CptS 401 Adam Carter. Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Access is defined as physical access: The ability to receive, view, or discuss the Criminal History Record Information (CHRI) regardless of retrieval method.
The Internet.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security, Privacy, and Ethics Online Computer Crimes.
CptS 401 Adam Carter. For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class!
Chapter 10 Privacy and Security McGraw-Hill
Professional Ethics and Responsibilities
CS 306 Work 6.1 Fears and Questions Many Social Critics, Social Scientists, Politicians, Unions, and activists saw virtually all potential effects of computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 6: Work.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Information Processing Lecture 3A Information Technology and The Law.
The Workplace and Computer Ethics
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
INTERNET and CODE OF CONDUCT
OSHA Long Term Care Worker Protection Train the Trainer Program Part 1: Introduction.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Higher Administration
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Chapter 3 Exploring Careers
How much do you know about stalking?. How many women in Britain are stalked at some point in their adult life? (between ages of 16 – 59) A) 1 in 3 B)
Computer Misuse The Kingsway School. Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
CS 4001Mary Jean Harrold 1 Computers and Work. CS 4001Mary Jean Harrold2 Outline 8.1 Changing nature of work 8.2 Impact on employment 8.3 The work environment.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Chapter 6 FINDING AND APPLYING FOR A CAREER. USING TECHNOLOGY AT WORK Information Technology (IT) refers to the creation and installation of computer.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Monitoring Employees on Networks: Unethical or Good Business?
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Chapter 9 Enhancing Information/Computer Security.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
CM 115 Unit 9: Mediated Communication. There benefits and drawbacks of the use of information and communication technology in: manufacturing, industry,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Internet Safety Internet Safety LPM
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
A Gift of Fire Fourth edition Sara Baase
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Social and Economic Implication of the use of the Computers By Indrani Chakraborty For IX CS.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Section 6.1 Government and Laws Chapter 6 legal and ethical issues Section 6.2 Social Responsibilities and Ethics.
Essential Standard 2.00 Understand the nature of business. 1.
Technological Awareness for Teens and Young Adults.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Health, Safety and Privacy in the Workplace OSHA Worker’s Compensation Polygraph Protection Act Electronic Communications Privacy Act.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Other Sources of Information
Computers in the Workplace
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

CptS 401 Adam Carter

Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction C. Easier to work with clients D. All of the above E. None of the above

Answer  D – All of the above (328)

Question  Which of the following is a commonly cited problem with telecommuting? A. Resentment among coworkers B. Decreased productivity C. Lack of employee direction D. All of the above E. None of the above

Answer  D – all of the above (329)

Question  As telecommuting increased in popularity, the Occupational Health and Safety Administration (OSHA) applied the following regulations: A. Prohibiting telecommunication in residential areas B. Regulating the home working conditions of telecommuters C. Requiring additional government licenses for telecommuters D. All of the above E. None of the above

Answer  E – None of the above  “[OSHA] said it would not hold employers responsible for conditions in the homes” (331)  Ask the audience: Is regulating work/home environments a good idea?

Question  From 1975 and 1985, the average number of employees per company: A. Declined B. Increased C. Stayed about the same

Answer  A – “the average number of employees per firm declined by 20%” (332)  Did this surprise anyone?

Question  A “logic bomb” is: A. A difficult puzzle B. A critical error in a software program C. Software that destroys critical files D. A type of computer virus

Answer  C (333)

Question  According to the book, many people who embezzle: A. Have a prior criminal record, usually a minor offense B. Have a prior criminal record, usually a felony C. Have no criminal record

Answer  C (334)  Recall from section 6.2 that many companies fire people that have minor criminal records. Would this be an effective measure to prevent corporate crime?

Question  Computer-based monitoring systems make it easier to track what group of workers?  Blue-collar (factory) workers  White-collar (professional) workers  Pink-collar (clerical) workers  Pink-collar (artistic) workers

Question  A Common way to track employees is to: A. Track performance data, such as keystrokes B. Track an employee’s location C. Monitor and voice communications D. All of the above E. None of the above

Answer  B (335)  Are you monitored at work?

Answer  D – See the bulleted list on page 336

Question  The Electronic Communications Privacy Act (ECPA) prohibits interception of and reading of stored without a court order A. True B. False

Answer  False “the ECPA makes an exception for business systems” (340)

Question  A major concern for businesses that allow employees to visit any website is that: A. Shady websites may infect a work computer with a virus B. Video sites may slow down the network C. They may be held liable for what the employee posts or downloads D. All of the above E. None of the above

Answer  D – All three are discussed on page 343.  Can you think of any big cases in which hackers exploited employee-operated computers?

Discussion  Is telecommuting something that you would be interested in doing? Would your productivity suffer?

Discussion  Should we prevent certain kinds of home-based work Example: sewing vs office work A. Yes B. No

Discussion  Is it okay to monitor employees?  Discuss from both the view of a company and that of an employee.

Discussion  As employees, what kinds of precautions should we use when interacting with company property? Are these precautions realistic?

Discussion  Should government communications be subject to the same kinds of scrutiny similar to what takes place in private companies? A. Yes B. No C. Maybe

Discussion  The book makes a strong case for pervasiveness of employee crime. Have you ever taken something without permission from your work?