CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Ethics, Privacy and Information Security
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3 Ethics and Privacy.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Company LOGO Internet Safety A Community Approach.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Chapter 3 Ethics, Privacy & Security
Information Security Information Technology and Computing Services Information Technology and Computing Services
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Information Systems: Ethics, Privacy and Information Security
CHAPTER 3 Ethics, Privacy and Information Security.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Your Information Assets
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
6 Ethics and Privacy.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Staying Safe Online A Practical Guide for Middle School Students.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
PLUG IT IN SIX Protecting Your Information Assets.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Security and Ethics Privacy Employment Health Crime Working
6 Ethics and Privacy.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
Privacy, Security and Ethics
CHAPTER 5 ETHICS & PRIVACY.
CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada.
Security and Ethics Safeguards and Codes of Conduct.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
TECHNOLOGY GUIDE THREE
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
3 Ethics and Privacy 35 Slides.
Protecting Your Information Assets
Chapter 10: Privacy, Security, and Ethics
ICT Communications Lesson 3: Internet Life and Privacy
CHAPTER 3 Ethics and Privacy.
Presentation transcript:

CHAPTER 3 Ethics and Privacy

Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets

Chapter Opening Case

Questions about Wikileaks Was it legal for Wikileaks to post this information? Who is acting unethical? Wikileaks US Government Both

Chapter 3 - Ethics How do you define ethics? 5

3.1 Ethical Issues - Standards Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior Guidelines/Approaches

General Framework for Ethics 1. Recognize an ethical issue 2. Get the facts 3. Evaluate alternative actions 4. Make a decision and test it 5. Act and reflect on the outcome of your decision

Ethics in the Corporate Environment Code of ethics / conduct Microsoft Google Fundamental tenets of ethics 1. Responsibility 2. Accountability 3. Liability

Unethical vs. Illegal Is everything that is unethical also illegal? Enron World Com Subprime Mortgages Other Examples

Ethics and Information Technology Ethical use of information and information technology Should organizations: monitor employees? sell customer info? audit employee computers? (unauthorized software or content) Employers can and will monitor employees at work!

Ethics and Information Technology Do s last forever? This can also applies to messaging at companies.

Advice for Organization Use 1.Only use company computer for business related work 2.Don’t send s you wouldn’t want your parents to see 3.Limit who you give work to

Ethics and Information Technology Four categories of ethical issues involving IT applications : Privacy Issues Accuracy Issues Property Issues Accessibility Issues

How much privacy do we have left? Don’t forget: You can copy- paste this slide into other presentations, and move or resize the poll. 1)We Still Have a high level of privacy 2)We are beginning to have less privacy 3)Privacy? What’s that?

Privacy Court decisions have followed two rules: (1) The right of privacy is not absolute. Your privacy must be balanced against the needs of society. (2) The public’s right to know is superior to the individual’s right of privacy.

Ex. Google and User Data

Ex. Mobile Device Location

Threats to Privacy Data aggregators, digital dossiers, and profiling Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

Data Aggregators, Digital Dossiers, and Profiling © Ilin Sergey/Age Fotostock America, Inc.

Electronic Surveillance © Ilin Sergey/Age Fotostock America, Inc. What are employee rights against surveillance?

Electronic Surveillance A Face in the crowd: Say goodbye to anonymity

Personal Information in Databases Banks Utility companies Government agencies Credit reporting agencies © Nicolas Nadjar/Age Fotostock America, Inc.

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites © Marina Bordjieva/Age Fotostock America, Inc.

Social Networking Sites Can Cause You Problems Anyone can post derogatory information about you anonymously. (See this Washington Post article.)article You can also hurt yourself, as this article shows.article

What Can You Do? First, be careful what information you post on social networking sites. Second, a company, ReputationDefender, says it can remove derogatory information from the Web.

Protecting Privacy Privacy Codes and Policies Ex. Facebook, AppleFacebookApple Opt-out Model Opt-in Model © Gunnar/Age Fotostock America, Inc.

Tech Guide 5 Protecting Your Information Assets

Information Assets What is meant when we say information assets?

Behavioral Actions Protect SSN# Secure credit cards Physical Virtual Debit Cards vs. Credit Cards Proactive Protection

Identity Theft Dumpster Diving Skimming Phishing Changing your address Old-Fashioned Stealing Pretexting Federal Trade Commission

Computer-Based Actions Know what sites have been visited Infected Computers Malware Infections Anti-Virus ( Security suite (ZoneAlarm)ZoneAlarm Antispyware (Ad-Aware)Ad-Aware

Computer-Based Actions Information in SNS Manage Patches Browser and Operating Systems

Portable Devices and Information Data Encryption Password Protect Locating Devices Prey Project Find my iPhone Where’s My Droid