With today’s ever-increasing use of information systems amid the globalization of worldwide business, accessibility and availability of information have become too simplistic, which raises ethical and social issues. The Internet, digital technologies and globalization makes it easier than ever to gather, integrate and distribute information, giving rise to new concerns about the appropriate use of personal information, privacy protection and the preservation of intellectual property. We investigate the pressing ethical issues surrounding the establishment of standards to safeguard system quality, which protects the safety of individuals, society and businesses - both locally and on a global scale. This course picks apart the various ethical, social, security and privacy issues related to information systems. We unpack key terms like ‘profiling’ and demonstrate the use of ‘non-obvious relationship awareness’ (NORA) technology to gather personal data from disparate sources. We then examine how mechanisms like website registrations, cookies and malware can be used to collect such information. The course then provides some technical solutions to these measures, including anti-spyware technologies and encryption.
Organizations today face the danger of security breaches through weak security systems or improper management of assets. We highlight examples of recent security breaches and lay out the factors that motivate people and organizations to carry out such attacks. ‘Malware’ is malicious external software that poses a threat to security. We explain how malware like viruses, worms and trojan horses pose a threat to a firm’s assets and provide various ways to avoid and mitigate their impact. Digital versions of intellectual property face greater ethical threats as computerized information can easily be copied or distributed through networks. We take you through the use and importance of copyright protection that can reduce piracy. Technological measures are not always sufficient to protect organizations against security breaches and it is very important to have a comprehensive organizational approach to manage security, especially when your organization operates globally. This course examines globalization and identifies the major factors that drive the internationalization of business across sectors. We discuss the challenges facing global information systems and provide their management solutions.
Organizations require critical planning and close management of strategies to grow and remain competitive in a global market. Internal structures play a vital role in the formulation of these strategies. We divide such structures into three main kinds: centralized, decentralized and coordinated. Many ‘shared services’ organizations share services with their peers to reduce costs, increase productivity and maintain quality. We outline the key support features provided by such bodies. As businesses grow, they expand and share their services globally. This process of transferring the knowledge and management of information technology systems from one organization to another is known as ‘transitioning’. We go through this process and Thomas Friedman’s ‘ten forces that flatten the world’. Implementing, maintaining and updating information security presents a significant challenge to any organization as it seeks to protect its information and technology by responding to external threats. This course is suitable for those interested in the shifting ethical framework in which corporations now operate. It can also help anyone working in such an organization who wishes to take a management track and move upwards.
What You Will Learn In This Free Course
View All Learning Outcomes View Less All Alison courses are free to enrol study and complete. To successfully complete this course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this course, you have the option to acquire an official , which is a great way to share your achievement with the world.
Your Alison is:
- Ideal for sharing with potential employers
- Great for your CV, professional social media profiles and job applications.
- An indication of your commitment to continuously learn, upskill & achieve high results.
- An incentive for you to continue empowering yourself through lifelong learning.
Alison offers 3 types of s for completed courses:
- Digital : a downloadable in PDF format immediately available to you when you complete your purchase.
- : a physical version of your officially branded and security-marked
All s are available to purchase through the Alison Shop. For more information on purchasing Alison , please visit our FAQs. If you decide not to purchase your Alison , you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Account Settings.