3.11 Ethical Considerations There are several ethical that need to be consider when make a research study.
Avoiding bias
The researcher need to be equal on their study and bias must be avoid. The information that found in this study cannot be hiding and only express or highlighted researcher’s interest not what has being found in the findings. It will be bias if the researcher interpreted the findings differentially as the original one. Thus, the findings in this study must be equally and interpreted accurately.
Using inappropriate research methodology
Researcher has responsibility to use the appropriate methodology based on the researcher’s knowledge in conducting the study. In this study, the researcher must use the method properly using equally sample, valid instrument and make a right conclusion.
Use
…show more content…
The threat intended for this vital business asset is sometimes uncontrollable by management. Information system vulnerabilities are often introduced due to human and organizational factors.
The findings of the study provide several implications for both academic and practitioners. For practitioners, the findings help organizations to improve the performance of their employees by monitoring their behavior in the workplace, assist them to be aware on security attack and improve their knowledge and skills relating to the information security strategies. Organization can avoid the risk of information security and can protect the confidential, integrity and privacy of the information. Thus, it can increase organization to achieve the higher performance of employee and the performance of information security.
In additions, findings for academic research is relate with the implementation to information security strategies. The strategies will be practiced in the organizations in other to help protect the security and to protect the information
The role of ethics and social responsibility aids organizations in developing a strong strategic plan, while addressing the needs of stakeholders. Ethics and social responsibility require social awareness to address the needs of the environment and to increase the knowledge of employees, which will lead to a corporation focused on supplying the customer with what is needed, managers equipped with solid decision-making abilities, and employees who believe that he or she are an asset to the business. It is the executive manager’s responsibility to establish a clear vision for the corporation and place a specific focus on understanding stakeholder’s needs. In an effort to support
American Psychological Association. Publication manual of the American Psychological Association (2015). Washington, DC: American Psychological Association
Moreover, now days using information system is not as walking as in the park, it has many new security treats that the company might lose their confidential data, financial and personal information.
For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major
Selling a product before it 's finished is never a good idea, being in the software business you hear about it a lot and it never comes in a good way. Only bad things can happen when you release an unfinished product and at the same time this is another point where you have to look into the specifics of your product. Most often the products that are released before they are completed are software like games, these often come out to sometimes horrible releases where nothing works and they experience a lot of crashes and fails and it takes a couple of months sometimes years of patches to get everything fixed.
Gamma International has recently been a company under much scrutiny. FinFisher, Gamma International's product, was supposedly marketed as spyware to be used by law enforcement.¹ However thanks to their software, Bahraini activists have been hacked,³ jounralists in Uganda have been blackmailed and effectively silenced,⁶ and an American citizen has their human rights violated.¹ However, who should be held accountable for these terrible things? Should it be those who abused the software or those who created the software? I would argue that they should be held morally accountable for creating the software that gave those who used them the tools to do what they did.
Step 1: About 7% of the rich world's jobs are held by people from developing countries and an aging population who cannot fill the vacant positions currently available. Lant Pritchett proposal is to have 16 million of the poor became part of a guest worker program. In the United States for example; 3 million guest workers would stay 3 to 5 years, without citizenship. They could not bring their families, but they would have some protection through the certification process for these guest workers.
the investigation conforms with the principles outlined in the declaration of Helsinki (19) the regional ethical review board in NN, Sweden, approved the study (LU 2011/364) permission to contract informants was given by the director of the PAH center. All the participants were given written and oral information about the study and its purpose, and all were informed that they could withdraw at any time without explanation or consequence. Furthermore, they were assured that the material would be treated as strictly confidential. All participants signed a written consent letter. So as not to abandon the patients with their thoughts after interviews, the patients were given the opportunity to contact a social worker.
Choice 2: A married couple, both addicted to drugs, are unable to care for their infant daughter. She is taken from them by court order and placed in a foster home. The years pass. She comes to regard her foster parents as her real parents. They love her as they would their own daughter. When the child is 9 years old, the natural parents, rehabilitated from drugs, begin court action to regain custody. The case is decided in their favor. The child is returned to them, against her will. Does ethics support the law in this case? Discuss.
Everyday we each face questions of what we ought to do. We sometimes ask ourselves,
These issues are all of ethical concerns, but are also legal concern according to the fact that is illegal to not completely attempt resuscitative efforts in the absence of a DNR.
On a personal level, in addition to the aforementioned section, this section addresses my adherence to ethical guidelines. These steps will be sought to ensure that all aspects of my research project are in compliance with the standards of a scientific research. The dissertation process has various requirements that must be met in order for a research project to be considered valid and original. Based on the information obtained from the American Psychological Association (APA) (2010); Committee of Science et al (2009), the following characteristics of the ethical guidelines will be as accurate as possible, when conducting my research project. Plagiarism Plagiarism is defined as taking the work of someone else’s and making it your own, or copying their ideas and words without acknowledging that person.
It is important to mention at this stage that a research study presented by a researcher may not give complete information about the selected topic. There can be certain limitations of methodology and the new researchers may criticise it for being incomplete. As research is a circular process in which ideas can be added and extracted by researchers anytime, the application of the presented ideas by one researcher are tested and verified.
On the other hand although their similarities are close knit; they each have a distinct difference depending on the individual. For instance, recently the complex next door caught fire due to bad wiring. The company put all the tenants up for the weekend because they believed that this is what they ought to do. After the weekend the tenants were told that the situation had been turned over to their insurance company and it was out of their hands. The tenants believe that the company should hold their self-responsible and accommodate them much more.
Information security professional’s job is to deploy the right safeguards, evaluating risks against critical assets and to mitigate those threats and vulnerabilities. Management can ensure their company’s assets, such as data, remain intact by finding the latest technology and implementing the right policies. Risk management focuses on analyzing risk and mitigating actions to reduce that risk. Successful implementation of security safeguards depends on the knowledge and experience of information security staff. This paper addresses the methods and fundamentals on how to systematically conduct risk assessments on the security risks of information systems.