636
Views
0
CrossRef citations to date
0
Altmetric
Book Reviews

Ethics in Information Technology: A Practical Guide

G. K. Awari and Sarvesh V. Warjurkar, Boca Raton, FL: CRC Press, 2022, 213 pp., $53.59, ISBN 9781032163796

ORCID Icon &

In this world of fast-changing technology and ubiquitous illusions, ethics and security pose as the most important challenges of all. Information technology is, on the one hand, equipping us with unprecedented ease of access and comfort; on the other, it is also making us more vulnerable than ever. The problems of digital privacy and security breaches are real and rampant. This is exactly when the issues of ethics and security in information technology pop up as not just important concerns but immediate and serious ones. Ethics in Information Technology: A Practical Guide by Awari and Warjurkar attempts to address these very crucial issues.

The book offers a comprehensive treatment of information technology ethics, commencing with an exploration and exposition of ethical principles. Ethics set societal standards for acceptable behavior, universally condemning actions like lying and stealing. However, the perception of ethical behavior, such as software piracy, varies by country (e.g., Vietnam with a 94% piracy rate finds it more acceptable). Ethics is a part of philosophy, focusing on principles related to human conduct, encompassing the morality of actions and intentions. The importance of ethics is hard to overestimate. That is when we find that ethics are more important than laws.

Information technology is considered the world’s fastest-growing and most diverse industry, and as such, ethical practices in information technology are going to be increasingly significant and sought after. The authors recognize patience, effective communication, dynamism, multitasking, problem-solving, and enthusiasm as key parameters in an IT professional’s lifestyle. It also emphasizes their responsibility to understand and follow a strict ethical code of conduct. This is precisely when an IT professional is required to possess, in addition to the mentioned traits, a deep sense of responsibility toward making digital systems and communication more robust and reliable.

The widespread use of online education systems poses numerous challenges. While online teaching and learning offers convenience, they also open the door to academic dishonesty and unethical behavior, making the assessment process in online education quite challenging. Although less severe than cybercrime, another key focus in this book, it is still highly disruptive. Cybercrime encompasses various illicit activities conducted on the Internet, using technology both as a weapon and a target. It includes actions like data theft, cyberbullying, and the distribution of viruses, leading to both financial and nonfinancial harm. While hacking for financial motives is a well-known example, digital fraud involving computers and networks is also a prevalent form of cybercrime.

Living standards vary significantly between societies and nations, often measured by GDP per capita, where developed countries typically have higher standards. Economic cycles, natural disasters, and productivity are significant contributors. Increased productivity, primarily driven by IT and innovation in the business sector, has played a crucial role in raising living standards. It’s important to emphasize that living standards aren’t solely determined by economic factors like income; they’re also shaped by elements such as health, education, and technological progress. Technology, particularly in the fourth industrial revolution, has resulted in substantial enhancements in living conditions, providing connectivity, resource access, and opportunities to underserved individuals. Productivity is a key factor in improving living standards, influencing both national economies and businesses. Technology, automation, and computerization are essential for boosting productivity and labor efficiency, yielding considerable economic benefits. Nonetheless, this implies that the use of vulnerable technologies affects all aspects of human life and activities. Consequently, ethical concerns in information technology are intricately linked to human existence, growth, and progress.

The world is currently experiencing a significant technological disparity known as the digital divide. This divide signifies the gap in access to and utilization of digital technologies, particularly the internet, among various demographic groups and regions. It is characterized by differences in internet connectivity, digital literacy, and access to digital devices. While some individuals and communities enjoy the benefits and information of the digital age, others face disadvantages, including limited access to educational resources, job opportunities, and essential services. Bridging the digital divide is a vital global challenge with substantial implications for social and economic equity. Initiatives to address this issue encompass expanding internet infrastructure, offering digital skills training, and ensuring affordable access for all, ultimately fostering a more inclusive and connected society.

This text offers a comprehensive introduction to computer and internet crime, ethics in information technology, and privacy methods. It covers a range of key topics including ethical decision-making, security breaches, theft identification, consumer profiling strategies, intellectual property rights, quality in processes and products, software quality assurance, ethical organizational elements, telemedicine, and electronic health records. The book is designed to be a valuable resource for senior undergraduate and graduate students in interdisciplinary fields such as computer science, information technology, electronics and communications engineering, and electrical engineering.

In its seven chapters spanning just over 200 pages, the book delves into some of the most significant topics within the field of information technology. These topics include a comprehensive exploration of ethics, computer and internet ethics, organizational policies, the notion of intellectual property, IT organizational ethics, and the influence of IT on our quality of life. Toward the end, the authors dedicate the final chapter to case studies, providing examples of security breaches, various types of security breaches, and methods for preventing such breaches.

Altogether, the book tackles a highly critical subject matter, making it a valuable and worthwhile read that justifies the time and effort invested in reading it.

Firdous Ahmad Mala
Amar Singh College, Cluster University Srinagar, Jammu and Kashmir, India
[email protected]
Shahid Abdullah Dar
Government Degree College Sopore, Jammu and Kashmir, India
[email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.