3 Ethics and Privacy.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Ethics, Privacy and Information Security
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Ethical and Social Issues in Information Systems
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 0.
A Framework for Ethical Decision Making
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
E-Commerce: Regulatory, Ethical, and Social Environments
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Chapter 3 Ethics, Privacy & Security
1 THE FINANCIAL MANAGEMENT INSTITUTE ETHICS - THE CHALLENGES CONTINUE WILLIAM J. CESSFORD, FCMA, CMA.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Technology in Focus: Information Technology Ethics
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
6 Ethics and Privacy.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Ethics.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
6 Ethics and Privacy.
Ethical Decision Making , Ethical Theories
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
4/17: Ethical & Social Issues in IS
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Privacy 2 (draft). Digital Dossier The data shadow The digital dossier Personal accountability.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Marketing Principles CHAPTER 6 SECTION 2.  Corporate scandals and unethical behavior have a negative effect on consumer confidence and the image of the.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
6 Ethics and Privacy.
Privacy and the Law.
CHAPTER 12 Ethics and Privacy
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Chapter # 1 Overview of Ethics
3 Ethics and Privacy 35 Slides.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 10: Privacy, Security, and Ethics
INFS 452 – Computer Ethics & Society
CHAPTER 3 Ethics and Privacy.
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
Ethical, Social and Political Issues
IT and Society Week 2: Privacy.
Presentation transcript:

3 Ethics and Privacy

Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Ethical Issues Privacy

[ Opening Case WikiLeaks Marches On ] The Problem The Solution The Results What We Learned from This Case

3.1 Pinterest

3.1 Ethical Issues Ethical Frameworks Ethics in the Corporate Environment Ethics and Information Technology

3.1 Ethical Issues Ethics The principles of right and wrong that individuals use to make choices that guide their behavior.

Ethical Frameworks Four Widely Used Standards Utilitarian Approach Rights Approach Fairness Approach Common Good Approach Combine Four Standards to Create a Framework for Ethical Decision Making Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.

Ethical Frameworks Five Steps in Ethical Decision Making Framework Recognize an ethical issue Get the facts Evaluate alternative actions Make a Decisions and Test It Act and Reflect on the Outcome of Decisions Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.

Ethics in the Corporate Environment Code of Ethics Fundamental Tenets of Ethics Responsibility Accountability Liability What is Unethical is not necessarily Illegal Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Ethics & Information Technology Four General Categories of Ethical Issues Related to IT: Privacy Issues Accuracy Issues Property Issues Accessibility Issues 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.

3.2 The Dot Clones

3.2 Privacy Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites Privacy Codes and Policies International Aspects of Privacy

3.2 Privacy Privacy Information Privacy The right to be left alone and to be free of unreasonable personal intrusions. Information Privacy The right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

3.2 Privacy Court Decisions in Many Countries have followed two rules: The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public’s right to know supersedes the individual’s right of privacy.

3.2 Privacy Digital Dossier Profiling Data Aggregators LexisNexis ChoicePoint Acxiom Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). Profiling: The process of forming a digital dossier. Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.

Electronic Surveillance Using technology to monitor individuals as they go about their daily routines. Is conducted by employers, governments, and other institutions. Examples: Surveillance cameras in airports, subways, banks, and other public venues.

Electronic Surveillance Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone cameras, utility meters, passports, and ID cards. Smartphones create geotags Google and Microsoft street view images Satellite imaging

Personal Information in Databases Personal Data / Record Keepers Credit Reporting Agencies Banks and Financial Institutions Utility Companies Employers Hospitals Schools Government Agencies (IRS, State, City)

Personal Information in Databases Major Concerns about Information You Provide Record Keepers Do you know where the records are? Are the records accurate? Can you change inaccurate data? How long will it take to make a change? Under what circumstances will personal data be released?

Personal Information in Databases Major Concerns about Information You Provide Record Keepers How are the data used? To whom are the data given or sold? How secure are the data against access by unauthorized people?

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites Free Speech versus Privacy on the Internet Derogatory Information Can Influence Hiring Decisions Little to No Recourse for Victims

Privacy Codes & Policies An organization’s guidelines for protecting the privacy of its customers, clients, and employees. Opt-out Model Opt-in Model Platform for Privacy Preferences (P3P) A protocol that communicates privacy policies between a web site and its visitors

Privacy Codes & Policies US Federal Trade Commission’s Fair Information Practices Standard European Directive on Data Privacy

International Aspects of Privacy The Global Nature of the Internet Complicates Data Privacy Approximately 50 Countries Have Data-Protection Laws Inconsistent standards from country to country Transborder data flow.

Google Glass: Big Brother Really is Watching You 3.3 Google Glass: Big Brother Really is Watching You

[ Closing Case Target Provides a Surprise ] The Problem An Interesting IT Solution The Results: Initial Uses of Watson What We Learned from This Case