GEC 0113 Ethics in IT Practices

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
An Introduction of Multimedia Etiquette Nicole Huang.
Ethical and Social Issues in Information Systems
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
SPYWARE  Do you know where your personal information is?
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Social Media & the Law Video 4 Social Media Training for Business Teachers #socialmedialaw.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Possible WebQuest type links  
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Objective 5.02 Understand ethics and ethical decision-making.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Welcome to Ms. Dickson’s Business Class.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Ethics Business Law Sunny Hills High School Mrs. Larsen.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethical Implications In The Age Of Information
Welcome to the ICT Department Unit 3_4 Code of Conduct.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Computer Technology Timpview High School
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ETHICS IN USING COMPUTER
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Welcome to Challenger Computer Lab.
Internet Etiquette or Netiquette
CHAPTER FOUR OVERVIEW SECTION ETHICS
Are You and Your Students Responsible Digital Citizens?
Please read the entire presentation.
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Ian Ramsey C of E School GCSE ICT Smart working Software choices.
Welcome to the Computer Lab.
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
Ethics & Privacy CSCI 101.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

GEC 0113 Ethics in IT Practices Kam-Fai Wong Dept of SEEM, CUHK kfwong@se.cuhk.edu.hk

Ethics “analysis of decisions and actions with respect to their appropriateness in a given social context” Dilemmas: impair or enhance the well-being of individuals or groups Ethical / legal

Ethical Dilemmas in IT For software, is it acceptable to: buy once, install twice? you install and use by others? make copies then distribute or even sell? make available on-line for download? trading on the Web?

Ethical Dilemmas Employers read staff’s email Employers monitor websites visited by staff Company resources are only for co. purpose Staff report misuse of co. resources Disclaimer right to eliminate responsibility Respect IP, e.g. modifying/copying code Privacy of data

IT Ethical Issues Code of Ethics: rules for expected actions Intellectual Information Rights protect intangible properties in IT Accountability responsibility of (non-)actions Data/info Privacy right to be left alone

HK Data Privacy Principles Purpose and manner of collection Accuracy and duration of retention Use Security Information availability Access (see Privacy Commissioner’s Office, HKSAR, http://www.pco.org.hk)

Code of Ethics Don’t use a compute to harm other people. Don’t interfere others’ computer work. Don’t look at others’ computer files. Don’t not use a computer to steal.

Code of Ethics (Cont.) Don’t use a computer to lie. Don’t copy or use software without paying for it. Don’t use others’computer resources without permission. Don’t use others’ work.

Code of Ethics (Cont.) Think about the social impact of the program you creates. Always use a computer in a way that shows respect and consideration for other people.

URL: http://www.se.cuhk.edu.hk Download – IS Lab. – GEC0113.ppt Thank You! URL: http://www.se.cuhk.edu.hk Download – IS Lab. – GEC0113.ppt