Page 67 - [Uma_Sekaran]_Research_methods_for_business__a_sk(BookZZ.org)
P. 67
ETHICS IN HANDLING INFORMATION TECHNOLOGY 51
Authentication, authorization, and encryption are some basic security method-
ologies employed to prevent unauthorized people from having access to and
interpreting these data. These security measures maintain the integrity of the
information by allowing access to only authorized personnel and safeguarding it
once it leaves the secure confines of the organization by scrambling the message
(encryption).
Though several companies offer security software, as technology advances, so
will the ingenuity of the hackers, and vigilance is therefore warranted on a con-
tinuing basis.
MANAGERIAL ADVANTAGE OF
TECHNOLOGICAL ADVANCEMENTS
Information technology and the development of software to gather, store, and
analyze information—the results of which facilitate decision making—are regis-
tering advances at an exponential rate. It is important for managers to take full
advantage of information technology and keep current on the latest innovations.
It should be ensured that persons working with information technology keep
abreast of all current advances, and in fact, develop software tailored to the spe-
cial needs of the system. It cannot be overemphasized that unless information is
constantly updated, an organization will not benefit even if it has installed the
most sophisticated technology. Hence the information system should be current.
As we have stated, software technology can be put to effective use in the
research process for problem identification (as discussed in the next chapter),
theory building, collecting data from respondents, analyzing it, and presenting
the results—all of which are discussed in the subsequent chapters of this book.
Online terminal-activated systems with massive databases (including text infor-
mation, graphics, sound, and video) serve businesses more economically and
effectively. LAN in the organization, therefore, serves a useful purpose.
Technology is not, however, without its drawbacks. For instance, voice mail
and caller IDs can make data collection via telephone difficult, if not impossible,
as discussed in Chapter 10. Safety of data access by the appropriate personnel
and storage of data at different locations are also important, as we have noted.
ETHICS IN HANDLING INFORMATION TECHNOLOGY
Although technology offers unbounded opportunities for organizations and facil-
itates decision making at various levels, it also imposes certain obligations on the
part of its users. First, it is important that the privacy of all individuals is pro-
tected, whether they are consumers, suppliers, employees, or others. In other
words, businesses have to balance their information needs against the individ-
ual rights of those they come in contact with, and on whom they store data. Sec-
ond, companies also need to ensure that confidential information relating to
individuals is protected and does not find its way to unscrupulous vendors and