UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.

Slides:



Advertisements
Similar presentations
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Advertisements

Shades of Grey Suzy Jagger Challenging students in the area of Cyber-ethics.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business.
MIS 301 Information Systems in Organizations
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Computer Programming I
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ethical Issue Computer Ethics. Why do we have to consider computer ethics? The advancements of computer/internet have significant influence on our lives.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
ETHICS and COMPUTERS An Overview 23/04/2017.
Security and Ethics Privacy Employment Health Crime Working
Essential Standard 2.00 Understand the nature of business. 1.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
Privacy, Security and Ethics
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
Ethical aspects and copyright law. Ethical Responsibility ethics: what is right and what is wrong law: consensus, can be enforced theories: overall good,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
ETHICS Internet And Online Community Week 10.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
Security and Ethical Challenges
Privacy and the Law.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Legal and Ethical Issues in E-Commerce
Internet And Online Community Week 10
ISNE101 Dr. Ken Cosh.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
Computer Programming I
Social Issues in Computing
Social Issues in Computing
Communication Technology in a Changing World
Presentation transcript:

UDMIS.info Ethics and IS

UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order

UDMIS.info Security & Ethical Challenges Privacy Accuracy Property Access Human Impacts

UDMIS.info Ethical Considerations Ethical Principles Proportionality Informed Consent Justice Minimized Risk Standard of Conduct Act with integrity Protect the information privacy & confidentiality Do not misrepresent or withhold information Do not misuse resources Do not exploit weakness of systems Advance the health and welfare of general public

UDMIS.info Ethical Issues Privacy Internet privacy Corporate Matching Accuracy Credit card accounts Student Records Property Intellectual property Software piracy Identity Theft Who owns the bandwidth? Access Who can see it? Who should see it? Can everybody with appropriate rights get access to see it?

UDMIS.info Privacy Issues IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily. Benefit – increases efficiency and effectiveness But, may also have a negative effect on individual’s right to privacy Accessing private and computer records & sharing information about individuals gained from their visits to websites and newsgroups

UDMIS.info Privacy Issues Always knowing where a person is via mobile and paging services Computer Matching Computer profiling and matching personal data to that profile Mistakes can be a major problem Protect your privacy by Encrypting your messages Post to newsgroups through anonymous r ers Ask your ISP not to sell your information to mailing list providers and other marketers Decline to reveal personal data and interests online

UDMIS.info Computer Libel and Censorship (The opposite side of the privacy debate) Right to know (freedom of information) Right to express opinions (freedom of speech) Right to publish those opinions (freedom of the press) Spamming Flaming Anonymity of domain ownership From where did my campaign funds come?

UDMIS.info Human Impacts Employee Monitoring (especially online) Deskilling (robotic welders) Intellectual Property Protection (Napster or KaZaA) Human Control (Airbus Fly-by-Wire)

UDMIS.info Computer Monitoring Concerns workplace privacy Monitors individuals, not just work Is done continually. May be seen as violating workers’ privacy & personal freedom Workers may not know that they are being monitored or how the information is being used May increase workers’ stress level May rob workers of the dignity of their work

UDMIS.info Health Issues Job stress Muscle damage Eye strain Radiation exposure Accidents Ergonomic design to ameliorate these problems

UDMIS.info Monitoring “Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.” Widespread monitoring of Magic Lantern Carnivore

UDMIS.info Law & Order Irony of a private person being accessible by so many It’s always been doable; just not this easily (see examples throughout the episode) Worms Privacy and the law Who’s morally responsible for how information is used? If your software or service is used by somebody as a means to kill another, who’s responsible?