Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Ethical and Social Issues in Information Systems
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
00870B2F.0/Internet%20Safety.jpg.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
ETHICS Internet And Online Community Week 10.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Legal and Ethical Issues in E-Commerce
Chapter # 1 Overview of Ethics
Internet And Online Community Week 10
ISNE101 Dr. Ken Cosh.
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Communication Technology in a Changing World
Presentation transcript:

Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property, Viruses, Worms, Adware, Spyware, Privacy Issues, Spamming, Computer Monitoring

What is Ethics?  Ethics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right and wrong

Effect of IT on Ethics Society as a calm pond IT as rock dropped in pond, creating ripples of new situations not covered by old rules Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws ○ Requires understanding of ethics to make choices in legally gray areas

Ethical Responsibility  Business professionals have a responsibility to promote ethical uses of information technology in the workplace.

Principles of Technology Ethics  Proportionality – the good achieved by the technology must outweigh the harm or risk  Informed Consent – those affected by the technology should understand and accept the risks

Principles of Technology Ethics  Justice – the benefits and burdens of the technology should be distributed fairly  Minimized Risk – even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

Freedoms vs. Censorship Issues  Spamming Indiscriminate sending of unsolicited messages to many Internet users (Junk mail)  Flaming Sending extremely critical, derogatory, and often vulgar messages or newsgroup postings to other users on the Internet or online services (Flame mail) Racist or defamatory messages or sexually explicit material have led to calls for censorship and laws for libel

Internet Abuses in the Workplace  General abuses

Internet Abuses in the Workplace  Leisure use of the Internet (time and resource theft)

Internet Abuses in the Workplace  Unauthorized usage and access

Internet Abuses in the Workplace  Copyright infringement/plagiarism  Newsgroup postings

Internet Abuses in the Workplace  Transmission of confidential data  Pornography – accessing sexually explicit sites

Internet Abuses in the Workplace  Hacking  Non-work related download or upload

Internet Abuses in the Workplace  Usage of external ISPs  Moonlighting

 Software Piracy Unauthorized copying of computer programs  Licensing Purchase of software is really a payment for a license for fair use Site license allow a certain number of copies  A third of the software industry’s revenues are lost due to piracy

Theft of Intellectual Property  Intellectual property Copyrighted material Peer-to-peer networking techniques have made it easy to trade pirated intellectual property

CAN-SPAM Act  Controlling the Assault of Non-Solicited Pornography and Marketing Act.  signed into law by President George W. Bush on December 16, 2003  referred to as the "You-Can-Spam" Act

CAN-SPAM Act  permits marketers to send unsolicited commercial as long as it adheres to 3 basic types of compliance 1. Unsubscribe compliance (Visible Opt-out) 2. Content compliance – label if adult content, legitimate and visible address, relevant subject 3. Sending behavior compliance – can’t have a false header, can’t send on open relay (sending through a third-party)

Adware and Spyware  Adware Software that purports to serve a useful purpose but also allows Internet advertisers to display advertisements (pop-up and banner ads)

Adware and Spyware  Spyware Adware that employs the user’s Internet connection in the background without your permission or knowledge. It usually sends information to a third party for identity theft.

Cookies  Information about you can be captured legitimately and automatically each time you visit a website  This information is recorded as a “cookie” on your disk  Then the website owners may sell the information from cookies to third parties  Cookies can also be intercepted or retrieved form your hard disk by hackers

Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Figure 4-3 HOW COOKIES IDENTIFY WEB VISITORS

European Directive on Data Protection: Companies must inform people information is collected and disclose how it is stored and used. Requires informed consent of customer. EU member nations cannot transfer personal data to countries without similar privacy protection (e.g., the United States). U.S. businesses use safe harbor framework. ○ Self-regulating policy and enforcement that meets objectives of government legislation but does not involve government regulation or enforcement.

Privacy: Opt-in versus Opt-out  Opt-in You (the customer) explicitly consent to allow data to be compiled about you.

Privacy: Opt-in versus Opt-out  Opt-out Data can be compiled about you (the customer) unless you specifically request it not be

Privacy Issues  Violation of Privacy: Accessing individuals’ private conversations and computer records, Collecting and sharing information about individuals gained from their visits to Internet websites

Privacy Issues  Computer Monitoring: Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places Computers used to monitor the productivity and behavior of employees as they work

Privacy Issues  Computer Matching Using customer information gained from many sources to market additional business services  Unauthorized Personal Files Collecting telephone numbers, addresses, credit card numbers, and other personal information to build individual customer profiles

Protecting your Privacy on the Internet  can be encrypted  ISP can be asked not to sell your name and personal information to mailing list providers and other marketers  Decline to reveal personal data and interests on online service and website user profiles

Encryption  Symmetric Key  Asymmetric Key  Three Pass Protocol Asymmetric Key

Advances in IT Advances in data analysis techniques ○ Profiling Combining data from multiple sources to create dossiers of detailed information on individuals ○ Nonobvious relationship awareness (NORA) Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists

Mobile device growth ○ Tracking of individual cell phones

Read the Interactive Session and discuss the following questions Interactive Session: Technology  Why do mobile phone manufacturers (Apple, Google, and BlackBerry) want to track where their customers go?  Do you think mobile phone customers should be able to turn tracking off? Should customers be informed when they are being tracked? Why or why not?  Do you think mobile phone tracking is a violation of a person’s privacy? Life on the Grid: iPhone becomes iTrack