Ethics in the Technology Driven Enterprise

Innovations in technology have created new ethical challenges. Essential use of electronic communication in the workplace has escalated at an astronomical rate over the past decade. As such, legal and ethical dilemmas confronted by both the employer and the employee concerning managerial control and ownership of einformation have increased dramatically in the USA. From the employer-s perspective, ownership and control of all information created for the workplace is an undeniable source of economic advantage and must be monitored zealously. From the perspective of the employee, individual rights, such as privacy, freedom of speech, and freedom from unreasonable search and seizure, continue to be stalwart legal guarantees that employers are not legally or ethically entitled to abridge in the workplace. These issues have been the source of great debate and the catalyst for legal reform. The fine line between ethical and legal has been complicated by emerging technologies. This manuscript will identify and discuss a number of specific legal and ethical issues raised by the dynamic electronic workplace and conclude with suggestions that employers should follow to respect the delicate balance between employees- legal rights to privacy and the employer's right to protect its knowledge systems and infrastructure.




References:
[1] B. Acohido and J. Swartz, "Botnet Scams are Exploding,"
USA Today, http://www.usatoday.com/tech/news/
computersecurity/2008-03-16-computer-botnets_N.htm, March 2008.
[2] L. DMonte," Virtual Nightmares Ride High," Computer Crime
Research Center, http://www.crime-research.org/articles/ecommmerce08/,
January 2008.
[3] T. Farley, "Mobile Telephone History,"
http://www.xtimeline.com/timeline/History-of-Mobile-Phones--Cell-
Phones-, March 2005.
[4] M. Hall, "Price of Security Breaches," Computerworld,
http://www.computerworld.com/securitytopics/security/story/0,10801,10
6180,00.html, November 2005.
[5] G. Knight, "Cybercrime is in a State of Flux," Computer Crime
Research Center, http://www.crime-research.org/articles/
cybercrime0308, March 2008.
[6] B. Nelson, A. Phillips, and C. Steuart, "Guide to Computer Forensics
and Investigations," Course Technology, 2010.
[7] J. Steward, "10 ways hackers breach security," Global Knowledge,
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Ste
ward_Hackers.pdf, 2007.
[8] Trend Micro Inc., "Cybercriminals Reinvent Methods of Malicious
Attacks," Computer Crime Research Center http://www.crimereseearch.
org/analytics/3451/, July 2008.