Article 1 currently, smartphone, web, and social networking techno
1. Article 1-Currently, smartphone, web, and social networking
technology have been commonly used to promote patient-
centered treatment in the healthcare industry. Their
incorporation in this area, however, has led to ethical concerns
such as privacy and confidentiality arising (Denecke et al.,
2015). This is because it is easy to obtain private data from
patients across the internet, leaving it vulnerable to fraudulent
attacks and data breaches.
Article 2-Electronic Health Record (EHR) is one of the
emerging innovations being used to increase healthcare
efficiency. Besides, by streamlining the critical method, the
EHR has minimized healthcare-related expenses and removed
time wastage. Unfortunately, many risks have been introduced
through its broad use. Such threats require safety and secrecy as
personal details may be breached and misused if not managed or
protected properly (Ozair et al., 2015).
Article 3-Managing information in today's society poses the
question of data security and privacy. The recent political
events have exposed the impact of supervision by government-
affiliated agencies (Stahl et al., 2014). This has culminated in
increased friction among human rights and national security.
Data security is an advanced issue that has been closely
correlated with computing ethics. In terms of intellectual
property, this has created privacy issues.
Article 4-Patients with chronic patients who depend on correct
and complete information to enhance better treatment are
concerned. To avoid mistakes, patients exchange sensitive
details with healthcare professionals in the course of receiving
such services. This has posed, though, the issue of privacy. As a
consequence, it is uncertain who can disclose the information,
what kind of information should be shared, and who should
obtain those sensitive details from organizations or departments
(Ancker et al., 2015).
The question of privacy appears to be a dominant topic of the
2. four posts from the discussion above. As an ethical question,
privacy is often the topic of interest in diverse areas and
occupations concerning information management. The topics of
the articles endorse the topic in chapter 14 as they illustrate
privacy and secrecy of information technology as ethical
concerns. Chapter 14 speaks a lot regarding data security, and
all four papers have highlighted this related topic.
As they have introduced me to significant ethics problems
linked to information security, the posts are insightful and
educational. One of the ethical challenges that may bring
unintended and expensive consequences is protection. To instill
them with information technology expertise, my company has
implemented routine staff preparation. E.g., to produce a
plausible situation, the organization utilizes simulation, and
workers are expected to treat it to the best of knowledge. To
direct the process of handling crucial details, the organization
has also developed a rigorous code of ethics.
Ethical decisions are taken by individuals who control the effect
of their tasks. Responsibility is a central factor that ensures that
you consider the future risks, obligations, and responsibilities
of making your decisions. Accountability is part of the structure
and social structures and ensures the tools are formed to assess
who made a trustworthy step and who is liable (Wangmo et al.,
2019).
Information technology is becoming extremely relevant in
everyday life, as it poses many ethical problems. It is often met
with a lack of protection, anonymity, copyright, and several
other computer crimes. Since data innovation aids tremendously
pace, stream, and access to cybercrime, data has become a
growing career. Many organizations and associations face
becoming a digital victim every day when much, if not all, rely
on computerized arrangements (Wangmo et al., 2019).
Safety: One experiencing many cybercrimes including hackers
hacking their IP addresses and they can reach the user's
3. computer if they are linked to the network. This contributes to
high IT and financial theft if we try to pass some money hacker s
hack it and send the sums to hackers by disruption (Mahdi,
2020).
Increased pressure on IT experts: is raising the pressure on IT
experts since the computer technologies must operate every
time, otherwise, the quality and availability of those
information systems must be controlled. Many organizations
will stay by the IT team with any issues during the operation
every day. This strain could contribute to tension and job
overload, which affects and is incomplete (Mahdi, 2020).
Similar care of all employees is an indication of workplace
ethics. All should be handled fairly regardless of ethnicity,
gender, tradition, and lifestyle. There is therapy is known as
awareness training, encourages uniformity in an organization
and one example is social accountability. Consideration
includes looking after staff who have any personal issues. This
psychiatric condition would be taken care of by ethical business
people. They also perform awareness-raising activities and give
them participation in this therapy. Staff can have difficulties
that contribute to certain kinds of problems. Subsequently, they
need the ability to explain their situation and seek the assistance
they need (Mahdi, 2020).
IT for Management: On-Demand Strategies for Performance,
Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 14
Ethics, Privacy, and Sustainability