Thus, organizations need to focus on the codes of ethics to control these measures (Shelly, Cashman, Gunter & Gunter, 2007, p. 484). The study has taken into consideration certain literature reviews and a few companies in the region of Saudi Arabia have been taken as case studies reflecting the ethical practices in business organizations on the use of computers and information technology. Research Framework: To study the ethical codes maintained in organizations in Saudi Arabia in the context of the use of computers and IT, this report focuses on certain theoretical study work based on the institutional theories on IT and organizational learning to provide with a fundamental understanding on the ethical issues related to information systems.
Moreover, the research focuses on some of the selected organizations from Saudi Arabia to reflect on the current scenario of ethical practices in Saudi Arabia. The use of IT has developed largely in a short period of time spreading across the globe in different regions providing high quality services to its users. The broadening of the information systems across the world has led to decrease in the regulation process that enhances the use of unethical practices.
The internet is one such service provider that has become highly influencing on its users in the current world. Countries like Saudi Arabia have been found to take control measures on internet providers (George, 2003, pp. 7-255). Thus along with the theoretical framework, the organizations and the ethical measures applied in the Saudi Arabian business organizations have been studied for the research. Theoretical Framework: Administration and management within organizations can be attained through either centralized or decentralized organizational structures. Centralized processes are performed through processing of different information vertically.
In case of decentralized design, the processing of information happens horizontally. The services of IT in this context are highly beneficial in the sense that IT provides increasing speed, quantity and quality of information that can be exchanged between different departments of an organization. IT’s participation in increasing the potential of a firm’s performance have been observed to have significant importance in organizations. Organizational learning greatly determines the usage and relationship of the organization’s management techniques and the use of IT.
Organizational learning in this respect may be either exploration of new products and customers, or it may be exploitation that focuses on improvements on existing products.
1. About SABIC. (2011), SABIC, available at: http://www.sabic.com/corporate/en/default.aspx (accessed on September 16, 2011)
2. Business Overview. (2006), Algosaibi-gtb, available at: http://www.algosaibi-gtb.com/default.htm (accessed on September 16, 2011)
3. Code of Ethics. (2010), SABIC, available at: http://www.sabic.com/corporate/en/binaries/sabic%20code_tcm4-5211.pdf (accessed on September 16, 2011)
4. Currie, W.L. & E.B. Swanson. (2009), Special issue on institutional theory in information systems research: contextualizing the IT artifact, Journal of Information Technology, Vol.24, pp.283-285, available at: http://www.palgrave-journals.com/jit/journal/v24/n4/pdf/jit200917a.pdf (accessed on September 16, 2011)
5. George, R.T. D. (2003), The ethics of information technology and business, New Jersey: Wiley-Blackwell
6. Information Resources Management Association. (1994), Managing social and economic change with information technology, Chicago: Idea Group Inc
7. Information Technology. (2006), Algosaibi-gtb, available at: http://www.algosaibi-gtb.com/operation_infotech.htm (accessed on September 16, 2011)
8. Mahr, F. (2010), Aligning Information Technology, Organization, and Strategy, Germany: Gabler Verlag
9. NCS ME. (2010), Babtain, available at: http://babtain.com/ (accessed on September 16, 2011)
10. Northcutt, S. (2004), IT ethics handbook: right and wrong for IT professionals, Netherlands: Elsevier
11. Our Services. (n.d.), Saadit, available at: http://www.saadit.com/ourservices.aspx# (accessed on September 16, 2011)
12. Shelly, G.B. Cashman, T.J. Gunter, G.A. & R.E. Gunter. (2007), Teachers discovering computers: integrating technology and digital media in the classroom, Connecticut: Cengage Learning
13. Stanton, J.M. & K.R. Stam. (2003), Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives, Surveillance & Society, Vol.1, No.2, pp.152-190, available at: http://www.surveillance-and-society.org/articles1(2)/boundarytheory.pdf (accessed on September 16, 2011)
14. Welcome to Al-Babtain Group. (2010), Babtain, available at: http://babtain.com/ (accessed on September 16, 2011)
15. Welcome to Saad Information Technology. (n.d.), Saadit, available at: http://www.saadit.com/aboutus/whoeweare.aspx (accessed on September 16, 2011)