CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Deter, Detect, Defend: The FTC’s Program on Identity Theft.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CHAPTER 3 Ethics, Privacy and Information Security.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3 Ethics and Privacy.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Information Security Information Technology and Computing Services Information Technology and Computing Services
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Information Systems: Ethics, Privacy and Information Security
CHAPTER 3 Ethics, Privacy and Information Security.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Your Information Assets
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
6 Ethics and Privacy.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
PLUG IT IN SIX Protecting Your Information Assets.
6 Ethics and Privacy.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CHAPTER 5 ETHICS & PRIVACY.
CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada.
Security and Ethics Safeguards and Codes of Conduct.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy and the Law.
TECHNOLOGY GUIDE THREE
Chapter 5 Electronic Commerce | Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 5 Electronic Commerce | Security
Protecting Your Information Assets
Chapter 10: Privacy, Security, and Ethics
CHAPTER 3 Ethics and Privacy.
Presentation transcript:

CHAPTER 3 Ethics and Privacy

Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight before midnight!

A Reminder on Cheating COPYING OF OTHERS’ FILES JOINTLY WORKING ON THE SAME BASE FILES (meaning two or more students work on the same assignment on the same machine at the same time) PROVIDING YOUR FILES TO OTHER STUDENTS Handing in the work of others In addition, hands-on open book assignments permit the use of books and written notes, but not electronic files or the use of student computers. Cheating of any kind shall result in a grade of zero (0) on the test, assignment, project or quiz in question with a minimum deduction of ONE LETTER GRADE for the class, and a note to the Office of the Dean of Students. The second instance of cheating will result in the grade of an F for the class.

Chapter Opening Case Internet Data Broker Consumer s Marketers

Another Case

Questions about Cases Is this legal? Who is acting unethical?

Chapter 3 - Ethics How do you define ethics? 7

3.1 Ethical Issues - Standards Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior Guidelines/Approaches

General Framework for Ethics 1. Recognize an ethical issue 2. Get the facts 3. Evaluate alternative actions 4. Make a decision and test it 5. Act and reflect on the outcome of your decision

Ethics in the Corporate Environment Code of ethics / conduct Microsoft Google Fundamental tenets of ethics

Unethical vs. Illegal Is everything that is unethical also illegal? Enron World Com Subprime Mortgages Other Examples

Ethics and Information Technology Ethical use of information and information technology Should organizations: monitor employees? sell customer info? audit employee computers? (unauthorized software or content)

Ethics and Information Technology Do s last forever? This can also apply to messaging at companies.

Advice for Organization Use 1.Only use company computer for business related work 2.Don’t send s you wouldn’t want your parents to see 3.Limit who you give work to

Ethics and Information Technology Four categories of ethical issues involving IT applications :

How much privacy do we have left? 1)We Still Have a high level of privacy 2)We are beginning to have less privacy 3)Privacy? What’s that?

Privacy Court decisions have followed two rules:

Ex. Google and User Data

Ex. Mobile Device Location

Threats to Privacy Data aggregators, digital dossiers, and profiling Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

Data Aggregators, Digital Dossiers, and Profiling © Ilin Sergey/Age Fotostock America, Inc.

Electronic Surveillance © Ilin Sergey/Age Fotostock America, Inc. What are employee rights against surveillance?

Electronic Surveillance A Face in the crowd: Say goodbye to anonymity

Personal Information in Databases Banks Utility companies Government agencies Credit reporting agencies © Nicolas Nadjar/Age Fotostock America, Inc.

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites © Marina Bordjieva/Age Fotostock America, Inc.

Social Networking Sites Can Cause You Problems Anyone can post derogatory information about you anonymously. (See this Washington Post article.)article You can also hurt yourself, as this article shows.article

What Can You Do? First, be careful what information you post on social networking sites. Second, a company, ReputationDefender, says it can remove derogatory information from the Web.

Protecting Privacy Privacy Codes and Policies Ex. Facebook, AppleFacebookApple Opt-out Model vs. Opt-in Model

Tech Guide 5 Protecting Your Information Assets

Information Assets What is meant when we say information assets?

Behavioral Actions Protect SSN# Secure credit cards Physical Virtual Debit Cards vs. Credit Cards Proactive Protection

Identity Theft Dumpster Diving Skimming Phishing Changing your address Old-Fashioned Stealing Pretexting Federal Trade Commission

Computer-Based Actions Know what sites have been visited Infected Computers Malware Infections Anti-Virus ( Security suite (ZoneAlarm)ZoneAlarm Antispyware (Ad-Aware)Ad-Aware

Computer-Based Actions Information in SNS Manage Patches Browser and Operating Systems

Portable Devices and Information Data Encryption Password Protect Locating Devices Prey Project Find my iPhone Where’s My Droid