McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER 05 Organizational Structures That Support Strategic Initiatives McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Chapter 29 Ethics in Accounting
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Business Plug-In B7 Ethics.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
Internal Auditing and Outsourcing
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Protecting People and Information: Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 3 Internal Controls.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
BUSINESS DRIVEN TECHNOLOGY
Home. Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.Glencoe Accounting The accounting profession requires its members to follow a.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Monitoring Employees on Networks: Unethical or Good Business?
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved CHAPTER 5 Organizational Structures that Support Strategic Initiatives.
Organizational Structures that Support Strategic Initiatives
ETHICS, POLICY & SECURITY ISSUES
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 5-1 BUSINESS DRIVEN TECHNOLOGY Chapter Five: Organizational Structures that.
BUSINESS ETHICS Why is Business Ethics important in Business.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
CHAPTER 5 ETHICS & PRIVACY.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Computer Technology Timpview High School
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CBP Program – Business Etiquette Module 4: Business Ethics.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Governance, risk and ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
The accounting profession requires its members to follow a code of ethics.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-2 LEARNING OUTCOMES 1.Summarize the guidelines for creating an information privacy policy. 2.Identify the differences between an ethical computer use policy and an acceptable computer use policy 3.Describe the relationship between an privacy policy and an Internet use policy

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-3 LEARNING OUTCOMES 4.Explain the effects of spam on an organization. 5.Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-4 INTRODUCTION Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT: – Intellectual property – Copyright – Fair use doctrine – Pirated software – Counterfeit software

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-5 INTRODUCTION ePolicies address information privacy and confidentiality issues – ePolicies – policies and procedures that address the ethical use of computers and Internet usage – Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent – Confidentiality – the assurance that messages and data are available only to those who are authorized to view them

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-6 Ethics Individuals form the only ethical component of an IT systems

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-7 Ethics Acting ethically and legally are not always the same

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-8 INFORMATION HAS NO ETHICS Information has no ethics Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-9 Developing Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include: – Ethical computer use policy – Information privacy policy – Acceptable use policy – privacy policy – Internet use policy – Anti-spam policy

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved ETHICAL COMPUTER USE POLICY Ethical computer use policy – contains general principles to guide computer user behavior The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved ETHICAL COMPUTER USE POLICY Six principles for ethical information management

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved INFORMATION PRIVACY POLICY The unethical use of information typically occurs “unintentionally” when it is used for new purposes – For example, social security numbers started as a way to identify government retirement benefits and are now used as a sort of universal personal ID Information privacy policy - contains general principles regarding information privacy

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved INFORMATION PRIVACY POLICY Information privacy policy guidelines: 1.Adoption and implementation of a privacy policy 2.Notice and disclosure 3.Choice and consent 4.Information security 5.Information quality and access

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved ACCEPTABLE USE POLICY Acceptable use policy (AUP) – a policy that a user must agree to follow in order to be provided access to a network or to the Internet An AUP usually contains a nonrepudiation clause – Nonrepudiation – a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved ACCEPTABLE USE POLICY

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved PRIVACY POLICY Organizations can mitigate the risks of and instant messaging communication tools by implementing and adhering to an privacy policy privacy policy – details the extent to which message may be read by others

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved PRIVACY POLICY

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved INTERNET USE POLICY Internet use policy – contains general principles to guide the proper use of the Internet

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved ANTI-SPAM POLICY Spam – unsolicited Spam accounts for 40% to 60% of most organizations’ and cost U.S. businesses over $10 billion in 2003 Anti-spam policy – simply states that users will not send unsolicited s (or spam)

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved Ethics in the Workplace Workplace monitoring is a concern for many employees Organizations can be held financially responsible for their employees’ actions The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved MONITORING TECHNOLOGIES Monitoring – tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved EMPLOYEE MONITORING POLICIES Employee monitoring policies – explicitly state how, when, and where the company monitors its employees

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved Closing Case One Sarbanes-Oxley The Sarbanes-Oxley Act (SOX) of 2002 is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices by organizations Sarbanes-Oxley is where information technology, finance, and ethics meet

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved Closing Case One Questions 1.Define the relationship between ethics and the Sarbanes-Oxley Act 2.Discuss why records management is an area of concern for the entire organization 3.What are two policies an organization can implement to achieve Sarbanes-Oxley compliance? 4.Identify the biggest roadblock for organizations that are attempting to achieve Sarbanes-Oxley compliance

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved Closing Case Two Spying on Employees Many organizations have taken the Big Brother approach to Web monitoring and track Internet usage and read employees’ to help prevent lost productivity Current research indicates that the effects of such employee monitoring are even worse than the lost productivity from employee Web surfing

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved Closing Case Two Questions 1.Explain the ethical issues involved in employee monitoring 2.Summarize the adverse effect employee monitoring can have on employees. Summarize the potential issues an organization can face if it does not monitor its employees. If you were the CEO of an organization, would you choose to monitor your employees? Why or why not?

McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved Closing Case Two Questions 3.Identify the relationship between information privacy and monitoring 4.Summarize the different monitoring technologies and rank them in order of least invasive to most invasive for employees