Prepare by : Salameh ahmad al_khawaldeh Layth ahmad al_rababah.

Slides:



Advertisements
Similar presentations
Chapter 15 Legal & Ethical Issues
Advertisements

Northside I.S.D. Acceptable Use Policy
Cyber Safety Assessment Review
Facing Ethical and Legal Challenges C H A P T E R 2.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Chapter 7 The Environment of Electronic Commerce: International, Legal, Ethical, and Tax Issues.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Ethics Quiz.
Boyertown Area School District Acceptable Use Policy.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
1 Freedom of Expression Prepared By Joseph Leung.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
ELC 200 Day 21. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda I have decided to add one more assignment (9 total) –I will drop the.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Information Technology Ethical Challenges
E-Commerce: Regulatory, Ethical, and Social Environments
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Sherri Shade Information Technology Ethics. Introduction  Background  RTM Institute Ethics, Character, & Leadership  Current project  Making an Ethical.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C4- Social, Legal, and Ethical Issues in the Digital Firm
E-Core Values: Ethical, Legal, Taxation, and International Issues
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Electronic Use Policies.   Social Media  Internet.
Computer Ethics for Computer Users
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Digital Citizenship Created By: Kelli Stinson June 2011.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
WHO OWNS KNOWLEDGE? ETHICAL AND LEGAL ISSUES
ELC 200 Day 21. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #7 ed to you in WebCt –Due April 9 at the beginning.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Computer Ethics Computer Technology 1 By Jill Einerson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
The Legal Context of Business
The Legal Context of Business
Computers Are Your Future Twelfth Edition
MGMT 452 Corporate Social Responsibility
Ogletree, Deakins, Nash, Smoak & Stewart PC
Computer Literacy – Grade 8
Legal and Ethical Issues in E-Commerce
Chapter # 1 Overview of Ethics
CHAPTER 21 Warranties and Product Liability
ISNE101 Dr. Ken Cosh.
E-Commerce: Regulatory, Ethical, and Social Environments
Computer Literacy – Grade 8
Chapter 3 Emerging Business Ethics Issues
Communication Technology in a Changing World
Chapter 15 Legal & Ethical Issues
Presentation transcript:

Prepare by : Salameh ahmad al_khawaldeh Layth ahmad al_rababah

2 Objective Ethical Issues Ethical Issues What is Ethics? What is Ethics? Major Threats Major Threats Improving the Climate Improving the Climate Code of Ethics Code of Ethics Self-Assessment Self-Assessment Privacy Factor Privacy Factor Legal Issues Legal Issues Liability Question Basis of Liability Copyrights & Trademarks Website – Product / Service? Warranties Strict Liability Taxation Issues New technology new ethical problems New technology new ethical problems Example Example Information Technology Ethical challenges Information Technology Ethical challenges Challenges: Web Design Challenges: Web Design Challenges: Commerce Challenges: Commerce Challenges: Workplace Challenges: Workplace Challenges: Speech Challenges: Speech Challenges: Computing Resource Abuse Challenges: Computing Resource Abuse Challenges: Privacy Challenges: Privacy Challenges: Intellectual Property Challenges: Intellectual Property Challenges: Other Challenges: Other

3 What is ethic? Fairness, justice, equity, honesty, trustworthiness & equality Fairness, justice, equity, honesty, trustworthiness & equality Subjective Subjective B D C A Legal ImmoralMoral Illegal

4 Major threats Faster computers & networks Faster computers & networks Sophisticated telecommunications & routers Sophisticated telecommunications & routers Massive distributed databases Massive distributed databases Eases of access to information & knowledge base Eases of access to information & knowledge base Transparency of software Transparency of software

5 Improving the climates Top management support Top management support Code of ethics Code of ethics Ethics training program Ethics training program Motivation to focus on honesty & integrity Motivation to focus on honesty & integrity

6 WHERE TO START Bottom-up Bottom-up Inculcates ethics behavior at the employee level with full support of top management Inculcates ethics behavior at the employee level with full support of top management Top-down Top-down The actions of the company start with the CEO The actions of the company start with the CEO Extend to a variety of stakeholders Extend to a variety of stakeholders

7 Code of ethics A declaration of principles and beliefs that govern how employees of a corporation are to behave A declaration of principles and beliefs that govern how employees of a corporation are to behave Inspirational & disciplinary Inspirational & disciplinary All-compassing & stable over time All-compassing & stable over time

8 Self- Assessment A question-and-answer procedure A question-and-answer procedure Allows individuals to appraise & understand their personal knowledge about a particular topic Allows individuals to appraise & understand their personal knowledge about a particular topic An educational experience An educational experience

9 Privacy factor Notice Notice Right to be told in advance Right to be told in advance Choice Choice Final say regarding the use of personal info Final say regarding the use of personal info Access Access Access & correct any personal info Access & correct any personal info Security/integrity Security/integrity Enforcement Enforcement Backed by the courts if any principles are violated Backed by the courts if any principles are violated

10 THE LIABILITY QUESTION Liability of Designer Liability of Designer Nontrivial errors Nontrivial errors Out-of-bound errors Out-of-bound errors Liability of User Liability of User Passive negligence Passive negligence Basis of Liability Basis of Liability Tort law Tort law Product liability Product liability

11 TORT LAWS ON INTERNET Settling contract problems between e-merchants & ISP Settling contract problems between e-merchants & ISP Fraud – intent to deceive Fraud – intent to deceive Negligence – failing to make certain action causing injury / material losses Negligence – failing to make certain action causing injury / material losses False advertising False advertising Misrepresentation – claiming a product will perform certain functions when it could not Misrepresentation – claiming a product will perform certain functions when it could not Trademark violations – under intellectual property law Trademark violations – under intellectual property law

12 COPYRIGHT Copyrights Copyrights Ownership of an original work created by an author Ownership of an original work created by an author A form of intellectual property protection covers the ‘look & feel’ and content of printed media A form of intellectual property protection covers the ‘look & feel’ and content of printed media Gives author the right to exclude others from using the finished work Gives author the right to exclude others from using the finished work Good for life of its author + 70 years Good for life of its author + 70 years

13 TRADEMARK / TRADE NAME A word / symbol distinguishing a good from other goods in the market A word / symbol distinguishing a good from other goods in the market A maze of federal & state laws A maze of federal & state laws Web designer – ‘work made for hire’ Web designer – ‘work made for hire’

14 WEBSITE – PRODUCT/SERVICE? Product Product Software sold off the shelf Software sold off the shelf Uniform Commercial Code (UCC) allows developer to limit liability for defective websites though a disclaimer of warranties Uniform Commercial Code (UCC) allows developer to limit liability for defective websites though a disclaimer of warranties Service Service Custom-designed software Custom-designed software Negligence principles should be usede Negligence principles should be usede

15 WARRANTIES Assurance made by seller about the goods sold Assurance made by seller about the goods sold Express warranty Express warranty Offered orally or in writing by maker of products Offered orally or in writing by maker of products Implied warranty Implied warranty Arises automatically when a sale is made Arises automatically when a sale is made Merchantability Merchantability Disclaimer Disclaimer Seller’s intention to protect the business from unwanted liability Seller’s intention to protect the business from unwanted liability

16 STRICT LIABILITY Joint & several liability for developers, manufacturers & distributors if tort theory applies Joint & several liability for developers, manufacturers & distributors if tort theory applies Protects web visitor regardless of whether anyone is at fault Protects web visitor regardless of whether anyone is at fault

17 TAXATION ISSUES Controversial Controversial Different jurisdiction Different jurisdiction Consumers’ reaction Consumers’ reaction

18 New technology = new ethical problems Traditional rules of conduct are not always applicable to a new medium Traditional rules of conduct are not always applicable to a new medium A question that often arises: Should a device, a technique or technology be restricted because people can use it for illegal or harmful actions as well as beneficial ones? A question that often arises: Should a device, a technique or technology be restricted because people can use it for illegal or harmful actions as well as beneficial ones?

19 Example Mobile phones with cameras. Pupils at school take photos of other pupils in the shower, and publish the pictures on the Internet. Discuss. How to deal with this? Discuss. How to deal with this?

Information Technology Ethical Challenges

21 Challenges: Code of Ethics No Form of licensing for computer professionals No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the computing field Results in no real way to enforce ethical standards within the computing field There is movement within the industry to create a licensing process but there are many issues to be resolved There is movement within the industry to create a licensing process but there are many issues to be resolved What will be included on the exam? What will be included on the exam? How often will an IT professional be required to renew the license? How often will an IT professional be required to renew the license? Developed by several organizations Developed by several organizations Adoption Adoption Implementation Implementation Monitoring Monitoring Example: Example:

22 Challenges: Web Design Implementation of features Implementation of features Pop ups Pop ups Blocking/filters Blocking/filters Aliases and redirecting Aliases and redirecting Cookies Cookies Privacy policies Privacy policies Security policies Security policies Spyware Spyware Use of other design features Use of other design features Javascript Javascript Graphics - pictures, buttons, logos, icons Graphics - pictures, buttons, logos, icons Content Content Design layout Design layout Accountability/responsibility Accountability/responsibility Outdated material, inaccurate material Outdated material, inaccurate material

23 Challenges: Commerce Fraud Fraud Taxation Taxation Free Trade Free Trade Gambling Gambling Auctions Auctions Spamming Spamming Who were Canter and Siegel? Who were Canter and Siegel? Spamming cell phones? Spamming cell phones? Term papers for sale Term papers for sale Atlanta Journal Constitution article Atlanta Journal Constitution article

24 Challenges: Workplace Accessibility Accessibility Ergonomics Ergonomics Outsourcing Outsourcing Telecommuting Telecommuting Customer relationships – Vendor relationships Customer relationships – Vendor relationships Should IT professionals be in the ethics business or should other areas of the business handle these issues? Should IT professionals be in the ethics business or should other areas of the business handle these issues? Monitoring Monitoring Should your employer have the right to monitor private messages? Should your employer have the right to monitor private messages? What are the two most popular Web sites for American workers? Playboy and ESPN What are the two most popular Web sites for American workers? Playboy and ESPN

25 Challenges:Workplace 62% of employers monitor employees' and Internet use. 62% of employers monitor employees' and Internet use. 68% cite legal liability as the primary reason to monitor. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written Policy, 87% of companies that monitor have a written Policy, 83.1% an Internet Policy, 83.1% an Internet Policy, 68% a Software Policy. 68% a Software Policy. 51% of employers have disciplined or terminated employees for violating ePolicy. 51% of employers have disciplined or terminated employees for violating ePolicy. 35% of organizations have retention & deletion policies in place. 35% of organizations have retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee related to workplace lawsuits. 10% of companies have been ordered by courts to turn over employee related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee and/or Internet use. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results.

26 Music Downloads Risk of getting caught Risk of getting caught Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Why is “getting caught remote”? Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries The RIAA is seeking out people who make their music files available for others to download. The RIAA is seeking out people who make their music files available for others to download. The networks have features that allow users to block others from downloading their files but allow them to continue to download files The networks have features that allow users to block others from downloading their files but allow them to continue to download files

27 Challenges: Speech Net Etiquette Net Etiquette privacy privacy privacy policy privacy policy “Flaming” – insulting, argumentative or chastising replies to messages “Flaming” – insulting, argumentative or chastising replies to messages Free Speech Free Speech Accountability and responsibility for web content Accountability and responsibility for web content Abortion sites Abortion sites Outdated information Outdated information Accurate information Accurate information Privacy and security policies Privacy and security policies Porn Porn Professors pc – filled with porn, found by pc maintenance workers Professors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sites Visa – won’t give permission to be used on offensive or pornographic sites Hate Hate MACHADO CASE MACHADO CASE Internet Filters Internet Filters Should filters be in schools or libraries, and /or should they be mandated by law? Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation? Filters can also be set up to filter out other subjects, would this be an ethical violation? Chain Letters Chain Letters

28 Challenges: Computing Resource Abuse Computers in the Workplace and the Classroom Computers in the Workplace and the Classroom Use or Abuse Use or Abuse Internet Access Internet Access Instant Messenger Instant Messenger Laptop use in the classroom Laptop use in the classroom Legal document Legal document Can be modified Can be modified Flaming Flaming Access Access Computer Usage policy Computer Usage policy policy policy

29 Challenges: Computing Resource Abuse Computer Crime Computer Crime Viruses Viruses Hackers Hackers Hackers Theft Theft “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft US Charges 135 With Net Crimes US Charges 135 With Net Crimes US Charges 135 With Net Crimes US Charges 135 With Net Crimes

30 Challenges: Privacy Privacy issues are at the top of the list in regards to ethical use of information. Privacy issues are at the top of the list in regards to ethical use of information. Loss of control Loss of control Misuse of information Misuse of information Risk to physical privacy Risk to physical privacy Risk of identity theft (video) Risk of identity theft (video) Unwanted intrusions into daily life Unwanted intrusions into daily life USA Patriot Act (post 9/11) USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activity Efforts to detect and deter terrorist activity Datamining corporate data Datamining corporate data Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Cookies Cookies Privacy policies Privacy policies

31 Challenges: intellectual Property Electronic Copyright Electronic Copyright Licensing Licensing Interoperability Interoperability Licensing Licensing Cyberlicenses Cyberlicenses Shrinkwrap Shrinkwrap Shareware Shareware Freeware Freeware MP3 MP3 RIAA court case against college students RIAA court case against college students University Internet Usage policies University Internet Usage policies Internet Downloads Internet Downloads Files Files Graphics Graphics Text Text

32 Challenges: Intellectual Property Patent, trade secrets, and copyright law Patent, trade secrets, and copyright law Who owns the program Who owns the program Who owns the algorithm Who owns the algorithm Software Piracy Software Piracy Why shouldn't I use pirated software? Who am I hurting by doing so? Why shouldn't I use pirated software? Who am I hurting by doing so? Piracy exists in everywhere. Piracy exists in everywhere. Loss of revenue hurts everyone. Loss of revenue hurts everyone. All software piracy is illegal and Software piracy is unethical. All software piracy is illegal and Software piracy is unethical. Various studies have found that the software industry loses approximately $12 billion every year. Various studies have found that the software industry loses approximately $12 billion every year. State Industry Study State Industry Study State Industry Study State Industry Study CD-RW CD-RW CD-RW

33 Challenges: Other Decision making using Expert Systems Decision making using Expert Systems Network Security Network Security Software accuracy and reliability who is ethically responsible? Software accuracy and reliability who is ethically responsible? Therac-25 Accidents Therac-25 Accidents Killer Robots Killer Robots The Hughes Whistleblowing Case The Hughes Whistleblowing Case

34 Conclusion: Some Ideas to Ponder Computer ethics today is now a global effort Computer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? What happened? Where did our knowing right from wrong go too? What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?

35 Works Cited: manments_of_Computer_Ethics.htm manments_of_Computer_Ethics.htm manments_of_Computer_Ethics.htm manments_of_Computer_Ethics.htm ials.html ials.html ials.html ials.html