Management Information Systems: Ethical Issues and Globalization
Learn about ethical issues in organizations and the globalization of information systems in this free online course.Publisher: NPTEL
CertificationView course modules
With the ever-increasing use of information systems and globalization of businesses around the world, accessibility and availability of information have become too simplistic, and that has resulted in a significant increase in ethical and social issues. The Internet, digital technologies and global transitioning makes it easier than ever to gather, integrate, and distribute information, giving rise to new concerns about the appropriate use of personal information, privacy protection, and intellectual property protection. Another pressing ethical issue raised is the establishment of standards to safeguard system quality, which protects the safety of individuals, society, and businesses, both locally and on a global scale. This course will focus on the various ethical, social, security and privacy issues related to information systems. It also addresses the phases involved in the global transitioning of organizations. Ethics refers to the principles of right and wrong that individuals apply to make choices to guide their behaviour. The use of information systems in organizations has raised a number of ethical and security concerns, which must be addressed in order to avoid risks and financial losses. First, some key terminologies like profiling and the use of the NORA technology for gathering data about people from disparate sources will be introduced. Afterwards, various mechanisms like website registrations, cookies and malware that are used to collect information about people will be highlighted. Thereafter, some technical solutions including anti-spyware technologies, encryption, and others will be explained.
Organizations today face numerous security breaches as a result of weak security systems or improper management of organizational assets. Some recent security breaches that took place in international organizations will be highlighted in the next section of the course. You will also get to examine the various factors that motivate people and organizations to carry out security breaches. Malware is malicious external software that poses a threat to the security of organizations. You will get to understand how malware like viruses, worms, trojan horses pose a threat to a firm’s assets as well as the various ways to avoid and mitigate them. Digital formats of Intellectual property face greater ethical threats as computerized information can be easily copied or distributed on networks. In order to manage and reduce intellectual property rights infringement, various copyright protection approaches are usually adopted. You will understand how these work and why it is important that individuals who possess some form of intellectual property, should protect them appropriately. In order to protect organizations against security breaches, technological measures are always not sufficient. Therefore, it is very important to have a comprehensive organizational approach to manage security, especially as all organizations tend to operate globally. Globalization is a process of business integration among people, companies and governments across the world. You will learn the major factors that are driving the internationalization of business in various sectors. The various challenges posed by global information systems and management solutions for these challenges will also be explained.
Critically planning and managing organizational strategies is crucial for organizations to grow and remain competitive in a global market. Organizational structures play a vital role in the formulation of these strategies. The three main kinds of organizational structure which are centralized, decentralized and coordinated structures will be outlined. Many organizations share services with other organizations to reduce costs, increase productivity and achieve better quality; such organizations are known as shared services organizations. The various key features or support provided by these organizations will then be outlined. As businesses grow, they expand and share their services globally and this process of transferring the knowledge and management of the IT systems from one organization to another is known as transitioning. The process of transitioning and the ten forces that flatten the world will then be presented. Implementing, maintaining, and updating information security is a significant challenge for any organization today. An organization can protect its information and technology by responding to, preventing, and detecting internal and external threats with the help of information security. In this age of globalization, the majority of organizations are transitioning to offshore services and operate globally. This course is suitable for both professionals in the profession as well as for people who want to learn more about information security and the globalization of organizations. Enrol now and take advantage of this versed course.Start Course Now
Ethical Issues in Information Systems
Ethical Issues in Information Systems - Learning Outcomes
Introduction to Ethical Issues
Legal Solutions to Privacy Issues
Introduction to Security Issues in Information Systems
Security Threats and Their Solutions
Technical Countermeasures to Security Threats
Ethical Issues in Information Systems - Lesson Summary
Globalization - Learning Outcomes
Managing Global Organizations
Global Strategies and Business Organization
Offshoring / Transitioning Global IT Systems
Globalization of Corporates in a Flat World
Globalization - Lesson Summary
Having completed this course, you will be able to:
- Outline the various ethical and social issues in information systems.
- List various technical and legal solutions to privacy issues.
- Identify solutions to the numerous security issues faced by organizations.
- Explain the concept of globalization.
- Outline the ten flattening factors that contribute to the globalization of services.
- Discuss how the shared services model helps organizations to cut costs and increase productivity.
All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire an official Certificate, which is a great way to share your achievement with the world. Your Alison Certificate is:
Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning
Alison offers 3 types of Certificates for completed Certificate courses:
Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping
All Certificates are available to purchase through the Alison Shop. For more information on purchasing Alison Certificates, please visit our FAQs. If you decide not to purchase your Alison Certificate, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certificate pricing, please visit our Pricing Page.