Part 10: MIS Security and Ethical Issues

MIS(Management Information System)

Security and Ethical Issues

Security of an Information System

Information system security refers to the way the system is defended against unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

There are two major aspects of information system security:

  • Security of the information technology used – securing the system from malicious cyber-attacks that tend to break into the system and to access critical private information or gain control of the internal systems.
  • Security of data – ensuring the integrity of data when critical issues, arise such as natural disasters, computer/server malfunction, physical theft etc. Generally an offsite backup of data is kept for such problems.

Guaranteeing effective information security has the following key aspects:

  • Preventing the unauthorized individuals or systems from accessing the information.
  • Maintaining and assuring the accuracy and consistency of data over its entire lifecycle.
  • Ensuring that the computing systems, the security controls used to protect it and the communication channels used to access it, functioning correctly all the time, thus making information available in all situations.
  • Ensuring that the data, transactions, communications or documents are genuine.
  • Ensuring the integrity of a transaction by validating that both parties involved are genuine, by incorporating authentication features such as “digital signatures”.
  • Ensuring that once a transaction takes place, none of the parties can deny it, either having received a transaction, or having sent a transaction. This is called ‘nonrepudiation’.
  • Safeguarding data and communications stored and shared in network systems.

Information Systems and Ethics

Information systems bring about immense social changes, threatening the existing distributions of power, money, rights, and obligations. It also raises new kinds of crimes, like cyber-crimes.

Following organizations promote ethical issues:

  • The Association of Information Technology Professionals AITPAITP
  • The Association of Computing Machinery ACMACM
  • The Institute of Electrical and Electronics Engineers IEEEIEEE
  • Computer Professionals for Social Responsibility CPSRCPSR

The ACM Code of Ethics and Professional Conduct

  • Strive to achieve the highest quality, effectiveness, and dignity in both the process and products of professional work.
  • Acquire and maintain professional competence.
  • Know and respect existing laws pertaining to professional work.
  • Accept and provide appropriate professional review.
  • Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis and possible risks.
  • Honor contracts, agreements, and assigned responsibilities.
  • Improve public understanding of computing and its consequences.
  • Access computing and communication resources only when authorized to do so.

The IEEE Code of Ethics and Professional Conduct

IEEE code of ethics demands that every professional vouch to commit themselves to the highest ethical and professional conduct and agree:

  • To accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment;
  • To avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist;
  • To be honest and realistic in stating claims or estimates based on available data;  To reject bribery in all its forms;
  • To improve the understanding of technology, its appropriate application, and potential consequences;
  • To maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations;
  • To seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others;
  • To treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin;
  • To avoid injuring others, their property, reputation, or employment by false or malicious action;
  • To assist colleagues and co-workers in their professional development and to support them in following this code of ethics.

 

0 Comments

You may find interest following article

Chapter 4 Relational Algebra

Relational Algebra The part of mathematics in which letters and other general symbols are used to represent numbers and quantities in formula and equations. Ex: (x + y) · z = (x · z) + (y · z). The main application of relational algebra is providing a theoretical foundation for relational databases, particularly query languages for such databases. Relational algebra...

Chapter 3 Components of the Database System Environment

Components of the Database System Environment There are five major components in the database system environment and their interrelationships are. Hardware Software Data Users Procedures Hardware:  The hardware is the actual computer system used for keeping and accessing the database. Conventional DBMS hardware consists of secondary storage devices, usually...

Chapter 2: Database Languages and their information

Database Languages A DBMS must provide appropriate languages and interfaces for each category of users to express database queries and updates. Database Languages are used to create and maintain database on computer. There are large numbers of database languages like Oracle, MySQL, MS Access, dBase, FoxPro etc. Database Languages: Refers to the languages used to...

Database basic overview

What is DBMS? A Database Management System (DBMS) is a collection of interrelated data and a set of programs to access those data. Database management systems (DBMS) are computer software applications that interact with the user, other applications, and the database itself to capture and analyze data. Purpose of Database Systems The collection of data, usually...

Laravel – Scopes (3 Easy Steps)

Scoping is one of the superpowers that eloquent grants to developers when querying a model. Scopes allow developers to add constraints to queries for a given model. In simple terms laravel scope is just a query, a query to make the code shorter and faster. We can create custom query with relation or anything with scopes. In any admin project we need to get data...