Business Plug-In B7 Ethics.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER 05 Organizational Structures That Support Strategic Initiatives McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senn’s Information Technology, 3 rd Edition Chapter 14 Issues in Information.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protecting People and Information: Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Objective 5.02 Understand ethics and ethical decision-making.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
00870B2F.0/Internet%20Safety.jpg.
1 Profesional Ethics & Social Responsibility. 2 Objectives What is ethics, and why is it important to act according to a code of principles? Why is business.
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Jeopardy: Digital Citizenship Please use presentation mode!
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
IT in Business Issues in Information Technology Lecture – 13.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Policy, Regulation, and Ethics Policy Systems and procedures must meet policy requirements. Regulation Organizations must comply with requirements of the.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
CHAPTER FOUR OVERVIEW SECTION ETHICS
Ethics and Information Security
Chapter # 1 Overview of Ethics
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Learning Area 1 Information And Communication Technology and Society
Chapter 13 Security and Ethical Challenges.
Understand ethics and ethical decision-making.
Internet law Business law.
Objective 5.02 Understand ethics and ethical decision-making.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Understand ethics and ethical decision-making.
Presentation transcript:

Business Plug-In B7 Ethics

LEARNING OUTCOMES Explain the ethical issues in the use of information technology. Identify the six epolicies organizations should implement to protect themselves.

INFORMATION ETHICS Ethics—The principles and standards that guide our behavior toward other people Information Ethics—Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself Important ethical concepts stemming from IT: Intellectual Property Copyright Pirated Software Counterfeit Software

INFORMATION ETHICS

INFORMATION DOES NOT HAVE ETHICS, PEOPLE DO Information Management—Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively Information Governance—Is a method or system of government for information management or control

INFORMATION DOES NOT HAVE ETHICS, PEOPLE DO Information Compliance—Is the act of conforming, acquiescing, or yielding information Ediscovery—Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

DEVELOPING INFORMATION MANAGEMENT POLICIES Organizations should develop written policies establishing employee guidelines, employee procedures, and organizational rules for information Epolicies—Policies and procedures that address the ethical use of computers and Internet usage

ETHICAL COMPUTER USE POLICY Regardless of what business a company operates the company must protect itself from unethical employee behavior Ethical Computer Use Policy—Contains general principles to guide computer user behavior The users should be informed of the rules and, by agreeing to use the system on that basis, consent to abide by them

ETHICAL COMPUTER USE POLICY

INFORMATION PRIVACY POLICY Information Privacy Policy—Contains general principles regarding information privacy In a large majority of cases, the unethical use of information happens not through the malicious scheming of a rogue marketer, but rather unintentionally

ACCEPTABLE USE POLICY Acceptable Use Policy (AUP)—A policy that a user must agree to follow in order to be provided access to a network or to the Internet Nonrepudiation—A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions Internet Use Policy—Contains general principles to guide the proper use of the Internet

EMAIL PRIVACY POLICY Email Privacy Policy—Details the extent to which email messages may be read by others. One major problem with email is the user’s expectations of privacy Spam—Is unsolicited email Anti-Spam Policy simply states that email users will not send unsolicited emails (or spam)

SOCIAL MEDIA POLICY Social Media Policy—Outlines the corporate guidelines or principles governing employee online communications Social media policies a company might choose to implement include: Employee online communication policy Employee blogs Employee social network websites Employee Twitter, LinkedIn, and Facebook Corporate YouTube policy

WORKPLACE MONITORING POLICY The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical Monitoring—Tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed Employee Monitoring Policies—Explicitly state how, when, and where the company monitors its employees

WORKPLACE MONITORING POLICY Common Internet monitoring technologies: Key logger or key trapper software Hardware key logger Cookie Adware Spyware Web log Clickstream