The impacts of the information system
The impacts of the information system cannot be understated. It has had an impact not only in business but also far beyond to the extent that it affects the ways we do things in the modern era. These new technologies are associated with a change of lifestyles since they always create new conditions that we have never be subjected to before. The biggest question associated with this impact lies in dealing with these empowerment devices and the new rules and regulations necessary to safeguard ourselves. This paper will discuss ethical issues associated with the information system, which impact our behaviors. Additionally, we shall investigate a new legal structure in place, primarily focusing on privacy and intellectual property.
Introduction of new technology usually has an insightful effect on how human being behaves. It presents us with aptitudes that did not exist and create new conditions and environments that have never been addressed in ethical terms. Information technology has presented us with an opportunity to aggregate information from numerous sources, hence easing people’s profiles. This act would have taken a couple of days, but with the information system’s help, it takes less than an hour allowing the government and private institutions to comprehend more information about an individual. Secondly, the information technology has enabled many individuals to produce perfect records of digital songs that have attempted various music fans to download copyrighted songs for their personal use without any prior payment to the owner of that particular music. Many of these individuals comprise those who could never have an opportunity to enter a music store and perhaps steal a compact disc, but the new information system has enabled them illegally to download dozens of copyrighted albums.
However, the easiest method of solving this would to strictly conform to the code of ethics. A code of ethics highlights acceptable practices for a social group or even a professional one, as agreed by all the members of that specific group. It furthermore details the action the group considers suitable and those that they fail to be inapt. Association of computing machinery has developed a remarkable code of ethics, and professional conduct guide all the computing professionals. The ethical codes emphasize the role of trustworthy and honest undertaking in that field. Some of the emphasize ethical concerns include the prohibition of entering someone’s computer system without their knowledge, implementing information systems that demean human beings, and obligating the group leaders to ensure the newly developed systems enhance humans’ quality of life. Though developing this code of ethics and jotting them down may seem obvious, they provide constituency and clarity. However, the greatest drawback is that they fail to incorporate legal authority in them to break these codes of ethics is not considered a crime itself. More so, adherence to such guidelines is mostly voluntary. When a member violates them, their membership may be terminated.
More so, various organizations that provide technical services to the public need to have an acceptable use policy before the public is allowed to access those services. Similar to the code of conduct, acceptable use policy outlines what is appropriate and what is an apt when an individual is using an organizational service. A good example may be terms and conditions an user have to agree before using a school Wi-Fi. Indulging in a gross misconduct such as sharing your Wi-Fi login details may prompt an individual to be curtailed from accessing the resource hence negatively impacting on that particular student or school staff.
Lastly, we cannot understate the impact of intellectual property in influencing how an individual or the general public behaves. The rise of new information technologies have made it difficult to defend and claim intellectual properties. Well, it is a fact that the intellectual property protect tangible results of and individual cognitive invention. This means that more than Idea is need to make use of intellectual property protection. For example, a new song that have been written down can be protect. This tend to change how individual behave since upon realization of the benefits associated with coming up with innovative ideas, individuals will tend to be creative.
To enhance privacy, there are various types of statutory regulations and more laws and regulations that have a well-developed enforceable structure that every individual must conform to while using an information system. The government regulates some of these structures, while various organizations regulate others. For example, limitation of record collection, a prohibition to track individual information, and personally identifiable information is used to establish a person’s unique identity.
From time immemorial, various world governments have always laid stringent guidelines on the amount of information that can be unruffled from its citizens. The rise of information technology has strengthened restriction to access of information from certain classes of individuals. For example, in the United States, websites in dire need of collecting information for children aged thirteen years and below are required to observe the Children’s Online Privacy Protection Act. This is an act enforceable by the Federal Trade Commission. It makes it compulsory for websites obtaining information from the individual aged 13 and below to obtain the consent of data collection from such children. This, therefore, require such a website to determine the age of their respondents.
More so, the Health Insurance Portability and Accountability Act is the guidelines that pinpoint medical records as a unique category of personally identifiable information. This requires a medical practitioner to obtain a patient’s consent before sharing their health information. Heavy penalties are imposed on those institutions that breach this kind of trust. This is enabled by integrating information systems such as electronic health records and the emphasis these systems take into account, particularly the protection of such systems.
It is through the aid of the information system that both the European Union and the United States have been able to enforce the Do Not Track systems. In the US, the opt-out Do Not Track model is used. The agreement in this kind of model is that you share your information with an organization and, more so, direct them not to share your biodata. Conversely, the EU uses an opt-in option that emphasizes permitting the organization before sharing your data. This helps users to opt-out of tracking on websites that they do not use. This has been enabled by advancements made in information technology, and any infringement to such like agreement can cause serious legal repercussions.
In summary, the information system has undergone continuous advancement. This has enabled various individuals to take advantage of these improvements, such as indulging in unethical issues such as downloading copyrighted music without prior contribution to the owners. Others in these fields have developed various ethical guidelines to guide their practice in the computing process. Surely, the benefits of information systems cannot be ignored due to the massive contribution to various statutes’ enforcement. It has aided the regulatory authorities to enforce various acts like HIPAA and COPPA, as highlighted above.