From the IPad® to touch screen computers, there exists many opportunities for individuals to steal your information from your computer without anyone being the aware what has happened to them. The question that arises that coms to my mind is, “How can we be sure that the person that has access to my personal information will behave in an ethical manner?” Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society, Techterms.com (2013).
In this paper will discuss information technology management, the ethical concerns surrounding the safeguarding of the information or data by technology management professionals and what policies and training will be required to ensure that everyone is aware of the how to prevent information theft and privacy violation from both within and outside of the organization.
Computer ethics so important in today’s technological advanced society because more and more most of our critical information is being stored utilizing some type of software and hardware program. In his paper, Brooks, R. (2010) describes the impact as, “Consider more recent issues such as the public debate about nanotechnology, cloning, stem cell research, and mind-altering pharmacology. All of these technologies have stirred fear and apprehension as well as fascination and hope. In each case, the literature expressing concerns about the new technology has suggested that humanity has acquired a new capacity that takes us into new ethical territory. The author discussed a few of the most publicized and visible issues that have called attention to the need for an increased focus on ethics; however, we must also take into consideration the everyday impact that ethics affect our lives. For example, what will happen if the individual that is maintaining the databases at our doctor’s office decides to release personal medical information to unauthorized persons or the impact of an information security person within an organization decides to release or view information that they should not have access. Due to the potential damage that can be done by the unintentional or intentional failures in ethics by an individual, every effort must be taken into consideration when hiring information technology managers.
The previous examples lead to a