McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER 05 Organizational Structures That Support Strategic Initiatives McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Robert Crawford, MBA West Middle School
Business Plug-In B7 Ethics.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
SPYWARE  Do you know where your personal information is?
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Organizational Structures that Support Strategic Initiatives
ETHICS, POLICY & SECURITY ISSUES
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
ETHICS, POLICY & SECURITY ISSUES
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
IT in Business Issues in Information Technology Lecture – 13.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Policy, Regulation, and Ethics Policy Systems and procedures must meet policy requirements. Regulation Organizations must comply with requirements of the.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
Ebusiness CHAPTER 14 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Computer Technology Timpview High School
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Ethics and Information Security
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Chapter 13 Security and Ethical Challenges.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics

B7-2 LEARNING OUTCOMES 1.Summarize the guidelines for creating an information privacy policy 2.Identify the differences between an ethical computer use policy and an acceptable computer use policy 3.Describe the relationship between an privacy policy and an Internet use policy

B7-3 LEARNING OUTCOMES 4.Explain the effects of spam on an organization 5.Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

B7-4 INTRODUCTION Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT –Intellectual property –Copyright –Fair use doctrine –Pirated software –Counterfeit software

B7-5 INTRODUCTION ePolicies address information privacy and confidentiality issues –ePolicies – policies and procedures that address the ethical use of computers and Internet usage –Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent –Confidentiality – the assurance that messages and information are available only to those who are authorized to view them

B7-6 Ethics Individuals form the only ethical component of an IT systems

B7-7 Ethics Acting ethically and legally are not always the same

B7-8 INFORMATION HAS NO ETHICS Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself

B7-9 Developing Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include: –Ethical computer use policy –Information privacy policy –Acceptable use policy – privacy policy –Internet use policy –Anti-spam policy

B7-10 ETHICAL COMPUTER USE POLICY Ethical computer use policy – contains general principles to guide computer user behavior The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

B7-11 ETHICAL COMPUTER USE POLICY

B7-12 INFORMATION PRIVACY POLICY Information privacy policy - contains general principles regarding information privacy –Would you mind if your Visa company shared all of your purchasing information? –Who owns the information on your Visa? –Why would people want to purchase Visa information?

B7-13 ACCEPTABLE USE POLICY Acceptable use policy (AUP) – a policy that a user must agree to follow in order to be provided access to a network or to the Internet An AUP usually contains a non-repudiation clause –Nonrepudiation – a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions ( therefore, keep all your s)

B7-14 ACCEPTABLE USE POLICY

B7-15 PRIVACY POLICY Organizations can reduce the risks of and instant messaging communication tools by implementing and adhering to an privacy policy privacy policy – details the extent to which messages may be read by others ( is not safe)

B7-16 PRIVACY POLICY

B7-17 PRIVACY POLICY

B7-18 INTERNET USE POLICY Internet use policy – contains general principles to guide the proper use of the Internet

B7-19 ANTI-SPAM POLICY Spam – unsolicited Spam accounts for 40% to 60% of most organizations’ and cost U.S. businesses over $14 billion in 2005 Anti-spam policy – simply states that users will not send unsolicited s (or spam) Use X2009abc at stfx dot ca to disguise address

B7-20 MONITORING TECHNOLOGIES Monitoring – tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed –Key logger or key trapper software –Hardware key logger –Cookie –Adware –Spyware –Web log –Clickstream