Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER 05 Organizational Structures That Support Strategic Initiatives McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Business Plug-In B7 Ethics.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Protecting People and Information: Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
CIS 429—BUSINESS INFORMATION SYSTEMS Chapter 5: Organizational Structures That Support Strategic Initiatives.
Your Interactive Guide to the Digital World Discovering Computers 2012.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
00870B2F.0/Internet%20Safety.jpg.
Organizational Structures that Support Strategic Initiatives
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics.
Policy, Regulation, and Ethics Policy Systems and procedures must meet policy requirements. Regulation Organizations must comply with requirements of the.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Security and Ethics Safeguards and Codes of Conduct.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Computer Technology Timpview High School
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Ethics and Information Security
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Learning Area 1 Information And Communication Technology and Society
Chapter 13 Security and Ethical Challenges.
Understand ethics and ethical decision-making.
Objective 5.02 Understand ethics and ethical decision-making.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Understand ethics and ethical decision-making.
Presentation transcript:

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Business Plug-In B7 Ethics

7-2 LEARNING OUTCOMES 1. Explain the ethical issues in the use of the information age 2. Identify the six epolicies an organization should implement to protect themselves

7-3 INFORMATION ETHICS O Ethics – The principles and standards that guide our behavior toward other people O Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

7-4 INFORMATION ETHICS O Business issues related to information ethics O Intellectual property O Copyright O Pirated software O Counterfeit software O Digital rights management

7-5 INFORMATION ETHICS O Privacy is a major ethical issue O Privacy – The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent O Confidentiality – the assurance that messages and information are available only to those who are authorized to view them

7-6 INFORMATION ETHICS O Individuals form the only ethical component of MIS O Individuals copy, use, and distribute software O Search organizational databases for sensitive and personal information O Individuals create and spread viruses O Individuals hack into computer systems to steal information O Employees destroy and steal information

7-7 INFORMATION ETHICS O Acting ethically and legally are not always the same

7-8 Information Does Not Have Ethics, People Do O Information does not care how it is used, it will not stop itself from sending spam, viruses, or highly-sensitive information O Tools to prevent information misuse O Information management O Information governance O Information compliance O Ediscovery

7-9 DEVELOPING INFORMATION MANAGEMENT POLICIES O Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement

7-10 Ethical Computer Use Policy O Ethical computer use policy – Contains general principles to guide computer user behavior O The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

7-11 Information Privacy Policy O The unethical use of information typically occurs “unintentionally” when it is used for new purposes O Information privacy policy - Contains general principles regarding information privacy

7-12 Acceptable Use Policy O Acceptable use policy (AUP) – Requires a user to agree to follow it to be provided access to corporate , information systems, and the Internet O Nonrepudiation – A contractual stipulation to ensure that ebusiness participants do not deny their online actions O Internet use policy – Contains general principles to guide the proper use of the Internet

7-13 Privacy Policy O Organizations can mitigate the risks of and instant messaging communication tools by implementing and adhering to an privacy policy O privacy policy – Details the extent to which messages may be read by others

7-14 Privacy Policy

7-15 Privacy Policy O Spam – Unsolicited O Anti-spam policy – Simply states that users will not send unsolicited s (or spam)

7-16 Social Media Policy O Social media policy – Outlines the corporate guidelines or principles governing employee online communications

7-17 WORKPLACE MONITORING POLICY O Workplace monitoring is a concern for many employees O Organizations can be held financially responsible for their employees’ actions O The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical

7-18 WORKPLACE MONITORING POLICY O Information technology monitoring – Tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed O Employee monitoring policy – Explicitly state how, when, and where the company monitors its employees

7-19 WORKPLACE MONITORING POLICY O Common monitoring technologies include: O Key logger or key trapper software O Hardware key logger O Cookie O Adware O Spyware O Web log O Clickstream