Page 67 - [Uma_Sekaran]_Research_methods_for_business__a_sk(BookZZ.org)
P. 67

ETHICS IN HANDLING INFORMATION TECHNOLOGY  51

                             Authentication, authorization, and encryption are some basic security method-
                             ologies employed to prevent unauthorized people from having access to and
                             interpreting these data. These security measures maintain the integrity of the
                             information by allowing access to only authorized personnel and safeguarding it
                             once it leaves the secure confines of the organization by scrambling the message
                             (encryption).
                               Though several companies offer security software, as technology advances, so
                             will the ingenuity of the hackers, and vigilance is therefore warranted on a con-
                             tinuing basis.



            MANAGERIAL ADVANTAGE OF
            TECHNOLOGICAL ADVANCEMENTS

                             Information technology and the development of software to gather, store, and
                             analyze information—the results of which facilitate decision making—are regis-
                             tering advances at an exponential rate. It is important for managers to take full
                             advantage of information technology and keep current on the latest innovations.
                             It should be ensured that persons working with information technology keep
                             abreast of all current advances, and in fact, develop software tailored to the spe-
                             cial needs of the system. It cannot be overemphasized that unless information is
                             constantly updated, an organization will not benefit even if it has installed the
                             most sophisticated technology. Hence the information system should be current.
                               As we have stated, software technology can be put to effective use in the
                             research process for problem identification (as discussed in the next chapter),
                             theory building, collecting data from respondents, analyzing it, and presenting
                             the results—all of which are discussed in the subsequent chapters of this book.
                               Online terminal-activated systems with massive databases (including text infor-
                             mation, graphics, sound, and video) serve businesses more economically and
                             effectively. LAN in the organization, therefore, serves a useful purpose.
                               Technology is not, however, without its drawbacks. For instance, voice mail
                             and caller IDs can make data collection via telephone difficult, if not impossible,
                             as discussed in Chapter 10. Safety of data access by the appropriate personnel
                             and storage of data at different locations are also important, as we have noted.


            ETHICS IN HANDLING INFORMATION TECHNOLOGY

                             Although technology offers unbounded opportunities for organizations and facil-
                             itates decision making at various levels, it also imposes certain obligations on the
                             part of its users. First, it is important that the privacy of all individuals is pro-
                             tected, whether they are consumers, suppliers, employees, or others. In other
                             words, businesses have to balance their information needs against the individ-
                             ual rights of those they come in contact with, and on whom they store data. Sec-
                             ond, companies also need to ensure that  confidential information relating to
                             individuals is protected and does not find its way to unscrupulous vendors and
   62   63   64   65   66   67   68   69   70   71   72