Karly Stinedurf.  What is Ethics?  The Ten Commandments of Computer Ethics  Frameworks/Standards of Ethics  Ethics and Education  Deterring Unethical.

Slides:



Advertisements
Similar presentations
Business Ethics for Real Estate: A. Glean
Advertisements

Chapter 1 Defining Ethics.
Additional Arduino Control & Ethics 1. Objectives  Outline engineering ethics  Emphasize importance of project documentation  Discuss Servo Function.
COMP427 Professional Ethics
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
COMP427 Business Ethics. Objectives 1.To understand ethics and why its important in ways that are consistent with a code of principles. 2.Understand why.
Chapter 1 An Overview of Ethics
Ethical and Moral Issues in Counseling
Principles of Information Security, 3rd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Understanding Business Ethics
M A N A G E M E N T M A N A G E M E N T 1 st E D I T I O N 1 st E D I T I O N Gulati | Mayo | Nohria Gulati | Mayo | Nohria Chapter 3 Chapter 3 ETHICS.
Chapter 11, Nancy Langton and Stephen P. Robbins, Organizational Behaviour, Fourth Canadian Edition 11-1 Copyright © 2007 Pearson Education Canada Chapter.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
What Would You Do? A Case Study in Ethics
Legal and Ethical Considerations
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Possible WebQuest type links  
Computer Ethics.
Introduction to Computer Science
BY Muhammad Suleman MBA MIT BSC (COMPUTER). RANA INSTITURE OF HIGHER STUDIES ASSIGNMENT NO 1 CRITICAL ANAYLYSIS Group Members: ASSAD TAYYAB XYZ Submitted.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Computer Ethics for Computer Users
Management of Information Security, 4th Edition
CISB 412 Social and Professional Issues Professional Ethics.
ACM Code of Ethics. Some Terminology Stakeholders Stakes.
©2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
COMPUTER ETHICS Do you know the difference between right and wrong?
Corporate Social Responsibility
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 4 Business Ethics and Social Responsibility.
Ethics - 1 Key Definitions  Moral: “relating to principles of right and wrong”  Ethics: “the discipline of dealing with what is good and bad and with.
Lecture 11: Law and Ethics
ETHICS and COMPUTERS An Overview 23/04/2017.
Business Ethics Why should business ethics concern you?
Ethics in a Computing Culture
CS 4001 Based on slides by Mary Jean Harrold 1 Professional Ethics.
Moral Issues In Policing. Moral Issues in Policing Should police be held to the same or higher standards than other members of society? – Courage? – Fairness?
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Unethical Behavior Ethics Personal Values Values Values and Ethics
 the study of the rightness or wrongness of human conduct.  In any situation involving two or more individuals, values may come into conflict and ethical.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
© 2011 Delmar, Cengage Learning Part IV Control Processes in Police Management Chapter 14 Accountability.
Intro to Ethics CSCI 327 Social Implications of Computing.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Business Ethics and Social Responsibility
“Good” =EffectiveEthical Goals Balance of realism and risk in vision Values of Intentions, goals MeansEfficiency of means to endsQuality of means used.
Agenda Questions re work plan Quiz, the first Group work: chapter 2 Presentations on chapter 2 Group process discussion Ethics in the work place.
Chapter 24 Ethical Obligations and Accountability Fundamentals of Nursing: Standards & Practices, 2E.
CHAPTER 5 ETHICS & PRIVACY.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Professional Ethics and Responsibilities
© PAPERHINT.COM. The word “ethics” is derived from the Greek word ethikos meaning custom or character. © PAPERHINT.COM.
TEAMS-ETHICS-ACCESS CONSIDERING COMMUNICATION MODELS.
Introduction to Ethics Scott Rae, Moral Choices Ch. 1.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Moral Principles Paul L. Schumann, Ph.D.
Hospitality & Tourism 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
ETHICS.
Introduction to Ethics
Basic Principles: Ethics and Business
Ethical Issues in Speech Language Pathology
Politics & ethics in governance
Ethical Issues in Speech Language Pathology
What is Ethics? Monday, May 22, 2017.
Ethics IN PRIVATE SECURITY
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Basic Principles: Ethics and Business
Presentation transcript:

Karly Stinedurf

 What is Ethics?  The Ten Commandments of Computer Ethics  Frameworks/Standards of Ethics  Ethics and Education  Deterring Unethical Behavior  Organizational Liability  Managing Investigations in the Organization

 How humans ought to act  Rules we should live by  Willingness to do the right thing  A common understanding of what is appropriate behavior  Various definitions of what “ethical” behavior is, based on individual beliefs  Communities frame ethical choices  Important for Information Security professionals

 Pw0I Pw0I

 1. Don’t use computers to hurt others  2. Don’t interfere with other peoples use of computers  3. Don’t view the contents of other peoples computers without permission  4. Don’t steal using a computer  5. Don’t use a computer as a tool to fabricate information  6. Don’t illegally copy or use software  7. Don’t use a computer or computer-based resource without explicit permission or without paying for it  8. Don’t steal someone’s intellectual property  9. Don’t remain ignorant or unconscious to the effect that computers have on society as a whole and on those individuals using them  10. Don’t devalue humanity by using computers in ways that disrespect others

 Normative Ethics- the study of what makes actions right or wrong- how should people act?  Meta-ethics- the study of the meaning of ethical judgments and properties- what is right?  Descriptive ethics- the study of the choices that have been made by individuals in the past- what do others think is right?  Applied Ethics- approach that applies moral codes to actions drawn from realistic situations- how to define how we use ethics in practice  Deontological ethics- study of the rightness or wrongness of intentions and motives as opposed to consequences- define a person’s ethical duty

 Utilitarian approach- an ethical action is one that results in the most good, or least harm- links consequences to choices  Rights approach- the ethical action is one that best protects and respects the moral rights of those affected by the action  Fairness or justice approach- ethical actions are those that have outcomes that regard all human beings equally, or incorporate a degree of fairness  Common good approach- the complex relationships in society are the basis of a process founded on ethical reasoning that respects and has compassion for all others- common welfare  Virtue approach- ethical actions should be consistent with ideal virtues such as honesty, courage, compassion, generosity, tolerance, love, etc…

 Key factor in establishing ethics in an organization  InfoSec employees may not know what is unethical in a technical situation  Scenarios should be used to simulate practical situations  Creates low-risk, ethical employees

 A student at a university learned to use an expensive spreadsheet program in her accounting class. The student would go to the university computer lab and use the software to complete her assignment. Signs were posted in the lab indicating that copying software was forbidden. One day, she decided to copy the software anyway to complete her work assignments at home.  A student suspected and found a loophole in her university’s computer security system that allowed her to access other students’ records. She told the system administrator about the loophole, but she continued to access other records until the problem was corrected two weeks later.

 MTT28 MTT28

 Three categories of unethical behavior in organizations:  Ignorance- not knowing the law  Accident- making a mistake  Intent- criminal/unethical state of mind  Three methods of deterrence:  Fear of penalty  Probability of being caught  Probability of penalty being administered

 Liability- an entity’s legal obligation  Liability for an action can lead to restitution or payment  An organization increases liability when it refuses to take proper measures to ensure ethical behavior  Due diligence  Long-arm jurisdiction

 Internal investigations regarding computer ethics are often completed using digital forensics  Has to be substantial evidence to take action  Documenting, preserving, identifying, and extracting evidence  Digital forensics is used for two purposes related to ethics:  To investigate allegations of digital malfeasance  To perform root cause analysis

 When investigators discover evidence they should notify management and recommend contacting law enforcement  Organization approaches to digital forensics  Protect and forget  Apprehend and prosecute

 Whitman, M. E. Mattord, H. J. (2014) Management of Information Security. (4th ed.) Stamford, CT: Cengage Learning.