietzmann (2011) uncovers that there are a few codes presented for the data innovation

experts, which denies them from getting to fundamental information of the general population

and associations. As a rule, there is one code for moral contemplations utilized in the data

innovation division, named ACM code of ethics that restrict information sharing or breaking of

somebody's protection. The ACM code of ethics is one sort of contract that abrogates all long

range interpersonal communication spillages and offers different fundamental tenets and


directions which educates the IT experts from any specialized offense which goes into any

individual's private circle. Other than that, ACM code likewise forbids the data innovation

experts that they ought not to distribute the data which is marvelous for somebody, without the

endorsement of the concerned individual (Kietzmann, 2011).

Jan Kietzmann (2011) uncovers another sanction of principles and directions for

information security that works under the IEEE code of ethics. The ten points constitution

endorsed in the IEEE arrangement of guidelines and regulations, ensure that nobody can

misuse the private information of somebody and extort him/her. This code likewise applies to

Information technology innovation and information security experts. This proposed

declaration was made all-inclusive by the world's most strong specialized proficient

affiliations and organizations for the advancement of innovation (Kietzmann, 2011).

I do agree with the point of view that large information applications are more inclined to

security dangers that are now and then identified with their representatives ideally the data

innovation experts who are in charge of the information security and approach the


The cybersecurity experts should make themselves bound to ethical benefits of utilizing

the innovation. We have two particular codes as made reference to above, i.e., the ACM code

of ethics and direct, and the IEEE code, that control us well and shows us how to manage the

innovation and keep ourselves from any unfortunate behavior or bad behavior that can hurt

any individual or enters in the security of somebody. We should not utilize the Facebook or

any email account if somebody left open while leaving the recorded login-in.

The key is to make progress toward harmony between regarding a worker's entitlement to

security outside the organization yet at the same time keeping up a feeling of responsibility


with regards to their particular employment inside the organization. A protection approach ought

to be set up to plot the components of the representatives' rights when it comes to web security.

Protection of Employees Data

We should give the most significance to the data security and innovative ways to keep

external factors from abusing information

Intermediary ensures the personality of a PC by keeping all the online information safe and

by making the client entirely unknown for the entire universe of the web. They are anything but

challenging to introduce also. They are best for youths since adolescents are incredibly aware of

their security via web-based networking media nowadays. Hacking (for different intentions) is

one reason why private intermediaries are favored by adolescents nowadays (Treem & Leonardi,


Security on the web is an industrious issue for IT experts. Work environment web protection,

adds another layer to an officially complex issue. There is too such an extent vagueness

encompassing what employers are and are not permitted to do when it comes web protection.

With ambiguous rules for work environment web security, it is fundamental to investigate and

talk about the structure for dealing with legitimate work environment web-protection approaches

ahead of time (Yedav, 2017). This will require IT, experts, to accept more prominent

accountability with regards to IT-related moral choices. It is essential to keep an expansive

outlook when settling on moral and ethical decisions.

Cybersecurity cannot be compromised, but Ethical values must be upheld

Shinder (2005) featured the issue with the reality, that it is a noteworthy problem in the

Information technology, since the experts who are in charge of the security of a technology,

regardless of whether it is an industry or business undertaking, doctor's facility or instructive


foundation all over, can get to the information. That information can be an association, ace or

individual. It is an exploitative demonstration and safety efforts must be taken against it.

The Social Media sites must take more prominent measures to anchor the security of

individuals (Fogel & Nehmad, 2009). The ethical part of the innovation is the most talked about

element in the security of computer and Information technology. We do comprehend and concede

that the security of the internet web and social media is essential and there is no trade-off, yet the

ethical part is additionally much vital. The entrance to information makes a doubt which cannot

be dismissed. We have such vast numbers of models. There are cyber-attacks on the different

organizations and corporations, which is, apparently, a significant worry for everybody,

particularly the super ventures or the associations which manage national security. In this

manner, the data innovation security experts are more in charge of separating themselves from

access to the private information of individuals and associations.

Shinder (2005) depicted the hazard factors in the web-based social networking utilization

and said that the time spent by the clients of long-range informal communication sites is

probably going to confront various system components since the probability of information

sharing is expanded very and it is most extreme worry of today that how to anchor data while

being on the web on the interpersonal interaction sites. Other than that, there is an extensive

rundown of such occurrences where individuals are extorted based on their released private

data, and some of the time the banks and budgetary organizations confront the similar




Fogel, J., & Nehmad, E. (2009, January). Internet social network communities: Risk taking, trust,

and privacy concerns. Computer in Human Behavior, 25(1), 153-160. Retrieved from


Kietzmann, J. H. (2011, January 5). Social Media ? Get serious ! Understanding the functional

building blocks of social media. Business Horizon, 54(3), 241-251. Retrieved from

Shinder, D. (2005, August 2). Ethical issues for IT security professionals. Retrieved October 5,

2018, from Computerworld:


Treem, J. W., & Leonardi, P. M. (2016, May 18). Social Media Use in Organizations: Exploring

the Affordances of Visibility, Editability, Persistence, and Association. Annals of the

International Communication Association, 36(1), 143-189. Retrieved from

Yedav, N. (2017, February 17). Technology as a threat to Privacy: Ethical Challenges to

Technology Professions. Retrieved November 1, 2018, from LinkedIn Pulse:


  • Introduction