ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Digital citizenship 21st century learning.
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Security and Ethical Challenges
E-Commerce: Regulatory, Ethical, and Social Environments
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Dr. Ken Cosh.  Outsourcing  Managing Information Systems  Dependency  Reliability  Security  Ethics.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Unethical use of Computers and Networks
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Digital Access Digital Commerce Digital Communication Digital Literacy Digital Etiquette Digital Law Digital Rights and Responsibilities Digital Health.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
ETHICS Internet And Online Community Week 10.
Social and environmental impact
Internet And Online Community Week 10
ISNE101 Dr. Ken Cosh.
E-Commerce: Regulatory, Ethical, and Social Environments
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
Social Issues in Computing
Social Issues in Computing
Ethical Use of Computers
Communication Technology in a Changing World
Ethical Issues in Information Technology By: Ronald F. White, Ph.D.
Presentation transcript:

ISNE101 Dr. Ken Cosh

Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats

This Week  Ethics

Ethical & Social Impact  Ethical issues in the areas of crime, privacy, individuality, employment, health and working conditions.  Impacts can be positive, negative or both;  Computerising a manufacturing process has lead to people losing jobs, while improving the working conditions of those left and producing higher quality product and less cost.

Managing Ethically  Should you monitor employees ?  Should employees use work computers for private purposes?  Should they take copies of software home?  Should you keep electronic copies of employee’s personal records?  Should you sell your customers information?

Management’s Ethical Challenges  Employment  The introduction of IS/IT has created many new jobs, while at the same time eliminating some – how do we ethically introduce job cutting systems?  Computer Monitoring  How can we weigh up our employees right to privacy against the desire to monitor computer usage (as a way of managing employees work)?

Management’s Ethical Challenges  Working Conditions  While IS/IT has removed many repetitive, monotonous tasks, often the human role has changed from one of a craftsman to one of a machine regulating a machine  Individuality  Many IS/IT remove the individual treatment of people by imposing strict, uncustomisable procedures. Rather than dealing with customers individually, we are constrained by the capabilities of the system.

Business Ethics  Stockholder Theory  Managers are agents of the stockholders, with the ethical responsibility to them to increase profits without breaking the law  Social Contract Theory  Companies have an ethical responsibility to all members of society.  Stakeholder Theory  Managers should manage for the benefit of all stakeholders; shareholders, customers, suppliers, local community, employees etc.

Unauthorised Use at Work  Time and Resource Theft (Cyberslacking)  Often monitored by sniffing software.  Includes;  General abuse (spamming, chain letters, spoofing, virus spreading, harrassment, defamatory statements)  Unauthorised Usage and Access (Sharing passwords and network access)  Copyright Infringement / Plagiarism (illegal or pirate software, copying websites or logos)

Unauthorised Use at Work  Transmission of Confidential Data (Sharing company secrets)  Pornography (Accessing inappropriate websites on work resources)  Hacking  Non-work-related bandwidth use (sharing movies, music etc.)  Leisure use (online shopping, chatting, gambling)  Usage of External ISPs (avoiding detection by using external ISP)  Moonlighting (using company resources for personal business).

Privacy  A basic human right is the right to privacy, but this right is brought into question by Technology.  Accessing individuals private conversations and computer records is a violation of privacy  Monitoring peoples whereabouts through CCTV, computer monitoring, Mobile GPS.  Computer matching of customer information gained from different sources.  Collecting telephone number / addresses etc. to build customer profiles

Anonymity  The internet allows almost anonymity  In reality much of it is very visible and open to privacy violations.  But precautions can be taken to protect privacy, such as encryption, authentication etc.

Freedom of Speech / Information  Freedom of speech (information and the press), is another important human right.  Do people have a right to know about matters that others may wish to keep private?  With modern communication systems, sharing opinions (using ones right to free speech) becomes easier;  Flaming  Spamming

Facebook…  So who has read Facebook’s Privacy Policy?