ETHICS, POLICY & SECURITY ISSUES

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

CHAPTER 4 E-ENVIRONMENT
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ICT ETHICS, POLICY & SECURITY ISSUES Alfred Smith, Patricia Leahy James Parsons June 9 th 2003
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Welcome! Internal Auditing CHAPTER 1. Definition Internal auditing is an independent, objective, assurance and consulting activity designed to add value.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
PROJECT MANAGEMENT ETHICS
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Chapter 29 Ethics in Accounting
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
American Library Association (ALA) Standard 5: The information literates student understands many of the economic, legal and social issues surrounding.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Higher Administration
Ethics Lecture Dr. Christina Howe
CDU – School of Information Technology HIT241 Professional Practice… - Slide 1 IT Project Management ACS - Core Body of Knowledge In Australia in November.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Introduction to Computer Science
Home. Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.Glencoe Accounting The accounting profession requires its members to follow a.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
L, E & P ISSUES1 Follow up on PSP: The PSP is about QUALITY - numerous measures are used - with the obvious commitments to data collection. One of the.
1 Profesional Ethics & Social Responsibility. 2 Objectives What is ethics, and why is it important to act according to a code of principles? Why is business.
ICS424 Computer and Professional Ethics Aj. Thoranin Intarajak.
ETHICS and COMPUTERS An Overview 23/04/2017.
IT Professionalism Ethics Modified by Andrew Poon.
ETHICS, POLICY & SECURITY ISSUES
Professionalism in Computing An Overview Khurshid Ahmad, Prof. PhD, CEng., MBCS Department of Computing, University of Surrey, Guildford, Surrey.
Ethics Business Ethics  Unit Essential Question: How does ethical behavior affect my business decisions?  EQ: How does a business monitor itself to ensure.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 Professional Ethics and Responsibilities.
Ethics of Accounting and Finance
Ethics.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
CHAPTER 5 ETHICS & PRIVACY.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Professional Ethics and Responsibilities
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Protecting your Managed Services Practice: Are you at Risk?
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Orderly Termination.  Performance – An employee’s skills, knowledge, aptitude, attitude, and effort.
Professional Ethics and Responsibilities Part-II
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Information Security and Privacy in HRIS
CAPACITY BUILDING PROGRAMME ON BOARD INDUCTION AND EVALUATION
The accounting profession requires its members to follow a code of ethics.
CHAPTER FOUR OVERVIEW SECTION ETHICS
CAPACITY BUILDING PROGRAMME ON BOARD INDUCTION AND EVALUATION
Chapter 9 Ethics and Professional Practice in IT
Key Thoughts Trust is crucial to developing successful relationships with customers. Build trust by being competent, compatible, candid, customer-oriented,
ETHICS.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
PowerPoint® Slides to Accompany
Ethical Issues in Social Media Mining
Welcome Back Glencoe Accounting.
Understand ethics and ethical decision-making.
OBSERVE ETHICAL PRACTICES
CHAPTER FOUR OVERVIEW SECTION ETHICS
Computer Ethics.
Understand ethics and ethical decision-making.
ACM Code of Ethics CSCI 362: Data Structures.
Presentation transcript:

ETHICS, POLICY & SECURITY ISSUES CIIT---ETHICS,POLICY AND SECURITY ISSUES

INTRODUCTION ICT Ethics, Security & Policy Issues Policy is acceptable use of guidelines Ethics is the right and wrong of IT (Information Technology) usage Security is a measures from anti-theft, anti-virus, anti-hacker, anti-fraud CIIT---ETHICS,POLICY AND SECURITY ISSUES

Ethical vs. Legal Issues Sometimes have a definitive answer Determination is made by others (not you) Ethical issues: You determine your course of action The law doesn’t make it “right”, Being “right” doesn’t make it legal Q Legal – attempt to codify ethical behavior; it lags; changes over time, reactive to society Ethics – part of society, part of us We will note more differences as we progress CIIT---ETHICS,POLICY AND SECURITY ISSUES ETHICS, POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES Ethical Issues Ethical 1. pertaining to or dealing with morals or the principles of morality; pertaining to right and wrong in conduct. 2. in accordance with the rules or standards for right conduct or practice, esp., the standards of a profession. Examples: Should companies collect and/or sell customer data? Should IT specialists monitor and report employee computer use? CIIT---ETHICS,POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES Ethical Principals Three useful ethical principals: An act is ethical if all of society benefits from the act. An act is ethical if people are treated as an end and not as a means to an end. An act is ethical if it is fair to all parties involved. CIIT---ETHICS,POLICY AND SECURITY ISSUES

The main ethics for computer professionals Are experts in their field, Know customers rely on their knowledge, expertise, and honesty, Understand their products (and related risks) affect many people, Follow good professional standards and practices, Maintain an expected level of competence and are up-to-date on current knowledge and technology, and  Educate the non-computer professional CIIT---ETHICS,POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES Frameworks for Ethics Two basic frameworks consequence-based Priority is given to choices that lead to a “good” outcome (consequence) The outcome outweighs the method rule-based Priority is given to following the rules without undue regard to the outcome Stress fidelity to a sense of duty and principle (“never tell a lie”) Exist for the benefit of society and should be followed CIIT---ETHICS,POLICY AND SECURITY ISSUES

Four Ethical Issues of the Information Age Privacy - right of individual to control personal information Accuracy – who is responsible for the authenticity, fidelity, and accuracy of information? Property – Who owns the information? Who controls access? (e.g. buying the IP verses access to the IP) Accessibility – what information does an organization have the right to collect? Under what safeguards? 1: CIIT---ETHICS,POLICY AND SECURITY ISSUES

CIIT---ETHICS,POLICY AND SECURITY ISSUES COMPUTER ABUSE COMPUTER ABUSE Computer abuse includes Hacking, dissemination of software Worms, software Viruses, Trojan Horses (program that introduces viruses to computers), etc. CIIT---ETHICS,POLICY AND SECURITY ISSUES

DOMAINS OF ICT SECURITY ICT Security Targets The Following Domains: Appropriate Use Of ICT Systems Privacy & Confidentiality of Data Integrity of ICT Systems Protection of all ICT related Hardware, Software and Facilities ICT Systems Functionality CIIT---ETHICS,POLICY AND SECURITY ISSUES

DETAILS OF ICT SECURITY 1. APPROPRIATE USE OF ICT SYSTEMS Effective ICT Security measures ensures that ICT systems are used as intended. 2. PRIVACY & CONFIDENTIALITY OF DATA Effective ICT Security measures protects the confidentiality and privacy of consumer and institution data and prevent copyright violations 3. INTEGRITY OF ICT SYSTEMS Effective ICT Security Systems ensure that Data remains uncompromised. CIIT---ETHICS,POLICY AND SECURITY ISSUES

DETAILS OF ICT SECURITY (contd..) 4. PROTECTION OF ALL ICT RELATED HARDWARE, SOFTWARE AND FACILITIES Effective ICT Security systems preserve the integrity of all ICT related systems and facilities including hardware & software, communication capabilities, and network systems. 5. ICT SYSTEMS FUNCTIONALITY Effective ICT Security systems optimize functionality of ICT systems in all circumstances. CIIT---ETHICS,POLICY AND SECURITY ISSUES

CONSEQUENCES OF ICT ETHICS, POLICY & SECURITY VIOLATION ICT Systems are essential and increasingly indispensable for efficient, timely and cost-effective socioeconomic, including educational transactions. They typically represent significant investments. ethical, policy & or security breaches can result in significant liability. Hence, ethical, policy and or security breaches must attract consequences consistent with ethical standards and institution policies. CIIT---ETHICS,POLICY AND SECURITY ISSUES