Ethical Issues In Information Systems Privacy

This essay seeks to identify the ethical, communal, professional and legal issues relevant to public media. It is a literature review that will show some of the main element issues in both level of privacy and security subject matter matters. It is divided into several parts and begin, it will present what cultural media is as well as point out some of the issues that users have had regarding the use of sociable media. It'll then make clear the ethical, social professional and legal issues related to the utilization social press. The article will mainly be concentrating on social networking and can present balanced overview of a few of the opposing perspectives of the problems presented. To summarize, the article will echo critically on these various perspectives, examine some of the main element issues that have been presented and propose some appropriate solutions or programs of action from the perspective of an ethical IT professional.

Social Media addresses many aspects such as, sites, videos, podcasts, debate forums and social networking and the key stakeholders of public media include: developers, developers and whoever has access to a pc and a network. This aspect that'll be covered is public networking. Social media marketing may have several advantages such as keeping in touch with friends, individuals and coworkers enabling open communication which can lead to improved information discovery and distribution. For businesses, it can improve business reputation and may also gain a big target market with reduced use of advertising.

An interesting quote from Klepic (2010), a blogger, journalist and public multimedia innovator who uses a reasonable method of convey how sociable media impacts our daily lives, states that "what goes on in Vegas remains in Vegas, what goes on on twitter stays on Google forever. " This implies that this social media consumer or stakeholder has used cultural mass media and has been damaged because of it. Nowadays, websites that no more exist have articles extracted from them and are being employed by other websites to show to the general public. Regarding social media, personal privacy is obsolete as users and stakeholders of social networking websites and blogs, no more have any kind of confidentiality when they post pictures, videos and content of themselves on the internet in general. Another interesting price from a communal media end user called Christian Hollingsworth (2011) stated that "Years ago, before Gravatars even been around, I'd 'fill' my blog remarks. What I'd do is use a few of my different email addresses, and post reviews on blogs with pen (fake) brands. I thought I had been rather tricky. A few months ago I had been looking through old blogs on some old sites, and found that those reviews now possessed Gravatar images attached. And behold, these were all images of me! Because of my Gravatar bank account now linking to prospects email addresses. " This cultural media end user or blogger was harmlessly submitting responses on other sites using fake brands for privacy reasons and was later found that due to a online social media application, an image of him was uploaded next to all or any his previous blog posts. The application form or website didn't mention that his old content were going to acquire images of himself posted right next to his feedback and therefor his to privateness has been violated. Most of the public are employing social mass media such as twitter and Facebook and also have no knowledge on where or how their personal information is being shared.

Legal Issues

This section protects any questions which have any concerns on the safety that regulations provide regarding cultural media. The guidelines and legislations that we will be looking at is the uk Laws (UK Regulations) that help protect a person's privateness and security protection under the law and support ideas and ideas on privacy and security. In the Data Protection Action (1998) under Section 55 it suggests that "it can be an offence to knowingly or recklessly obtain, disclose or procure the disclosure of private information minus the consent of the info controller. " Which means that a person is prohibited to obtain another person's personal information, which includes information such as name, home address and time, and expose it without the consent of this person. This applies to the use of social press as this principle reaches stake. A person might access someone else's personal information through sites, for instance, and obtain his / her name or home address and expose it to others with no consent of this person. THE INFO Protection Action (1998) claims that if organizations were to gather or share a person's information, they need to use it pretty and the person has the to know whether an organization has accumulated information about them and to whom they distributed it with. This includes any information that is obtained from sociable mass media websites which is stated in THE INFO Commissioner's Office (ICO) which is the UK's indie authority.

Facebook, the interpersonal networking website, was sued anticipated to sharing personal information of people, such as their brands, to third-party software makers without their consent or authorization in later 2012 (Essers, 2012). The third-party applications, that have been running through Facebook's Application Center, accessed chat logs of several users on Facebook and gained their private information with no consent of the users. The first hearing occurs in the summer of 2013. The Data Protection Work (1998) is threatened as the interpersonal networking website benefits personal information using their company users and shares these to third-party application manufacturers with no users' consents. Because of wrongfully sharing personal information, users have sued Facebook.

The Computer Misuse Work (1990) under Section 1: "Unauthorized Usage of Computer Material, " Section 2: "Unauthorized Gain access to with Intention to Commit or Facilitate Fee of Further Offences, " and Section 3: "Unauthorized Improvements of Computer Materials, " the key points are threatened. These parts of the Computer Misuse Act (1990) all package with the offence of hacking with or without the intention to commit serious offense such as fraud. In the case of social media, it is an offence to work with an individual's account to get unauthorized access to communal networking sites and computers to gain, talk about and change private information. Social networking websites can even be hacked and used to hack into computer systems to gain private information such as mastercard information just by taking a look at the purchases one has manufactured in Facebook for occasion.

Another principle like the Computer Misuse Function (1990) is stated in the Government Decree-Law no. 5 (2012), that was first granted in the United Arab Emirates, under Article 10 regarding 'hacking. ' This article states that there surely is a penalty for "whoever willfully and without authorization goes a software on the computer network or an electric information system or any information technology means, and caused them to avoid performing or being impaired, or resulted in crashing, deletion, omission, devastation of the program, system, website, data or information. " Which means that there's a consequence for an individual to hack into another person's computer program or systems (ex lover. Facebook or Message boards) and change or delete any information that belongs compared to that person. This standard is threatened as people can gain access to website applications and adjust or delete any system or information located on the network. This should not be done as there may be a large penalty for starting such immoral conducts.

Another principle that could be on the line is the Computer, Designs and Patents Take action (1998). This process or take action illustrates the penalties of wrongfully posting or transferring copyrighted information to other folks. It is unlawful to share information such as music, which does not belong to a person, without the consent or agreement of the dog owner. Social media can be easily used to share and copy data and information, often copyrighted information, such as music, training video and even images. Napster, a free of charge music sharing network, needed to be shut down anticipated to copyright in 2001. Peer-to-peer programs and applications can be considered part of SOCIAL NETWORKING as individuals can connect between one another through their computers. Napster was sued credited to posting music freely with no authorization of the owners and due to the lawsuit it was shutdown (McGuinn, 2000).

Ethical Issues

The ethical issues that come to mind when social mass media is present is that social media may be used to distributed distasteful information such as racism, hatred, assault and even intimate material. Organizations can send rubbish or chain letters that most individuals do not want. This can be related to the Individuals Rights Take action (1998) under Section 8 where it states that "everyone has the right to respect for his or her private and family life, home and correspondence. " To put it simply, this means that everyone has the right to privateness. Privacy is an ethical rule that reaches stake as it pertains to the utilization of social mass media as social networking websites can be used to invade the level of privacy of others. Personal privacy has several meanings depending on someone's values, culture and even religious beliefs and therefore different perspectives plays an enormous role. However, most regulations define privateness as the condition or quality to be free from being observed or seen. It is also the state of being free from information distributed from other folks, whether its co-workers, friends or even family. We as individuals value the need of space and level of privacy and therefore it can be an important aspect inside our daily lives. Joseph (2007: 109) state governments that 'in the info age, the worthiness of privacy has been eroded. We are able to no longer promise our privacy. ' Our right to personal privacy is violated when working with social media. Regarding the utilization of social advertising, the Human Protection under the law Take action (1998) is threatened due to the fact an individual's right to level of privacy can be susceptible as people can obtain other individuals information and pass on distasteful materials about them to other people or organizations. In fact, dispersing distasteful information is principally done through social networking websites.

"It really is an offence to create reports, pictures or reviews associated with the secrets of someone's private or family life or even to use another person's 'magic formula' for your own, or somebody else's, advantage minus the consent of the individual to whom the 'key' relates, " (Garrod & Smith 2011). An ethical principle very much like The Human Privileges Take action (1998), in the United Arab Emirates people have their right to privacy and there's a penalty for publishing distasteful or private information on a person to the public.

The principle of integrity can be violated as the security of a person can be threatened. Security can be defined as the state of being completely safe from any sort of hazard. As individuals we value the need of security in particular when it comes to using the internet as there are many risks of using social networks or sites such as hacking. A person's security maybe threatened when working with social media due to the fact that his / her private information such as credit card information may be stolen. Information technology performs a huge role on various kinds security which might include: Computer Security, Data Security, Request Security, Information Security and Network Security and all of these can be threatened by Malware/Adware, Viruses, Spam and Information Robbery. These hazards to security and it can be used to secretly access some type of computer system with no owner's informed consent to perform hostile, intrusive or irritating actions.

Another ethical problem of social media is false reports and acquisitions. In June of 2009 when the pop legend Michael Jackson died there were unsubstantiated reports stating that the acting professional Jeff Goldblum acquired also passed away and the record pass on onto many people and that is when the ethics of sociable media were examined. Matching to Dodson (2009) most people thought it was a safe rumor but in Australia, Channel 9 news put in almost two minutes in its show growing this information to the general public, declaring that it was a tragedy. This whole story was a hoax and was first posted via two interpersonal marketing websites; Facebook and Twitter. To place it in the perspective of others, some people could have though this as a joke while others could have taken this critically and think it was real. Which means that no everything online is true.

To understand SOCIAL WEBSITES and the honest issues that occur on individuals it's important to check out the two ethical ideas (Consequentialist and Deontological) and their opposing perspectives on a certain situation, a good example being a user's activity on YouTube. This person's activity can be looked at by other YouTube user's as well as non-YouTube user's, including feedback posted, videos viewed and videos submitted. The consequentialist theorist would claim that it is acceptable for other folks to see his activities as the deontological theorist would dispute that his to privateness is violated and it is wrong for folks to see his activities. It is important to comprehend whether level of privacy may or may not be violated with respect to the individual's theories or perspectives behind communal media.

Social Issues

Social issues are any manners or conditions a person could find undesirable. Social media marketing can have several unwanted effects on a person including sociable isolation; some people would rather see the internet playing video gaming and chatting online than having an actual social life outside the internet 'world. ' According to Goldsmith (2013), "witnessing friend's holidays, love lives and work successes on Facebook can cause envy and trigger feelings of misery and loneliness. " In cultural networking, most individuals only care and attention about how many 'loves' they have developed on their photos or posts as opposed to what really concerns which is who 'liked' their images or content. Another issue corresponding, to Yao (2012), is the fact that stalking becomes easy. To be able to seek out someone, all a person needs to do is search for their name online. Loneliness is another concern as people comment on their friends' web pages rather than yours. From the point of view of any social network end user, people only contact you if indeed they need some kind of assistance such as when they only want that you like their articles or images somewhat than having a standard friendly conversation. A person can feel lonely when they observe that their friends have been asked to a large gathering that that they had no idea about.

From the point of view of the non-social network customer, a person can feel that she or he does not exist to certain old people due to the fact that nowadays the main way of communication is through social networking websites such as Facebook or MySpace. Another issue is the fact some interpersonal networking users will speak to other users depending about how many friends they may have. The more friends a person has the more popular they become and therefor public interaction reaches an all-time high. Another concern can be the confusion of determining a friend. A report by Weiner (2009) shows that the traditional notion of a friendly relationship is trust, support as well as showing similar principles whereas on the social network a friend is someone who's website link a person has 'clicked' on. Inside a child's point of view and occasionally adults, they can be very competitive as they talk about how many friends they may have whereas the majority of these alleged social networking friends aren't actual individuals who share some kind of trust or show similar beliefs.

Of course form the point of the view of managers, experts as well as members, these issues are overlooked as their jobs are to solely market their products or carry out research and discover new information, for example, and don't bother with the social area of their life when using social networking websites.

Professional Issues

Organizations need to watch what employees publicly comment about their own organizations and employers. A good example would be that an worker working at an organization composed on his account on a public networking proclaiming that his job was tedious and unexciting. This person can be dismissed from the organization. Another example is the fact imagine if an unhappy worker makes a decision to complain in regards to a company and the products they make using public networking. Consumers might think before buying some of that company's products. There are also legal penalties if employees view and select offensive content on social networking websites as employers could be presented liable for failing woefully to protect personnel from enjoying such distasteful materials. The fines, legal costs and damage to the business's reputation can be extensive.

In the BCS Code of Do (2011) under Article 3 of the "Duty to Relevant Expert" it says that a person may "NOT disclose or authorize to be disclosed, or use for personal gain or to benefit an authorized, private information except with the authorization of your Relevant Authority, or as required by Legislation" and could "NOT misrepresent or withhold home elevators the performance of products, systems or services (unless legally bound by a work of confidentiality not to disclose such information), or take good thing about having less relevant knowledge or inexperience of others. " This is a direct correlation from what employees should never do to misrepresent their company. Which means that employees should never misrepresent their organizations in anyways. Networks can be easily used to do misrepresent an organization to the public as the information is being passed on to other folks quickly. That is also explained in the communal networking website Facebook under their Facebook Terms of Service (2012) under Article 5; "Protecting Other People's Privileges, " where it talks about that an specific cannot violate a person, including companies, to privacy and should never misrepresent said person in anyway. In Facebook's ONLINE PRIVACY POLICY under section 3: "Information you tell Third Parties, " it claims that "certain types of communications that you send to other users can't be removed, such as communications. " Through the perspective of your manager or owner of a business, this is often a threat to the business as employees can post distasteful information about the company to certain people and cannot remove or erase that information that can be a challenge as that information is actually there for the general public to see therefore presenting the organization an awful reputation.

From the point of view and perspective of a specialist individual or a supervisor and a social network professional, the use of networks should be encouraged to employees as it is a good way to market the organization and its own products as well as communicate with business partners; however the employees shouldn't misrepresent their company to the general public when using communal networking.

Another trivial professional issue, that may be taken seriously, can be an organizations bandwidth utilization. Software posts from networks such as Facebook might not exactly take up large amounts of bandwidth; however video tutorial links that are submitted on these websites may create issues for information technology administrators in a company as there's a cost to pay, especially in conditions of 'bandwidth-hungry' applications, when surfing around on the internet.


Codes and concepts are essential for the practice of sociable media. If every person didn't play fairly and also have any respect, credibility or decency, then there would be more laws and key points that might be much stricter than the existing laws as social mass media would be chaotic.

For businesses, social marketing is a problem as they need to take up and change the way they communicate, nonetheless they realize that sociable media can be considered a threat as staff can misrepresent or exhibit distasteful information about the organizations to the public. Every minute allocated to social media websites can expose and cause a risk to the security of a business. Organizations need to create limits and constraints with certain monitoring systems, concerning not offend an employee, to help reduce the discharge of any distressing information to the public. An ideal solution, yet not advised (never to indicate a lack of trust from the organizations to the employees), is banning any access to social mass media websites. For security reasons so that a basic guard, organizations must have an anti-virus software setup on each computer.

Social multimedia users must be sure that they don't, under any circumstances, release any personal or personal information on social press websites. Because of their security, they must ensure that they have the latest version of anti-virus software installed to their personal computers.


Though people know about their privateness and security threats, sometimes they choose to dismiss them. Social websites websites intensely encourage individuals to disclose information about them whatever the information is about. Sometimes even the brightest of intellectuals hand out information that they should not have. Today, almost the full society of the world has a account account on Facebook or Twitter and they enjoy the idea of communicating with their friends, families and coworkers online. Individuals must not forget that because they may have their 'own' account page they can only access, they need to know that whatever information is written on the internet, will most likely stay there forever.

  • More than 7,000 students prefer us to work on their projects
  • 90% of customers trust us with more than 5 assignments
submit a project

Latest posts

Read more informative topics on our blog
Shiseido Company Limited Is A Japanese Makeup Company Marketing Essay
Marketing Strength: Among the main talents of Shiseido is its high quality products. To be able to satisfy customers, the company invested a great deal...
Fail To Plan You Plan To Fail Management Essay
Management This report will concentrate on two aspects of project management, their importance within the overall project management process. The report...
Role of High-protein Diet in Weight Management
Nursing Structured Representation: Probably one of the most wide-spread and popular problems on earth is the weight problems that people is suffering...
Waste To Prosperity Program Environmental Sciences Essay
Environmental Sciences Urban and rural regions of India produce very much garbage daily and hurting by various kinds of pollutions which are increasing...
Environmental Studies Pollution Introduction Many people across the world can remember having walked on the street and seen smoke cigars in the air or...
Soft System Methodology
Information Technology Andrzej Werner Soft System Methodology can be described as a 7-step process aimed to help provide a solution to true to life...
Strategic and Coherent methods to Recruiting management
Business Traditionally HRM has been regarded as the tactical and coherent method of the management of the organizations most appreciated assets - the...
Religious Healthcare Organisation
Health Religious Health Care Introduction I help the firm of consulting. Spiritual HEALTHCARE of Middleville community have appointed us to identify and...
Enterprise Rent AN AUTOMOBILE Case Analysis Business Essay
Commerce With a massive network of over 6,000 local rental locations and 850,000 automobiles, Organization Rent-A-Car is the greatest rental car company...
Check the price
for your project
we accept
  • Visa payment system
  • MasterCard payment system
  • Payoneer payment system
  • PayPal payment system
Money back
100% quality