Friday, May 10, 2019
Managing Information 2 Essay Example | Topics and Well Written Essays - 1500 words
Managing Information 2 - Essay practice sessionAs a result there are a number of IT-related issues that have arisen in the upstart past some of them are discussed herein after. IT-related Issues Protecting randomness confidentiality certainly ranks among the most pressing IT-related issues. This relates to how an breeding professional or any other person who has entrance fee to privileged information should treat it and clench it to ensure it does non get into the wrong hands and become detrimental to others (Strassman, 2000). It is therefore logical that information presented as confidential should be treated as such. A lot of people are infallible to provide their personal information such as full names, residence, age, gender, social security number, personal designation card numbers and a lot of other private information when applying for credit cards, visas and other levelheaded documents if not supervised with the required confidentiality this information can be used by fraudsters and impersonators to siphon cash from the unsuspecting public. An information technology professional should ensure that confidential information is handled with confidentiality. For instance, by not tapping other peoples phones or conducting surveillance that intrudes the privacy of others. The other issue is privacy. Traditionally, everyone is legally entitled to reasonable privacy. Under the privacy rights a person is entitled to reasonable secrecy, anonymity and solitude (Payne and Landry, 2006). Anonymity guarantees that the person is not subjected to undesired assist secrecy ensures that personalized information is not distributed to other people who are not privy to it term solitude seizes one to physically be away from other people. This has not changed even in the incline of the fast changing technological environment. These days, with the closed circuit television cameras, one can gain access into another persons private life and know every little detai l of it. The predicament arises when determining whether it is ethical and legal to do so (Davis, 2010). The determination is however not easy as the subject is complex and multifaceted and depends on the circumstances or the environment. For example, there are countries that will allow the infringement of privacy rights for the purpose of national security. At the same time there are proponents that implore that ones privacy rights should never be violated for any reason. Information professionals are mandated to handle privileged information. With this privilege comes a responsibility that of ensuring that that information does not cause vituperates in their way of creation, organization, spreading and use (Jana, 1998). The ethical and moral codes governing human conduct should be observed. This information need not necessarily affect individuals directly they may affect a countrys security or economy. A case in point is that of Julian Assange, the editor of WikiLeaks who rele ased classified information of different countries to the public. Assange is an informational locomotive engineer and an accomplished computer programmer. He got in possession of some sensitive information, some that directly repair on the national security of the US yet he went ahead to disseminate that information without considering the harm it could do (Burstein, 2012). IT innovation has enabled rapid dissemination of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.