Ethics, Privacy and Information Security

 
In a 3 to 5-page APA formatted written report (and a minimum of six [6] peer-reviewed sources), address the following concepts by providing in-depth analysis and details:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Is monitoring of Web surfing by managers ethical? (It is legal.) Support your answer.
  • Is employee Web surfing ethical? Support your answer.
  • Analyze why are computer systems so vulnerable?
  • Analyze why should information security be a prime concern to management?

Mujtaba, B. G. (2003). Ethical implications of employee monitoring: What leaders should consider. 

This article provides a brief outlook on the reasons that favor the employers to monitor their workforce and how Cyberloafing has been affecting the productivity at workplace. It brings out valid considerations for why electronic monitoring seem beneficial for protecting company’s interests and privacy.

Alder, G. S., Schminke, M., Noel, T. W., & Kuenzi, M. (2008). Employee reactions to internet monitoring: The moderating role of ethical orientation

This Paper proposes that employees of an organization have generalized attitude towards the ways of monitoring and organization control activities. Employee monitoring has become very prevalent with the development of technology such that 82% of the employers engage in electronic monitoring in one form or other.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Ramayah, T. (2010). Personal web usage and work inefficiency. 

This Paper talks about a study conducted on employees about the personal use of internet during work hours and how it contributes to work inefficiency which in turn lead to major loss of productivity. I will use this article to talk about ethical aspect of employee web surfing.

Neray, P. (1997). Security on the internet: Is your system vulnerable?

Internet technology has a wide reach in our every day life starting from ordering our coffee to purchasing a car and staggering amount of data exchange happening every day. This article talks about the potential causes and prevention methods to protect our data.

Rossouw, v. S. (1998). Information security management (1): Why information security is so important. 

Information security should be the prime importance in any organization for its success and sustain in the market. This paper put up valid arguments why information security has that significance. Data like user authentication and identification and confidential product or research data has to be protected against cyber attacks.

Gorecki, A. T. (1994). Is your computer system sub-critical? 

This article talks about how miniscule things in computer systems can trigger a chain reaction that can cause a substantial damage. Computer systems can be either sub critical or super critical and could potentially result in software developers could potentially become maintenance programmers.

References

Alder, G. S., Schminke, M., Noel, T. W., & Kuenzi, M. (2008). Employee reactions to internet monitoring: The moderating role of ethical orientation: JBE. Journal of Business Ethics, 80(3), 481-498. doi:http://dx.doi.org/10.1007/s10551-007-9432-2

Gorecki, A. T. (1994). Is your computer system sub-critical? Journal of Systems Management, 45(2), 28. Retrieved from

https://search.proquest.com/docview/199823495?accountid=158986

Mujtaba, B. G. (2003). Ethical implications of employee monitoring: What leaders should consider. Journal of Applied Management and Entrepreneurship, 8(3), 22-47. Retrieved from

https://search.proquest.com/docview/203906969?accountid=158986

Neray, P. (1997). Security on the internet: Is your system vulnerable? Nursing Management, 28(7), 64. Retrieved from

https://search.proquest.com/docview/231375724?accountid=158986

Ramayah, T. (2010). Personal web usage and work inefficiency. Business Strategy Series, 11(5), 295-301. doi:http://dx.doi.org/10.1108/17515631011080704

Rossouw, v. S. (1998). Information security management (1): Why information security is so important. Information Management & Computer Security, 6(4), 174-177. doi:http://dx.doi.org/10.1108/EUM0000000004533

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP