Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer.

Similar presentations


Presentation on theme: "ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer."— Presentation transcript:

1 ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer

2 Topic #5 Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”).

3 Definitions Privacy: –The quality or condition of being secluded from the presence or view of others. –The state of being free from unsanctioned intrusion: a person's right to privacy. Identity: –The distinct personality of an individual regarded as a persisting entity; individuality. –The collective aspect of the set of characteristics by which a thing is definitively recognizable or known. –The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group. source: “http://www.dictionary.com” http://www.dictionary.com

4 Threats to Privacy 1. Don't share your hard drive over the Internet. 2. Be careful what programs you run. 3. Beware public machines. 4. Can the spam! 5. Be careful what you write and where you send it.

5 Protecting your Privacy 1. SpyCop will search your computer for covert surveillance spy software. 2. Anonymizer makes your browsing experience anonymous. 3. AdSubtract Pro blocks cookies and manages the cookies that are already on your computer.

6 Protecting your Privacy (cont.) Cookie Pal Cookie PalCookie PalCookie Pal Internet Cookie Filter And Manager Protects Your Online Privacy -- Kookaburra Software Kookaburra SoftwareKookaburra Software Firekeys Firewall + Security -- Software Appliance Company Software Appliance CompanySoftware Appliance Company Internet Privacy Service Internet Privacy Service Provides Filtering, Blocking, And Cookie Controls -- McAfee.com Corp McAfee.com CorpMcAfee.com Corp Invisible Secrets 3 Invisible Secrets 3 Secure Your Files And Communications -- NeoByte Solutions NeoByte SolutionsNeoByte Solutions McAfee Internet Security 4.0 McAfee Internet Security 4.0 Anti-Virus, Firewall, And Parental Monitoring -- McAfee Retail Software McAfee Retail SoftwareMcAfee Retail Software McAfee QuickClean 2.0 McAfee QuickClean 2.0 Removes Unnecessary E-Mail And Internet Files -- McAfee Retail Software McAfee Retail SoftwareMcAfee Retail Software Netkeys ULTRA Netkeys ULTRA Comprehensive Security For Internet And PC -- Software Appliance Company Software Appliance CompanySoftware Appliance Company SecureFile Creates Self-Decryption Archive Using Symmetric / Asymmetric Key Mechanism -- SecureSoft Technologies SecureSoft Technologies SecureSoft Technologies SpyDetect All You Need To Protect Yourself Online -- SpyDetect, Inc SpyDetect, IncSpyDetect, Inc

7 ACM General Moral Imperatives 1.7 Respect the privacy of others 1.8 Honor confidentiality source: “http://www.acm.org/constitution/code.html” http://www.acm.org/constitution/code.html

8 1.7 Respect the privacy of others … It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies.

9 1.8 Honor confidentiality … The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations by requirements of the law or other principles of this Code.

10 For more Information PHIL 311-001: Computer Ethics PHIL 311-001: Computer Ethics Computer Professionals for Social Responsibility Computer Professionals for Social Responsibility THOMAS – U.S. Congress on the Internet THOMAS – U.S. Congress on the Internet

11 References www.anonymizer.com www.perfectlyprivate.com http://ipw.internet.com/protection/pr ivacy/ http://ipw.internet.com/protection/pr ivacy/


Download ppt "ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer."

Similar presentations


Ads by Google