Security and Ethical Challenges of IT


Organisations face challenges in managing complex information and communication technologies. Advantages of implementing robust IT security policies and procedures and implementation guidance assists IT and organisational leaders in this process.

Technique Overview

Security and Ethical Challenges of IT

Security and Ethical Challenges of IT Definition

The security and ethical challenges of IT refer to the difficulties that organisations face in managing increasingly complex information and communication technologies. The term embraces the management of systems, policies and procedures designed to protect organisations, their employees, customers and other stakeholders from malicious external threats, and from internal acts of noncompliance with IT policies. The concept has important implications for growing IT areas such as Big Data, social media, and Bring Your Own Device (BYOD) (Dutta & McCrohan, 2002; Simonite, 2015; Soares, 2015).

Security and Ethical Challenges of IT Description *

* The full technique overview will be available soon. Contact us to register your interest in our business management platform, and learn all about Security and Ethical Challenges of IT.

Business Evidence

Strengths, weaknesses and examples of Security and Ethical Challenges of IT *

* The business evidence section is for premium members only. Please contact us about accessing the Business Evidence.

Business Application

Implementation, success factors and measures of Security and Ethical Challenges of IT *

* The business application section is for premium members only. Please contact us about accessing the Business application.

Professional Tools

Security and Ethical Challenges of IT videos and downloads *

* The professional tools section is for premium members only. Please contact us about accessing the professional tools.

Further Reading

Security and Ethical Challenges of IT web and print resources *

Security and Ethical Challenges of IT references (4 of up to 20) *

  • Bagad, V. S. (2009) Management Information Systems, Technical Publications, Pune, India.
  • Berkman, R. (2012) CEOs - Not Just Teens - Can Get in Trouble on Facebook, MIT Sloan Management Review, December.
  • Canham, C. (2014) If Only All Cyber Attacks Could Be Fought with Sausage Rolls..., PR Week, Aug 21.
  • Carayon, P. and Smith, M. J. (2000) Work Organization and Ergonomics, Applied Ergonomics, Vol. 31 (6), pp. 649-62.

* The further reading section is for premium members only. Please contact us about accessing the further reading.


Learn more about KnowledgeBrief Manage and how you can equip yourself with the knowledge to succeed on Security and Ethical Challenges of IT and hundreds of other essential business management techniques

Other members were also interested in...

Related Concept: Safeguarding

This technique offers a review of the essential concept of safeguarding, exploring the legal requirements, explanations and application. It presents a number of case studies and success factors showing you how to create a safe and secure working environment for your staff, clients and customers.