StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

EBusiness and Ethics - Essay Example

Cite this document
Summary
This involves the moral and ethical issues arising from the development and subsequent use of information technologies. Several decades ago, it was safe to store data in the computer since there…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
EBusiness and Ethics
Read Text Preview

Extract of sample "EBusiness and Ethics"

Cell Phone Projector Proposal: MIS Business Concerns Ethical concerns have been on the increase regarding information technology use. This involves the moral and ethical issues arising from the development and subsequent use of information technologies. Several decades ago, it was safe to store data in the computer since there were no cases of hacking and data theft. However, in the contemporary society, several security concerns about data held on computers have arisen. Though several techniques have been developed to deal with this, emerging and re-emerging threats to computer information are still available.

The growth and advancement of computer technology and several networks have encouraged an incline in the number of criminal activities propagated over the computers as well as risks (Jamrich and Dan Oja 28). The world is currently witnessing the development of new criminal activities that are being committed through the digital world. Therefore, there is a greater need of coming up with measures and strategies that can help curb cyber risks. There are many system administrators and skilled enough to do the work and provide what the client need.

However, it is hard to find the one that can do what you want with the right way and beneficial and effective for long time. The biggest problem that companies face is the security in the network. The data and information are crucial to a company that is why they need security. In these days, there are many viruses that can harm the computers and destroy the data in companies and it cost them lots of money and gives them a bad reputation. The project will provide and set up data security to the cell phones that helps to secure the data and protect it from threats and viruses (Siegel 31).

Furthermore, there is need for security from the outside network. Also, the cell phones should have protection from viruses that destroy and might consequently steal data. Nowadays, every company needs to setup a security program and the only way to do it is to hire system administrators to do that with the right way. What the project intend to set up is the required security for the data and cell phone. Further, the data will be backed up because it is better to have backed up data in case it is lost or destroyed.

Setting up security for the data and cell phone will include activating the firewalls, blocking any spyware attacks, as well as using valid malware software or anti-virus. Protection of data entails using encryption for the most sensitive files such as the financial records, tax returns, and backing up the significant data regularly, as well as storing them on another location. There are several solutions that the project will come up with regarding mitigating the threats posed on data and information on the cell phone projector.

In spite of setting up security for the data and cell phone as well as data backup proposed, some solutions have been corporate and proved useful. The first solution that has been incorporated is the use of strong passwords. Companies have been using different password combinations and user ID for different accounts and subsequently avoiding writing them down anywhere (Brenner 27). The passwords are made complicated through the combination of numbers, letters, and the special characters with a minimal of ten characters that are changed on a regular basis.

Secondly, the wireless networks will be secured. The Wi-Fi or wireless networks in the working are always vulnerable to the intrusion if not properly secured. In order secure them, companies often review and consequently modify the default settings. More so, they avoid conducting sensitive corporate or financial transactions on such networks. Third solution involves protection of the e-identity. The companies are always cautious when providing their personal information that includes an address, company name, the financial information, and phone number through the cyberspace (Brenner 31).

Further, they ensure that the websites are always secure when engaging in any online transaction or that the privacy settings are enabled. Finally, the companies always avoid being slammed by ensuring that they take caution before clicking on any of the links. All these measures are put in place to ensure that the cell phones that will be used as projector are efficient and that data contained in them are not lost or stolen. Works Cited Brenner, W. Susan. Cyber crime: criminal threats from cyberspace.

United States of America, USA: Greenwood publishing group, 2010. Print.Jamrich, P. June and Dan Oja. Computer Concepts Illustrated Introductory. United States of America, USA: Cengage Learning, 2008. Print.Siegel, J. Larry. Criminology (10th Ed). United States of America, USA: Thomson Wadsworth Publishers, 2009. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EBusiness and Ethics Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
EBusiness and Ethics Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/business/1665782-ebusiness-and-ethics
(EBusiness and Ethics Essay Example | Topics and Well Written Essays - 500 Words)
EBusiness and Ethics Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/business/1665782-ebusiness-and-ethics.
“EBusiness and Ethics Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/business/1665782-ebusiness-and-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF EBusiness and Ethics

Enrons Rigorous Performance Evaluation Standards

Factors leading to unethical behavior of Enron The culture of Enron contributed to the basis of the scandal of ethics.... Enron's Collapse due to Ethical Issue Introduction Enron Corporation used to be the leading energy companies based in Texas, USA.... Enron employed around 20,000 employees before filing for bankruptcy in 2001....
5 Pages (1250 words) Essay

History of Business Ethics and Ethical Theory

This essay "History of Business ethics and Ethical Theory" is focused on the theory of business ethics.... As the author puts it, business ethics emerged in the mid-1970s owing to the failure of ethical practices in the business.... ethics is considered an integral part of business operations.... nbsp;… ethics go hand in hand with culture as they characterize a moral dimension on how people act (Ardalan, 2008:514)....
3 Pages (750 words) Essay

Role of Ethics in the Business World

Business ethics Instructor Institution Date Business ethics Introduction ethics is a branch of philosophy that deals with defending, systemizing, and recommending the desired concepts of right and wrong behavior (Singer, 2011).... Business ethics refers to the basic standards and principles that determine appropriate and acceptable behavior in business organizations (Singer, 2011).... Business ethics can also be defined as a form of professional or applied ethics that examines moral values, ethical principles and problems that arise in an organizational environment (Singer, 2011)....
9 Pages (2250 words) Essay

Ethics in Modern Business Management

The organizations are trying to use un lawful ways to intrude into the details of the key features of the products and services of its competitor. ethics in Management Modern business management requires to hold on numerous challenges with respect to various functions existing in both micro and macro environment.... FSGO discovered that the even big organizations with effective ethics and compliance committees have reported crime in their organizations'.... tmlThe ethics of competitive intelligence, Tuck school of business,2005, http://mba....
2 Pages (500 words) Essay

Unified Tobacco - Business and Ethics

This essay "Unified Tobacco - Business and ethics" focuses on the utilitarianism, being a classic example of Ethics of Duty, takes into consideration selfishness and greed to prove that the general good may be a product of an “ethical pursuit of selfish needs”.... Unified Tobacco - Business and ethics Utilitarianism, being a classic example of Ethic of Duty, takes into consideration selfishness and greed to prove that the general good may be a product of an “ethical pursuit of selfish needs” (“Virtue” 2006)....
2 Pages (500 words) Essay

Articles of business ethics

“One Shot” ethics Training Is Really No Training At All.... om/one-shot-ethics-training-is-really-no-training-at-all/ The author… the need to incorporate a more comprehensive ethics training program for organizations that are committed to adhering to ethical, moral and legal standards of operating their businesses.... As disclosed, Bucaro (2012) enumerated three minimum requirements that an ethics training Articles on Business ethics Articles on Business ethics Article Bucaro, F....
2 Pages (500 words) Term Paper

Business Ethics and Ethical reasoning

The workload should also be justified according to the salary plan and benefits of the employee. Justice is Business ethics Business ethics An ethical dilemma arose when working in an organization.... ustice is the method that should weigh the above given dilemma of ethics in pay....
1 Pages (250 words) Coursework

Business Ethics of WorldCom

The essay "Business ethics of WorldCom" analyzes the facts that relate to business ethics challenge in WorldCom.... The relevance of business ethics in the case Ethical behaviors are considered the important characteristics that are needed by effective leaders.... ethics in the case also is relevant as it shows the outcomes that were obtained when there was no holding of ethical standards....
3 Pages (750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us