CHAPTER 3 Ethics and Privacy.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Ethics, Privacy and Information Security
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Ethical and Social Issues in Information Systems
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
CHAPTER 3 Ethics, Privacy and Information Security.
Ethics in a Computing Culture
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3 Ethics and Privacy.
A Framework for Ethical Decision Making
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Chapter 3 Ethics, Privacy & Security
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
6 Ethics and Privacy.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
1 ETHICAL ISSUES INTRODUCTION to E-COMMERCE (COMM1Q) Ethical Issues: source; Laudon & Laudon, Management Information Systems 7th Edn., Prentice-Hall, 1998.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
ETHICS and COMPUTERS An Overview 23/04/2017.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Practicing Leadership: Principles and Applications Chapter 2: Ethical Leadership.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
6 Ethics and Privacy.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Ethical Decision Making , Ethical Theories
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
4/17: Ethical & Social Issues in IS
CHAPTER 5 ETHICS & PRIVACY.
CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Professional Ethics and Responsibilities
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Professor Smith. Unit 3  Make sure you review the power point  Read chapters  Complete your project in time Case study Other Unit 3 assignments  Read.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
6 Ethics and Privacy.
Privacy and the Law.
CHAPTER 12 Ethics and Privacy
Ethical, Social, and Political Issues in E-commerce
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
PowerPoint® Slides to Accompany
Chapter # 1 Overview of Ethics
Privacy and Security in the Employment Relationship
TECHNOLOGY IN ACTION.
The introduction and the essential elements of E- Commerce.
3 Ethics and Privacy 35 Slides.
E-Commerce: Regulatory, Ethical, and Social Environments
Ethical Issues in Social Media Mining
International business ethics
Understand ethics and ethical decision-making.
ETHICAL ISSUES IN INFORMATION TECHNOLOGY (CCI410) PERTEMUAN 7
Internet law Business law.
Information Systems for Health:
INFS 452 – Computer Ethics & Society
Understand ethics and ethical decision-making.
Ethical, Social and Political Issues
IT and Society Week 2: Privacy.
Presentation transcript:

CHAPTER 3 Ethics and Privacy

CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy

LEARNING OBJECTIVES 1. Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 2. Identify three places that store personal data, and for each one discuss at least one potential threat to the privacy of the data stored there.

3.1 Ethical Issues Ethical Frameworks Rights approach Utilitarian approach Rights approach Fairness approach Common good approach Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness approach: ethical actions treat all humans equally, or if unequally, then fairly, based on some defensible standard. Common good approach: highlights the interlocking relationships that underlie all societies.

General Framework for Ethics Recognize an ethical issue Get the facts Evaluate alternative actions Make a decision and test it Act and reflect on the outcome of your decision

Ethics in the Corporate Environment Code of ethics Fundamental tenets of ethics Responsibility Accountability Liability A Code of Ethics is a collection of principles that are intended to guide decision making by members of an organization. Responsibility means that you accept the consequences of your decisions and actions. Accountability means a determination of who is responsible for actions that were taken. Liability is a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.

Unethical vs. Illegal What is unethical is not necessarily illegal. Ethics scenarios The link will take you to online Appendix W3.1 for 14 ethics scenarios. Each of these scenarios elicits interesting class discussions, because none are particularly “clear cut” as to what the “right thing to do” is.

Ethics and Information Technology Four categories of ethical issues involving IT applications: Privacy Issues Accuracy Issues Property Issues Accessibility Issues Privacy Issues involve collecting, storing and disseminating information about individuals. Accuracy Issues involve the authenticity, fidelity and accuracy of information that is collected and processed. Property Issues involve the ownership and value of information. Accessibility Issues revolve around who should have access to information and whether they should have to pay for this access.

3.2 Privacy Court decisions have followed two rules: (1) The right of privacy is not absolute. Your privacy must be balanced against the needs of society. (2) The public’s right to know is superior to the individual’s right of privacy. Privacy is the right to be left alone and to be free of unreasonable personal intrusions.

Threats to Privacy Data aggregators, digital dossiers, and profiling Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

Data Aggregators, Digital Dossiers, and Profiling Data aggregators are companies that collect public data (e.g., real estate records, telephone numbers) and nonpublic data (e.g., social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers. Digital dossier is an electronic description of you and your habits. Profiling is the process of creating a digital dossier. © Ilin Sergey/Age Fotostock America, Inc.

Electronic Surveillance Electronic Surveillance. The tracking of people‘s activities, online or offline, with the aid of computers. The image demonstrates that many people are blissfully unaware that they can be under electronic surveillance while they are using their computers. © Ilin Sergey/Age Fotostock America, Inc.

Electronic Surveillance See "The State of Surveillance" article in BusinessWeek See the surveillance slideshow See additional surveillance slides And you think you have privacy? (video) The BusinessWeek article is an interesting look at the state of surveillance today. The surveillance slideshow accompanies the BusinessWeek article. The additional surveillance slides show modern surveillance equipment. The video is a tongue-in-cheek look at how little privacy all of us have left. The video is a great example of the impacts that data aggregators, digital dossiers, and profiling might have in the very near future.

Personal Information in Databases Banks Utility companies Government agencies Credit reporting agencies Personal Information in Databases. Information about individuals is being kept in many databases: banks, utilities co., govt. agencies, …etc.; the most visible locations are credit-reporting agencies. Equifax, TransUnion, and Experian are the three best known credit reporting agencies. Clicking on the logo of each company will take you to its homepage. © Nicolas Nadjar/Age Fotostock America, Inc.

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites Social Networking Sites often include electronic discussions such as chat rooms. These sites appear on the Internet, within corporate intranets, and on blogs. A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. The logos represent popular social networking sites. Clicking on the logo will take you to the respective home pages. © Marina Bordjieva/Age Fotostock America, Inc.

Social Networking Sites Can Cause You Problems Anyone can post derogatory information about you anonymously. (See this Washington Post article.) You can also hurt yourself, as this article shows. The second article shows students how information they (or others) post to social networking sites can impact their lives, in particular, their job search. This information may take the form of text, images, etc.

What Can You Do? First, be careful what information you post on social networking sites. Second, a company, ReputationDefender, says it can remove derogatory information from the Web. Clicking on the ReputationDefender logo will take you to its homepage.

Protecting Privacy Privacy Codes and Policies Opt-out Model Opt-in Model Privacy Codes and Policies. An organization’s guidelines with respect to protecting the privacy of customers, clients, and employees. Opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. Opt-in model of informed consent means that organizations are prohibited from collecting any personal information unless the customer specifically authorizes it. (Preferred by privacy advocates.) International Aspects of Privacy. Privacy issues that international organizations and governments face when information spans countries and jurisdictions. © Gunnar/Age Fotostock America, Inc.

Chapter Closing Case The Problem The Solution The Results