Information Technology Ethical Challenges

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
The Internet.
INTERNET SAFETY.
Little brother is watching you
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Business Plug-In B7 Ethics.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Prepare by : Salameh ahmad al_khawaldeh Layth ahmad al_rababah.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Sherri Shade Information Technology Ethics. Introduction  Background  RTM Institute Ethics, Character, & Leadership  Current project  Making an Ethical.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Electronic Use Policies.   Social Media  Internet.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Ethics for Computer Users
Employee Guidelines for Acceptable Use of Technology Resources.
Intro to Business CHAPTER TWO The New Ethical Environment.
COMPUTER ETHICS Do you know the difference between right and wrong?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Digital Citizenship Created By: Kelli Stinson June 2011.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Internet Safety Internet Safety LPM
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
Computer Ethics Computer Technology 1 By Jill Einerson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Digital Rights and Responsibilities CSI: CyberSpace Investigation Tracee Pearson Lead Investigator.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Acceptable Use Policy (Draft)
Computers Are Your Future Twelfth Edition
MGMT 452 Corporate Social Responsibility
Digital Citizenship.
To spy or not to spy; that is the question
Computer Literacy – Grade 8
Chapter # 1 Overview of Ethics
ISNE101 Dr. Ken Cosh.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 13 Security and Ethical Challenges.
Computer Literacy – Grade 8
The Issues with Technology in education
Communication Technology in a Changing World
Presentation transcript:

Information Technology Ethical Challenges Sherri Shade

Ethics eth•ic Pronunciation: (eth'ik), [key] —n. 1. the body of moral principles or values governing or distinctive of a particular culture or group: the Christian ethic; the tribal ethic of the Zuni. 2. a complex of moral precepts held or rules of conduct followed by an individual: a personal ethic. Webster’s Dictionary

IT and Ethics Who is responsible? Who is affected? Should IT Professionals be in the ethics business? Training Refer ethical issues to HR Development Implementation Application

Ethical Behaviors? Is your 80 gigabyte hard drive full? Music and videos That sure is a great music where did you get it? Downloading of music from the web Have you given a friend a copy of your Microsoft Project software? Software Piracy Did you read the confidential company file that was accidentally attached to your email? Computer abuse Did you gain access to the network and invade other workers emails and files? You formatted your hard drive prior to leaving your company because you were angry about leaving. Destruction of property

Information Technology Ethics Deal with proper use of technology devices, data, services, and software. Prior to Technology it may have been easier to know whether the activity was right or wrong Virtual World Judging behaviors is no longer straight forward Ethical or Unethical? A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the picture A student finds the teacher’s password to the school’s information system and uses it to change his grades and vi the grades of other students. A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper. She turns the paper in as her own work A student makes a copy of a software program borrowed from another student to use on his computer at home. A student downloads a graphic file from the web to place on his own webpage. However, he does provide a link to the author’s site. A student uses another student’s project website as a guideline. A student copies a previous published story in his own handwriting and submits it as his own work. For many of us this is not difficult to figure out that these are not ethical decisions Perhaps even without technology the same or similar activity may have occurred. Because of the implementation of technology these activities are easier execute perhaps don’t seem as bad. Technology is actual the catalyst or the enabler to clouding our understanding and choices

Information Technology Ethics New ethical considerations may be required with technology capabilities Email spamming Does the fact that the financial burden of unsolicited ads etc. now falls on the recipient not the sender create new rules? Digital photography What obligations does a anyone have to present an undoctored photo, even if the message is not as good as the digitally enhanced photo? Pornography access What security measures need to be put in place by schools, parents, companies and libraries to keep individuals from seeing inappropriate materials? Intellectual property Do we need better/clearer definitions of property? Globalization of the organization What do we need to better understand cultures, language, and behaviors?

Information Technology Ethics Some users view their computing actions as less serious than their actions in the “real world” Examples: Stealing software from a store – no way! …. However, SW piracy costs businesses billions of dollars per year Most of us would not pick a lock to someone’s house However, guessing passwords to gain access to a website, information, or programs is a common Sometimes the technology is not well understood…romance and fear may accompany a new technologies. Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessary

The Ten Commandments of Computer Ethics Computer Ethics Institute

Challenges: Code of Ethics No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the computing field There is movement within the industry to create a licensing process but there are many issues to be resolved What will be included on the exam? How often will an IT professional be required to renew the license? Developed by several organizations Adoption Implementation Monitoring Example: http://www.acm.org/constitution/code.html

Challenges: Web Design Implementation of features Pop ups Blocking/filters Aliases and redirecting Cookies Privacy policies Security policies Spyware Use of other design features Javascript Graphics - pictures, buttons, logos, icons Content Design layout Accountability/responsibility Outdated material, inaccurate material

Challenges: Commerce Fraud Taxation Free Trade Gambling Auctions Spamming Who were Canter and Siegel? Spamming cell phones? Term papers for sale Atlanta Journal Constitution aritcle

Challenges: Workplace Accessibility Ergonomics Outsourcing Telecommuting Customer relationships – Vendor relationships Should IT professionals be in the ethics business or should other areas of the business handle these issues? Monitoring Should your employer have the right to monitor private email messages? What are the two most popular Web sites for American workers? Playboy and ESPN Playboy and ESPN

Challenges:Workplace 62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written eMail Policy, 83.1% an Internet Policy, 68% a Software Policy. 51% of employers have disciplined or terminated employees for violating ePolicy. 35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results.

Music Downloads Risk of getting caught Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries The RIAA is seeking out people who make their music files available for others to download. The networks have features that allow users to block others from downloading their files but allow them to continue to download files

Challenges: Speech Net Etiquette Email privacy Free Speech Email privacy policy “Flaming” – insulting, argumentative or chastising replies to messages Free Speech Accountability and responsibility for web content Abortion sites Outdated information Accurate information Privacy and security policies Porn Professors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sites Hate MACHADO CASE Internet Filters Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation? Chain Letters

Challenges: Computing Resource Abuse Computers in the Workplace and the Classroom Use or Abuse Internet Access Instant Messenger Laptop use in the classroom Email Legal document Can be modified Flaming Access Computer Usage policy Email policy

Challenges: Computing Resource Abuse Computer Crime Viruses Hackers Theft “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft US Charges 135 With Net Crimes

Challenges: Privacy Privacy issues are at the top of the list in regards to ethical use of information. Loss of control Misuse of information Risk to physical privacy Risk of identity theft (video) Unwanted intrusions into daily life USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activity Datamining corporate data Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Cookies Privacy policies

Challenges: Intellectual Property Electronic Copyright Licensing Interoperability Cyberlicenses Shrinkwrap Shareware Freeware MP3 RIAA court case against college students University Internet Usage policies Internet Downloads Files Graphics Text

Challenges: Intellectual Property Patent, trade secrets, and copyright law Who owns the program Who owns the algorithm Software Piracy Why shouldn't I use pirated software? Who am I hurting by doing so? Piracy exists in everywhere. Loss of revenue hurts everyone. All software piracy is illegal and Software piracy is unethical. Various studies have found that the software industry loses approximately $12 billion every year . State Industry Study CD-RW

Challenges: Other Decision making using Expert Systems Network Security Software accuracy and reliability who is ethically responsible? Therac-25 Accidents Killer Robots The Hughes Whistleblowing Case

Conclusion: Some Ideas to Ponder Computer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?

Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/case_materials.html http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppt