Ethics in the Technology Driven Enterprise
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Ethics in the Technology Driven Enterprise

Authors: Bobbie Green, James A. Nelson

Abstract:

Innovations in technology have created new ethical challenges. Essential use of electronic communication in the workplace has escalated at an astronomical rate over the past decade. As such, legal and ethical dilemmas confronted by both the employer and the employee concerning managerial control and ownership of einformation have increased dramatically in the USA. From the employer-s perspective, ownership and control of all information created for the workplace is an undeniable source of economic advantage and must be monitored zealously. From the perspective of the employee, individual rights, such as privacy, freedom of speech, and freedom from unreasonable search and seizure, continue to be stalwart legal guarantees that employers are not legally or ethically entitled to abridge in the workplace. These issues have been the source of great debate and the catalyst for legal reform. The fine line between ethical and legal has been complicated by emerging technologies. This manuscript will identify and discuss a number of specific legal and ethical issues raised by the dynamic electronic workplace and conclude with suggestions that employers should follow to respect the delicate balance between employees- legal rights to privacy and the employer's right to protect its knowledge systems and infrastructure.

Keywords: Information, ethics, legal, privacy

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1062958

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2054

References:


[1] B. Acohido and J. Swartz, "Botnet Scams are Exploding," USA Today, http://www.usatoday.com/tech/news/ computersecurity/2008-03-16-computer-botnets_N.htm, March 2008.
[2] L. DMonte," Virtual Nightmares Ride High," Computer Crime Research Center, http://www.crime-research.org/articles/ecommmerce08/, January 2008.
[3] T. Farley, "Mobile Telephone History," http://www.xtimeline.com/timeline/History-of-Mobile-Phones--Cell- Phones-, March 2005.
[4] M. Hall, "Price of Security Breaches," Computerworld, http://www.computerworld.com/securitytopics/security/story/0,10801,10 6180,00.html, November 2005.
[5] G. Knight, "Cybercrime is in a State of Flux," Computer Crime Research Center, http://www.crime-research.org/articles/ cybercrime0308, March 2008.
[6] B. Nelson, A. Phillips, and C. Steuart, "Guide to Computer Forensics and Investigations," Course Technology, 2010.
[7] J. Steward, "10 ways hackers breach security," Global Knowledge, http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Ste ward_Hackers.pdf, 2007.
[8] Trend Micro Inc., "Cybercriminals Reinvent Methods of Malicious Attacks," Computer Crime Research Center http://www.crimereseearch. org/analytics/3451/, July 2008.