What is ethics? According to Laudon & Laudon, ethics refers to the principles of right and wrong that can be used by individuals acting as free moral agents.

Slides:



Advertisements
Similar presentations
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advertisements

 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 1 An Overview of Ethics
Information Technology in Organizations
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Information Systems Ethics, Computer Crime, and Security
Ethical and Social Issues in Information Systems
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Little brother is watching you
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Ethical and Social Issues. Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior.
Chapter Five Ethical and Social Impact of Information Systems.
ITIS 1210 Introduction to Web-Based Information Systems Ethical & Social Issues.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
5.1. LEARNING OBJECTIVES UNDERSTAND ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSUNDERSTAND ETHICAL, SOCIAL, POLITICAL ISSUES RAISED.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Chapter 4. Understanding Social and Ethical Issues Related to Systems  In the past firms paid for the legal defense of their employees enmeshed in civil.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Cyber crime & Security Prepared by : Rughani Zarana.
Ethics Last Update Copyright Kenneth M. Chipps Ph.D
14.1 OF INFORMATION SYSTEMS CHAPTER 14. ETHICAL & SOCIAL IMPACT.
CYBER CRIME.
Who wants to be an IT Ethics Millionaire. Rules of Play You will get between 30 seconds and 2 minutes to formulate your answer You can opt out at any.
1 Profesional Ethics & Social Responsibility. 2 Objectives What is ethics, and why is it important to act according to a code of principles? Why is business.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
1 ETHICAL ISSUES INTRODUCTION to E-COMMERCE (COMM1Q) Ethical Issues: source; Laudon & Laudon, Management Information Systems 7th Edn., Prentice-Hall, 1998.
What is ethics? According to Laudon & Laudon, ethics refers to the principles of right and wrong that can be used by individuals acting as free moral agents.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Ethical and Social Impact of Information Systems
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
ETHICAL AND SOCIAL IMPACT OF INFORMATION SYSTEMS
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
4/17: Ethical & Social Issues in IS
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
1 Lecture 7 ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM PRESENTED BY: WALTER O Angol.
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
4-1 Copyright © 2013 Pearson Canada Inc. CHAPTER FOUR Social, Ethical, and Legal Issues in Information Systems.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
ETHICS Internet And Online Community Week 10.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Common Methods Used to Commit Computer Crimes
Ethical, Social, and Political Issues in E-commerce
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Chapter # 1 Overview of Ethics
ETHICS IN THE WORKPLACE
Internet And Online Community Week 10
Year 10 ICT ECDL/ICDL IT Security.
ISNE101 Dr. Ken Cosh.
BCT 2.00 Analyze Technology Issues
ETHICAL ISSUES IN INFORMATION TECHNOLOGY (CCI410) PERTEMUAN 7
CHAPTER FOUR OVERVIEW SECTION ETHICS
Communication Technology in a Changing World
Ch8 Ethics, law and e-commerce
Ethical, Social and Political Issues
Presentation transcript:

What is ethics? According to Laudon & Laudon, ethics refers to the principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior.

Ethical and Social Concerns The development of national digital superhighway communication networks widely available to individuals and businesses poses many ethical and social concerns.

Info System Impacts Whatever information system impacts exist are a product of instititional, organizational, and individual actions and behaviors. Immanuel Kant’s Categorical Imperative says that if an action is not right for everyone to take, then it is not right for anyone.

Other ethical rules/principles If an action cannot be taken repeatedly, then it is not right to be taken at any time (Descarte) One can put values in rank order and understand the consequences of various courses of action (Utilitarian) “Take the action that achieves the higher or greater value.” All tangible and intangible objects are owned by someone, unless specifically stated otherwise.

What is privacy? The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations. The set of principles governing the collection and use of information about individuals is known as FIP

FIP Principles Fair Information practices (FIP) principles include: individuals have rights of access, inspection, review, and amendment to systems that contain information about them

Cryptography and the Internet Concerns of e-commerce: –lack of security, reliability, and accountability –The greatest use of e-commerce today is customer-to- business as opposed to business-to-business Strong security is: –hard to implement –requires eternal, almost obsessive vigilance to maintain. –Public key encryption is used by most businesses who conduct business on the web.

Security and hackers One of the most famous hackers gained notoriety at age 17 when he broke into the military’s NORAD air defense computer system. He hacked his way into phone companies, cellular networks, credit bureaus, university and corporate computers. He was finally caught two months after he broke into the San Diego Supercomputer Center.

Security Issues Some perceive that Hacking has to do with the belief that all info should be free. Most FBI computer crimes were committed by hackers gaining access to internal networks through the Internet. Once a local area network is hooked up to the Net, sensitive data in the system potentially becomes accessible to every computer on the Net.

Ways to protect one’s system Encryption Firewalls Digital Pathways Security software

Security Compromised Systems Yes, this means someone is lurking or has invited themselves in as an unwelcome guest. So, you can do such things as: –follow the intruder back to this origin –implement some password scheme

Fact: 85 to 97 percent of all computer break-ins are not reported. Would you want to do business with a company whose system has been compromised? The Great Arpanet Worm--R. Morris, Jr. wrote a program that penetrated the country’s poorly defended computer networks, replicating itself so fast that it created a nationwide network gridlock in a matter of days.

But there’s more! The New California Gold Rush. A bank employee simply ed Brinks to tell them to deliver 44 kilos of gold to a P.O. Box number in remote California. Someone picked up the gold--and disappeared.

Hacker’s vengeance Garbage dump. Angered by a piece a Newsday journalist had written about hackers, the article’s subjects hacked their way into the root directories of IBM., Sprint, and a small Internet provider called Pipeline to fire thousands of abusive junk items to his personal address, effectively preventing him from accessing the Internet.

Four Key technological Trends/Ethical Issues The doubling of computer power every 18 months Advances in data storage techniques and rapidly declining storage cost Advances in data mining techniques for large databases Advances in telecommunications infrastructure like ISDN/ATM and Internet. All this will permit the invasion of privacy on a very large scale.