ETHICS, POLICY & SECURITY ISSUES

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

CHAPTER 4 E-ENVIRONMENT
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ICT ETHICS, POLICY & SECURITY ISSUES Alfred Smith, Patricia Leahy James Parsons June 9 th 2003
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Welcome! Internal Auditing CHAPTER 1. Definition Internal auditing is an independent, objective, assurance and consulting activity designed to add value.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
PROJECT MANAGEMENT ETHICS
Chapter 29 Ethics in Accounting
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
American Library Association (ALA) Standard 5: The information literates student understands many of the economic, legal and social issues surrounding.
SE 112 Slide 1 SE 112 l
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Higher Administration
Ethics Lecture Dr. Christina Howe
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
CDU – School of Information Technology HIT241 Professional Practice… - Slide 1 IT Project Management ACS - Core Body of Knowledge In Australia in November.
Introduction to Computer Science
Home. Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.Glencoe Accounting The accounting profession requires its members to follow a.
CISB 412 Social and Professional Issues Professional Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ETHICS and COMPUTERS An Overview 23/04/2017.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
IT Professionalism Ethics Modified by Andrew Poon.
ETHICS, POLICY & SECURITY ISSUES
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Ethics Business Ethics  Unit Essential Question: How does ethical behavior affect my business decisions?  EQ: How does a business monitor itself to ensure.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
Ethics.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
CHAPTER 5 ETHICS & PRIVACY.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Protecting your Managed Services Practice: Are you at Risk?
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Professional Ethics and Responsibilities Part-II
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Information Security and Privacy in HRIS
CAPACITY BUILDING PROGRAMME ON BOARD INDUCTION AND EVALUATION
The accounting profession requires its members to follow a code of ethics.
CHAPTER FOUR OVERVIEW SECTION ETHICS
CAPACITY BUILDING PROGRAMME ON BOARD INDUCTION AND EVALUATION
Chapter 9 Ethics and Professional Practice in IT
ETHICS.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
DIGITAL BUSINESS APPLICATIONS
Ethical Issues in Social Media Mining
Privacy & Access to Information
OBSERVE ETHICAL PRACTICES
CHAPTER FOUR OVERVIEW SECTION ETHICS
Computer Ethics.
Chapter 13: The IT Professional
Ethical, Social and Political Issues
Presentation transcript:

ETHICS, POLICY & SECURITY ISSUES CIIT---ETHICS,POLICY AND SECURITY ISSUES

INTRODUCTION ICT Ethics, Security & Policy Issues Policy is acceptable use of guidelines Ethics is the right and wrong of IT (Information Technology) usage Security is a measures from anti-theft, anti-virus, anti-hacker, anti-fraud CIIT---ETHICS,POLICY AND SECURITY ISSUES

Ethical vs. Legal Issues Sometimes have a definitive answer Determination is made by others (not you) Ethical issues: You determine your course of action The law doesn’t make it “right”, Being “right” doesn’t make it legal Q Legal – attempt to codify ethical behavior; it lags; changes over time, reactive to society Ethics – part of society, part of us We will note more differences as we progress CIIT---ETHICS,POLICY AND SECURITY ISSUES ETHICS, POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES Ethical Issues Ethical 1. pertaining to or dealing with morals or the principles of morality; pertaining to right and wrong in conduct. 2. in accordance with the rules or standards for right conduct or practice, esp., the standards of a profession. Examples: Should companies collect and/or sell customer data? Should IT specialists monitor and report employee computer use? CIIT---ETHICS,POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES Ethical Principals Three useful ethical principals: An act is ethical if all of society benefits from the act. An act is ethical if people are treated as an end and not as a means to an end. An act is ethical if it is fair to all parties involved. CIIT---ETHICS,POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES Frameworks for Ethics Two basic frameworks consequence-based Priority is given to choices that lead to a “good” outcome (consequence) The outcome outweighs the method rule-based Priority is given to following the rules without undue regard to the outcome Stress fidelity to a sense of duty and principle (“never tell a lie”) Exist for the benefit of society and should be followed CIIT---ETHICS,POLICY AND SECURITY ISSUES

Four Ethical Issues of the Information Age Privacy - right of individual to control personal information Accuracy – who is responsible for the authenticity, fidelity, and accuracy of information? Property – Who owns the information? Who controls access? (e.g. buying the IP verses access to the IP) Accessibility – what information does an organization have the right to collect? Under what safeguards? 1: CIIT---ETHICS,POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES COMPUTER ABUSE COMPUTER ABUSE Computer abuse includes Hacking, dissemination of software Worms, software Viruses, Trojan Horses (program that introduces viruses to computers), etc. CIIT---ETHICS,POLICY AND SECURITY ISSUES

DOMAINS OF ICT SECURITY ICT Security Targets The Following Domains: Appropriate Use Of ICT Systems Privacy & Confidentiality of Data Integrity of ICT Systems Protection of all ICT related Hardware, Software and Facilities ICT Systems Functionality CIIT---ETHICS,POLICY AND SECURITY ISSUES

DETAILS OF ICT SECURITY 1. APPROPRIATE USE OF ICT SYSTEMS Effective ICT Security measures ensures that ICT systems are used as intended. 2. PRIVACY & CONFIDENTIALITY OF DATA Effective ICT Security measures protects the confidentiality and privacy of consumer and institution data and prevent copyright violations 3. INTEGRITY OF ICT SYSTEMS Effective ICT Security Systems ensure that Data remains uncompromised. CIIT---ETHICS,POLICY AND SECURITY ISSUES

DETAILS OF ICT SECURITY (contd..) 4. PROTECTION OF ALL ICT RELATED HARDWARE, SOFTWARE AND FACILITIES Effective ICT Security systems preserve the integrity of all ICT related systems and facilities including hardware & software, communication capabilities, and network systems. 5. ICT SYSTEMS FUNCTIONALITY Effective ICT Security systems optimize functionality of ICT systems in all circumstances. CIIT---ETHICS,POLICY AND SECURITY ISSUES

CONSEQUENCES OF ICT ETHICS, POLICY & SECURITY VIOLATION ICT Systems are essential and increasingly indispensable for efficient, timely and cost-effective socioeconomic, including educational transactions. They typically represent significant investments. ethical, policy & or security breaches can result in significant liability. Hence, ethical, policy and or security breaches must attract consequences consistent with ethical standards and institution policies. CIIT---ETHICS,POLICY AND SECURITY ISSUES