ICT ETHICS, POLICY & SECURITY ISSUES Alfred Smith, Patricia Leahy James Parsons June 9 th 2003

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Ethical and Social Issues in Information Systems
INTRODUCTION An ICT policy is in the final stages of being adopted; Provisions in the policy and related strategies which are meant to facilitate policy.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
The Ethical, Philosophical & Social Issues: Telecommunication Projects EDER 677 Team: Holly & Alfred.
American Library Association (ALA) Standard 5: The information literates student understands many of the economic, legal and social issues surrounding.
Social and Economic Impacts of IT Professor Matt Thatcher.
INTERNET and CODE OF CONDUCT
Information and communication technology (ICT) capability Australian Curriculum, F10.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Digital Citizenship By: Miranda Scorver.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Electronic Use Policies.   Social Media  Internet.
Introduction to Computer Science
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Security Issues, Ethics, & Emerging Technologies in Education
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
ICT AND BUSINESS AND SOCIETY
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Teaching and Learning with Technology Chapter 12 Issues in Implementing Technology in Schools ETEC 562 Spring 2004 Sherri Fetter
EDT 608 Unit 8 Acceptable Use Policies. EDT 608 Unit 1 AUP and Freedom Scanning the Internet carries a much greater weight of responsibility than simply.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Information Systems Unit 3.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Legal and Ethical Issues in Computer Security Csilla Farkas
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Social and Ethical Issues Overview of strand 1. Topics of strand 1 1. Reliability and integrity 2. Security 3. Privacy and anonymity 4. Intellectual property.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Professional Ethics and Responsibilities Part-II
Acceptable Use Policy (Draft)
Legal and Ethical Responsibilities
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Chapter # 1 Overview of Ethics
E-Commerce: Regulatory, Ethical, and Social Environments
– Communication Technology in a Changing World
Deciding and acting ethically
The Issues with Technology in education
Communication Technology in a Changing World
Presentation transcript:

ICT ETHICS, POLICY & SECURITY ISSUES Alfred Smith, Patricia Leahy James Parsons June 9 th l%2BIssues%2Bin%2BICT-part%2B2.ppt&ei=qNAlUZCuGsWtrAfCgYHIDA&usg=AFQjCNFYnbQIxrBQKcPuf7cU6LDOIBwLeA&sig2=C4bP14Qk2RXZK-WY1fZKlA&bvm=bv ,d.bmk

INTRODUCTION ICT Ethics, Security & Policy Issues Ethics = The “Rights” & “Wrongs” of ICT usage. Policy = Acceptable Use guidelines Security = Anti-theft, Anti-virus, Anti-Hacker, Anti-fraud measures

PRESENTATION FORMAT PART 1: ICT Ethics PART 1: ICT Ethics Discussion questions (Slide # 12 PART 2: ICT Policy PART 2: ICT Policy Discussion questions (Slide # 18 PART 3: ICT Security PART 3: ICT Security Discussion questions (Slide # 24 References (Slide # 25) References (Slide # 25)

DEFINITION Definition: Ethic, ethical, ethics Ethics is concerned with issues of value, such as judgments about what constitutes "good" or "bad" behavior in any given context. Ethics are the standards, values, morals, principles, etc., which guide one's decisions or actions. ICT Ethics relate to the standards of conduct governing individual, institution’s societies’ & or international use of information & communication technology (Merriam-Webster’s Collegiate Dictionary)

ICT ETHICS RATIONALE Information and communication technology is perhaps the most powerful & pivotal invention to date. It continues to transform all aspects of socioeconomic transaction including employment, education, recreation, procreation, et cetera. However, ICT poses complex ethical dilemmas. The borderless global dimension of ICT underscores the need for ethical guidance and the formulation of consistent ICT standards and codes of conduct, (Floridi, 2002). Information and communication technology is perhaps the most powerful & pivotal invention to date. It continues to transform all aspects of socioeconomic transaction including employment, education, recreation, procreation, et cetera. However, ICT poses complex ethical dilemmas. The borderless global dimension of ICT underscores the need for ethical guidance and the formulation of consistent ICT standards and codes of conduct, (Floridi, 2002).

DOMAINS OF ICT ETHICS Commercial & Legal Issues Commercial & Legal Issues Expression Expression Privacy Issues Privacy Issues Social Justice / Accessibility Social Justice / Accessibility Computer Abuse Computer Abuse Intellectual Property Intellectual Property Moral Responsibility Moral Responsibility Risks Risks

DETAILS OF ICT ETHICS COMMERCIAL / LEGAL ISSUES – concern Fraud, Free-trade, Gambling, Anticompetitive Practices, etc. ICT standards governing commercial & legal issues aim to suppress dishonest business practices and to protect and encourage fair competition EXPRESSION – Concerns, Free Speech, Netiquette (polite- use conventions), etc. ICT related standards aim to control(among other things) hate motivated or indecent communication, whilst protecting free- speech rights.

DETAILS OF ICT ETHICS PRIVACY –, encryption, database or personal information Privacy etc. Concerns Privacy, Anonymity, Spamming, encryption, database or personal information Privacy etc. Ethical standards protect personal & commercial information such as login & password info, credit card and account information and government and commercial databases. It also controls unwanted internet mail and ads (Spam).

DETAILS OF ICT ETHICS SOCIAL JUSTICE – Social Justice relates to The Digital Divide (unequal ICT access), Accessibility for students with special needs, etc. Ethical standards relate to making ICT available and accessible to all peoples, including the disabled and the deprived. Accessibility needs to be kept in mind during curriculum design(in educational contexts), in order to maximize the capabilities of the technology

DETAILS OF ICT ETHICS INTELLECTUAL PROPERTY – concerns Intellectual Content, Student Authenticity, Software Piracy. Patents & Copyright Law, Electronic Copyright etc. ICT Ethical standards aim to control plagiarism, student identity fraud, and the use of copyrighted material, etc. MORAL RESPONSIBILITY – Concerns individual action such as Whistle- blowing (exposing ethical violations) and personal adherence to ethical codes. Ethical standards include a personal moral dimension.

DETAILS OF ICT ETHICS RISKS – Risk faced by ICT users relate to username thefts, Computer hardware & Software Reliability, etc. Related ICT Ethical standards govern Internet Service Providers (ISP), responsibility to protect client information and the quality of computer hardware and software. COMPUTER ABUSE Computer abuse includes Hacking, dissemination of software Worms, software Viruses, Trojan Horses (program that introduces viruses to computers), etc. Related ethical standards aim to penalize violators.

QUESTIONS - ICT ETHICS What means do educational institutions use currently, to ensure student authenticity; that is; registered students produce and present their own work? What means do educational institutions use currently, to ensure student authenticity; that is; registered students produce and present their own work? How could ICT accessibility be improved for disabled and or deprived ICT users? How could ICT accessibility be improved for disabled and or deprived ICT users? How does the “personal moral dimension” of ICT ethics strike you? Does our ethical obligation go beyond standard ethical conduct? How does the “personal moral dimension” of ICT ethics strike you? Does our ethical obligation go beyond standard ethical conduct?

ICT POLICY ISSUES Definition of ICT policy … ICT policy documents are developed by technology user groups to outline their beliefs, vision, strategies, principles and responsibilities in using Information and Communication Technology. ICT policy documents are developed by technology user groups to outline their beliefs, vision, strategies, principles and responsibilities in using Information and Communication Technology.

RATIONALE FOR ICT POLICIES ICT policies emerge from the obligation of user groups, including School Boards and universities, to delineate policies connecting acceptable use protocols with stakeholder rights and responsibilities. ICT policies emerge from the obligation of user groups, including School Boards and universities, to delineate policies connecting acceptable use protocols with stakeholder rights and responsibilities. ICT policies help to minimize or eliminate liability resulting from unacceptable use, or breach of ethic.

DETAILS OF ICT POLICY COPYRIGHT RESPONSIBILITIES … The retrieval of work from a file to the Internet to the desktop has been defined by the courts as a “copy”. The retrieval of work from a file to the Internet to the desktop has been defined by the courts as a “copy”. Do not assume you are protected under the Fair Use exemption because you are enrolled in a course or your work has some educational purpose. Do not assume you are protected under the Fair Use exemption because you are enrolled in a course or your work has some educational purpose. Unless a work categorically states it may be copied freely, it should be considered copyrighted material. Unless a work categorically states it may be copied freely, it should be considered copyrighted material. Teachers should view ICT capabilities as an extension of the classroom while remaining cognizant of copyright responsibilities. Teachers should view ICT capabilities as an extension of the classroom while remaining cognizant of copyright responsibilities. The same technology that allows us to access material almost instantaneously also makes it much easier to obtain copyright permission of works. The same technology that allows us to access material almost instantaneously also makes it much easier to obtain copyright permission of works.

DETAILS of ICT Policy CENSORSHIP ISSUES … The most complicated issue arising out of ICT use might be the imposition of censorship rules. The most complicated issue arising out of ICT use might be the imposition of censorship rules. The advent of monitors and graphic displays create a potentially controversial situation wherein individuals possessing a wide spectrum of moral values might disagree on what constitutes offensive content and can therefore justify censorship. The advent of monitors and graphic displays create a potentially controversial situation wherein individuals possessing a wide spectrum of moral values might disagree on what constitutes offensive content and can therefore justify censorship. ICT Policy must strike a delicate balance in defining a sense of community morality acceptable to a diverse range of user groups.

DETAILS of ICT Policy USER RIGHTS AND RESPONSIBILITIES … ICT Policy should connect acceptable use protocols with stakeholder rights such as freedom of expression and freedom from persecution. ICT Policy should connect acceptable use protocols with stakeholder rights such as freedom of expression and freedom from persecution. ICT Policy should delineate consequences for breaches of appropriate usage. ICT Policy should delineate consequences for breaches of appropriate usage. ICT Policy should outline a comprehensive set of rights and responsibilities for user groups. ICT Policy should outline a comprehensive set of rights and responsibilities for user groups.

QUESTIONS – ICT POLICY 1. You are teaching a world geography course and your students have demonstrated a keen interest in the new geopolitical realities of the former Soviet Union. Your textbook is 15 years old and there is no mention of break away republics. A colleague suggests you photocopy one chapter for each of your students (20 copies in all) from a text he purchased last summer while on vacation. Would this be copyright infringement? Would you copy it regardless? 2. How do teachers, principals, and school boards resolve the dilemma of developing appropriate use policies for ICT users who possess a wide range of moral values? (Content deemed offensive by party “A” is perfectly fine with part “B”.) Where do we draw the line? 3. Ultimately, we expect students to assume responsibility for making good judgment about accessing those Internet sites that contain offensive material. Do filters remove this responsibility from students? Is there a place for filters in our schools?

ICT SECURITY ISSUES RATIONALE The protection of ICT data, facilities, software, hardware, services & processes is an increasingly challenging priority for every sector of society including education. Theft, hacking, and viruses, etc. can seriously compromise ICT systems, resulting in material loss and liability. The protection of ICT data, facilities, software, hardware, services & processes is an increasingly challenging priority for every sector of society including education. Theft, hacking, and viruses, etc. can seriously compromise ICT systems, resulting in material loss and liability. The goal of ICT security is to ensure that ICT systems, data and transactions remain intact and optimized.

DOMAINS OF ICT SECURITY ICT Security Targets The Following Domains: Appropriate Use Of ICT Systems Appropriate Use Of ICT Systems Privacy & Confidentiality of Data Privacy & Confidentiality of Data Integrity of ICT Systems Integrity of ICT Systems Protection of all ICT related Hardware, Software and Facilities Protection of all ICT related Hardware, Software and Facilities ICT Systems Functionality ICT Systems Functionality

DETAILS OF ICT SECURITY APPROPRIATE USE OF ICT SYSTEMS APPROPRIATE USE OF ICT SYSTEMS Effective ICT Security measures ensures that ICT systems are used as intended. PRIVACY & CONFIDENTIALITY OF DATA PRIVACY & CONFIDENTIALITY OF DATA Effective ICT Security measures protects the confidentiality and privacy of consumer and institution data and prevent copyright violations INTEGRITY OF ICT SYSTEMS INTEGRITY OF ICT SYSTEMS Effective ICT Security Systems ensure that Data remains uncompromised and provide for speedy data and systems recovery.

DETAILS OF ICT SECURITY PROTECTION OF ALL ICT RELATED HARDWARE, SOFTWARE AND FACILITIES PROTECTION OF ALL ICT RELATED HARDWARE, SOFTWARE AND FACILITIES Effective ICT Security systems preserve the integrity of all ICT related systems and facilities including hardware & software, communication capabilities, and network systems. ICT SYSTEMS FUNCTIONALITY ICT SYSTEMS FUNCTIONALITY Effective ICT Security systems optimize functionality of ICT systems in all circumstances.

CONSEQUENCES OF ICT ETHICS, POLICY & SECURITY BREACHES ICT Systems are essential and increasingly indispensable for efficient, timely and cost-effective socioeconomic, including educational transactions. They typically represent significant investments. ethical, policy & or security breaches can result in significant liability. Hence, ethical, policy and or security breaches must attract consequences consistent with ethical standards and institution policies. ICT Systems are essential and increasingly indispensable for efficient, timely and cost-effective socioeconomic, including educational transactions. They typically represent significant investments. ethical, policy & or security breaches can result in significant liability. Hence, ethical, policy and or security breaches must attract consequences consistent with ethical standards and institution policies.

QUESTIONS – ICT SECURITY 1. Should educational institutions be liable for breaches such as copyright violations, even after violators have been duly informed? 2.District school boards assert that they own the content of teachers’ correspondences via board ICT networks. Would they be able to make a similar case for ownership of teacher-produced course material such as course websites ?

ICT REFERENCES ICT ETHICS (RESOURCE HOME / MAIN) Fioridi, L. (2002) Ethics in the Infosphere. Retrieved June 6, 2003 from ICT POLICY RESOURCES Howe-Steigler, L., & Donahue, B. (2002). "Technology is changing what's "fair use" in teaching -again". Education Policy Analysis Archives, 10(4). MacKenzie, J. (1995). "Creating board policies for student use of the Internet". The Educational Technology Journal, 5(7). MacKenzie, J. (1996). " A dozen reasons why schools should avoid filtering". The Educational Technology Journal, 5 (5). ICT SECURITY RESOURCES 2,00.html 2,00.html