0% found this document useful (0 votes)
23 views14 pages

Group 4 - Ethics in SIM

Uploaded by

Heba Abdullah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views14 pages

Group 4 - Ethics in SIM

Uploaded by

Heba Abdullah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

GROUP 4.

KELEI DAVID CHOL K


J
QORI WAHYUNI

www.reallygreatsite.com
INFORMATION TECHNOLOGY (IT) TRANSFORMATION

IT is changing the way people live, work and


communicate. Businesses utilize IT for automation,
data management, and expanding market reach,
thereby reducing time and costs. Apart from
business, health, education, and public services
are also transformed by IT.

BENEFITS AND CHALLENGES OF IT:

While technology provides efficiency and


productivity, it also brings major challenges such
as data security, privacy, and social impact. These
risks include data security breaches, cybercrime,
and ethical issues involving individual privacy.
The use of technology brings various ethical dilemmas, especially those concerning the rights of individuals in
data privacy, security, and the social responsibility of organizations. Companies must be able to guarantee data
security, provide information to users, and ensure that technology is used for ethical and responsible purposes.

SECURITY IN INFORMATION TECHNOLOGY


IT Security Definitions and Concepts: Security in IT is the measures taken to protect data and systems from
unauthorized access, damage, or misuse. The main goal of IT security is to maintain the confidentiality, integrity,
and availability of information

IT SECURITY THREATS
Malware (Malicious Software): This malicious software includes viruses, worms, trojans, spyware,
and ransomware. Viruses are codes that are attached to programs or files and can corrupt data.
Worms can spread without the user's help, while spyware steals user information.
Ransomware: This attack encrypts user data, locks access, and demands a ransom to
unlock the data. Ransomware threatens large businesses as well as individuals as it
damages important data.
Phishing: Phishing attacks are carried out by posing as a trusted party through fake
emails or websites that ask for sensitive information, such as usernames, passwords, or
credit card numbers.
Hacking and Cracking: Hacking is unauthorized access to a system or network. Crackers
often commit criminal acts, such as stealing data or damaging systems for personal
gain or to make threats.
SECURITY MEASURES:

- Firewalls and Encryption: A firewall is a security system that controls network traffic based

on defined security rules. Meanwhile, encryption is the process of converting data into code to

prevent unauthorized access.

- Multi-Factor Authentication (MIFA): MFA is a layered verification process that uses a

combination of password, OTP (One-Time Password), or biometrics (fingerprint, facial

recognition) to ensure the user's identity.

- Employee Security Training: Train employees on threats such as phishing and the importance

of keeping information confidential. Employees are taught to recognize common attacks and

keep personal and company data confidential


SOCIAL AND ETHICAL IMPACTS OF INFORMATION TECHNOLOGY

POSITIVE IMPACT OF INFORMATION TECHNOLOGY:

- Operational Efficiency in Business: With IT, companies can automate time-consuming


business processes. For example, ERP (Enterprise Resource Planning) systems allow the
integration of various business functions, such as accounting, marketing, and human resources
on a single platform.
DATA-DRIVEN
- Innovation in the Healthcare Sector: IT enables telemedicine services that facilitate remote
INSIGHTS
consultations. In addition, electronic medical records provide doctors with easy access to
patient data, save time, and improve the quality of healthcare services.
- Distance Education: E-learning and video conferencing platforms provide access to learning
to people who cannot afford formal education. Learners can access materials anytime and
anywhere.
NEGATIVE IMPACT OF INFORMATION TECHNOLOGY:

- Unemployment Due to Automation: The use of automation technology results in a shift from
manual work to technology-based work, which reduces the need for human labor.
- Dependence on Technology: Over-reliance on technology increases the risk of disruptions, such as
server downtime or cyberattacks, which can cripple business activities.
- Health Impacts: Long-term computer use can cause health problems such as eye strain, carpal
tunnel syndrome (repetitive motion wrist injury), and poor posture.

ETHICAL ASPECTS OF INFORMATION TECHNOLOGY:

- Data Privacy and Confidentiality: Personal data should be protected from falling into the wrong
hands. However, in practice, many companies collect user data for marketing without consent.
- Intellectual Property Rights: Technology makes it easier to duplicate digital content, such as
music, movies and software, increasing the risk of copyright infringement. Piracy and unauthorized
copying are major challenges in the digital world.
- Equal Accessibility to Technology: The digital divide occurs because not everyone has equal
access to technology. This gap can create inequalities in various aspects of life.
TYPES OF CYBER CRIME
·Hacking: This attack involves unauthorized access to a system or network to steal or damage
data. Hacking can be done from outside the company (external) or from within (internal).
·Cracking: Crackers exploit system vulnerabilities for personal gain. For example, a cracker
steals a user's financial data and uses it without authorization.
·Phishing and Scams: Phishing is fraud through fake websites or emails that resemble trusted
services. Phishers attempt to steal sensitive user information, such as passwords and credit
card numbers.
·Cyber Terrorism: The use of technology to attack a country's vital infrastructure, such as the
power grid or banking system, with the aim of inflicting physical or economic damage.
·Identity Theft: Perpetrators steal personal data such as credit card numbers or identity
data and use it for criminal activities, such as creating fake accounts or taking out credit in
the victim's name.
CYBER CRIME PREVENTION MEASURES:

•Building Security Awareness: Educate the public and employees to recognize attacks such
as phishing and scams.
•Layered Security: Using a layered security system that includes firewall, antivirus, and
intrusion detection.
•Network Monitoring and Audit System: Periodically monitor the network to detect
suspicious activity and identify potential threats.

PRIVACY IN THE DIGITAL AGE


•Privacy Challenges on the Internet:
Many companies utilize user data for analytics and marketing. Information such as browsing
history, location, and user preferences can be collected without their knowledge, making it
vulnerable to misuse.
Data Protection Policy:
- General Data Protection Regulation (GDPR): GDPR in Europe protects users' rights to their
personal data. Users have the right to access, correct or delete their data. GDPR also requires
companies to keep data secure and avoid misuse.
Opt-In and Opt-Out:
= Opt-In: Users must give explicit consent before their data is collected. This gives the user
complete control over their personal data.
= Opt-Out: By default, users' data is collected unless they choose to opt-out. Opt-outs are still
common in the United States, but have the potential to reduce transparency.

RISK OF DATA MISUSE:


Misuse of personal data has the potential to damage a company's reputation and cause harm
to users, such as identity theft. Therefore, companies need to be transparent in managing
user data and comply with existing regulations.
COMPUTER SUPERVISION IN THE WORKPLACE
· Use of Surveillance to Monitor Productivity:
Many companies implement monitoring software to measure employee productivity, such as
time spent in each application or site, as well as keep a history of daily activities. This data is
often used for performance evaluation.

· Ethical Issues in Supervision:


Excessive surveillance is perceived as invasig employees' privacy and causing stress.
Many employees feel uncomfortable if they are constantly monitored, especially when it comes
to using personal devices in the office.

· Limits to Supervision:
Companies need to strike a balance between secunty needs and employee privacy rights.
Surveillance should be conducted transparently, and employees should be informed of the data
taken and the reasons for the surveillance.

· The Impact of Surveillance on Health:


Overly strict supervision increases employee stress and anxiety. This not only interferes with
productivity, but can also lead to long-term health problems, such as mental distress.
CHALLENGES AND SOLUTIONS IN WORKING CONDITIONS

Impact of IT on Work Quality:


The use of IT can reduce repetitive work and allow workers to focus on more complex tasks.
However, computer-based work is also at risk of causing injuries due to repetitive motions.

Ergonomic Solutions to Reduce the Negative Impact of IT:


- Ergonomic Design: Use of posture-supportive chairs, eye-level placement of computer
screens, and ergonomic desks.
- Periodic Pauses and Light Exercise: Providing employees with breaks so that they can
stretch their muscles and reduce fatigue.
- Work Environment Adjustments: Provide good lighting, ergonomic chairs and desks, and
rules on the safe use of computer screens for eye health.
CONCLUSION

· The Importance of Security and Ethics in Technology: Given the high risks of IT use, it 1s
important for companies to implement effective security measures as well as maintain
ethical use of technology to comply with regulations and individual rights.
· The Role of Regulation: Policies like GDPR in the European Union and other data protection

laws are an important step in maintaining user privacy. These regulations help avoid misuse

of data by companies.
· Public Awareness of IT Responsibilities: Public education and awareness about security
and privacy threats are key to the safe and responsible use of IT. All parties, both companies
and users, must play an active role in keeping technology safe and ethical.

You might also like