COMPUTER ETHICS: Gender Effects and Employee Internet Misuse

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Professional Ethics Social Implications of Computers.
BUSINESS B2 Ethics.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
How to keep your kids safe online
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
Little brother is watching you
Computer Security Fundamentals
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
ATP Winter 2008 Workshop Jim Valkenburg Delta College.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Inappropriate Work Behavior CTE 1-Career and Technology Exploration.
Ethics Lecture Dr. Christina Howe
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Technology Acceptable Use Policy. Each student must sign and follow the BCPSS Acceptable Use Policy (AUP). You and your parents agree that you will conduct.
They're doing what online? Assessing college students' use of technology Stacy Ackerlind, Ph.D. University of Utah Kim VanDerLinden, Ph.D. StudentVoice.
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Coding Compliance Plan July 12, Benefits of a compliance program  To demonstrate our commitment to honest and responsible conduct, decrease the.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Digital Citizenship Pre-Assessment. Digital Citizenship Respect.
Gendered Public Policies Sexual Harassment in the Workplace.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
IT Professionalism Ethics Modified by Andrew Poon.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Ethics.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Professional Ethics & Codes of Conduct Lecture 3.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Ethical Issues in Computing
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
Lesson 2: Workplace Digital Communication
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Objectives n Differentiate between ethics and business ethics n Discuss benefits of managing ethics in the workplace n Identify characteristics of ethics.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Keeping your children safe with technology
CSCI 392 Review of Computing and Society
Building Credibility for Your Speech
Solutions of Case Study 4 & 6
CSCI 392: Seminar in Computing and Society
Chapter 14 Memos In the workplace, the memo performs a vital function: conveying focused information to a specific audience. As an internal communication.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Dissertation Findings
Chapter # 1 Overview of Ethics
Professional Codes of Ethics
CSCE 606: Licensing and Software Engineering Code of Ethics
CSCE 606: Licensing and Software Engineering Code of Ethics
Understand ethics and ethical decision-making.
Why Study Ethics and computing?
The Psychology of Security
Computer Ethics: Men & Women
Objective 5.02 Understand ethics and ethical decision-making.
Understand ethics and ethical decision-making.
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
What Are Ethics? What are the objectives?
9-3 Applying for Employment
CS-480b Network Security Dick Steflik
Presentation transcript:

COMPUTER ETHICS: Gender Effects and Employee Internet Misuse Written By: Kimberly S. Young & Carl J. Case Presented By: Matthew Breslin

Short Summary Purpose of Study: Whether or not gender differences influence the degree to which individuals recognize unethical conduct in the use of IT at work. 6 Ethical Dilemmas Presented Personal Use of the Internet Downloading music Viewing online pornography Visiting chat rooms Electronically sending jokes Participating in cyber-sex Results: Disconnect between indicated degree of misuse and actual behavior in the workplace. *Companies must do more to enforce or communicate policies, especially to college grads entering workforce

Short Summary Research Design: Web based survey including 6th ethical dilemmas. Participants responded to the survey posted at the site for the Center of Internet Addiction Recovery. Respondents provide demographic information. Then rated the level of misuse from 0-7.

Short Summary MALES Most Common Activities Least Common Activities Personal email 78%, Instant Messaging 59%, pornography 58%, music downloading 52% and gaming 51% Least Common Activities Chat Rooms 22%, online auctions 24%, online shopping 24%, stock watching 8% and internet gambling 6% FEMALES Most Common Activities Personal email 76%, instant messaging 57%, music downloading 47% Least Common Activities Gaming sites 40%, online shopping 31%, online auctions 22%, chat rooms 20%, stock watching 5%, internet gambling 4%

Short Summary Strong correlation between male and female responses EX: 38% Male 39% Female personal use of internet during lunch is not misuse, 4% Male 4% female no misuse in terms of downloading free music at work, 10% Male 10% Female misuse in electronically distributing jokes Same percentage that said music downloading and pornography is misuse admit doing it Burden falls upon companies to better communicate and enforce ethical internet use in the workplace

Personal Opinion It is becoming increasingly important to enforce proper internet use because as long as use continues to rise, so will misuse All companies should put employees through annual internet use/abuse training This should clearly cover all limitations, situations, suggested actions, and implications. Using IT department to monitor internet use and block unwanted sites is an important aspect of avoiding ethical issues on the web

ETHICAL ISSUES 1.3 Be honest and trustworthy. 1.7 Respect the privacy of others. 2.1 Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work. 2.3 Know and respect existing laws pertaining to professional work 2.6 Honor contracts, agreements, and assigned responsibilities. 2.8 Access computing and communication resources only when authorized to do so

Questions What sections of the ACM Code of Professional Conduct are applicable to this issue? Who is at greater risk to misuse company computer, a new graduate or an experienced employee? What were the 3 most common internet activities in the workplace? (male and female) To what degree were males and females either similar or different in their responses regarding degrees of misuse?

Case Study A company requests you to write a program sorting applicants for acceptance review. In their detailed request, they state they want all white male applicants to be put at the top of the list, followed by black males, Latinos, and females. Should you oblige to the company’s request and gain business? If not, why?

Case Study Answer Answer: ACM members are to be fair and not take action to discriminate according to section 1.4. For this reason, you should tell the client you are unable to create a system to discriminate according to race. Perhaps suggest creating a program that will order the applicants by GPA or previous starting salaries rather than race or gender.