In other words, ethics is concerned with distinguishing between good and evil, between right and wrong human actions. The power that Internet provides to its users is overwhelming. The users can harness the power to do either wonders for the humanity or for its destruction. Individuals can exercise their rights of free speech more enthusiastically and at the same time, technology can control those actions by undermining the rights. The Cyberspace is so diverse that standard laws can’t be enforced. It is extremely important for employees to feel the freedom to be able to perform better. “For example, Alge et al. (2006) found that increased empowerment and extra-role behaviours were a direct result of enhanced information privacy perceptions.” If an employee feels like he is being watched all the time, he may not be able to perform at his best even if he has nothing to hide. Instead he may feel uncomfortable. Some employee even perceive the working environment hostile to their privacy. Genders play a vital role in this issue. “Moving into the world of IS professionals, Kuo et al. (2007) found that women exceeded men in regulatory self-efficacy overall and particularly in terms of whether they protected information and acquired extra information about an individual. (Kirstie Ball Elizabeth M. Daniel Chris Stride, (2012))” Protection of employees’ personal information is another issue. “Rapid advances in …show more content…
Where we are enjoying the benefits of high speed internet and the comfort to access our contents anywhere in the world, we are also potential victims to the cyber threats and attacks. Especially in last five years, cyber- attacks have increased at a phenomenal rate. This raised the need to have higher security applications that will provide better Confidentiality, Integrity and the Availability of companies’ data. To be able to protect the data and not violate privacy practices, governments need to understand the ethics around cyber security. Cybersecurity research ethics group has pointed out some challenges. These challenges are not exceptional, but increasingly the norm. For example: (i) to recognize significant Internet threats and develop effective defenses researchers infiltrate malicious botnets; (ii) to understand Internet fraud(phishing) studies researchers surreptitiously observe users in order to ascertain typical behaviors; and (iii) to empirically measure network usage and characteristics researchers require access to users’ nonpublic traffic. Governments need to create a better understanding of the cyberspace and the consequences of implementing information gathering applications that can monitor individuals’ actions without their