Copyright Prentice-Hall, Inc. 2001 Computers in Society: Today Chapter 10.

Slides:



Advertisements
Similar presentations
Professional Ethics Social Implications of Computers.
Advertisements

Information Technology as a Profession
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Presented by Student Name Workplace Issues – Lecture 4.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Professional Codes of Ethics Professionalism and Codes of Ethics.
1. 2 Technology in Action Technology in Focus: Careers in IT Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ethics Lecture Dr. Christina Howe
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C4- Social, Legal, and Ethical Issues in the Digital Firm
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Computer Ethics for Computer Users
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Authoring and Multimedia Legal, Social, Ethical and Industrial Issues.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Security and Ethics Privacy Employment Health Crime Working
General Moral imperatives
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
17 April Reverse Engineering Ethics Privacy Introduction.
Ethics.
Ethical Issues in Computing
Do software developers have an ethical duty? KELLEN STUART.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
CSCI 392 Review of Computing and Society
Computers Are Your Future Twelfth Edition
CSCI 392: Seminar in Computing and Society
Computers: Tools for an Information Age
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Technology, Careers, and Job Hunting
Professional Codes of Ethics
Chapter # 2 Ethics for IT workers & IT Users
CS-480b Network Security Dick Steflik
Presentation transcript:

Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10

10-2 Our Information Society MonthlyTechnologyUpdate IT Paradox Working in the Information Society The Workplace Ethics Security Issues

10-3 IT Paradox l Are we ready for IT? l Do we really want IT? l We are reaching the point of no return! Information Technology is thriving in a society that may not be ready for it.

10-4 Why Choose an IT Career? Computer Systems Analyst called best job in America Internet economy is growing at 20 times the rate of the general economy IT careers consistently ranked among the most desirable jobs 1 in every 10 jobs for IT specialists is open

10-5 Working in the Information Society: IT Jobs l Chief Information Officer (CIO) l Systems Analyst l Applications Programmer l Programmer/Analyst l Network Administrator l System Programmer Jobs Courtesy of Novell

10-6 l Database Administrator (DBA) l Internet Site Specialist l Webmaster l Computer Operator l User Liaison l PC Specialist Working in the Information Society: IT Jobs Photo courtesy of Intel Corporation

10-7 l Licensing not currently required l Certifications offered by: u Institute for Certification of Computer Professionals u Microsoft u Novell l IT Competent Minority l Jobs are Changing Working in the Information Society: Issues

10-8 The Workplace Cumulative trauma disorder Carpal tunnel syndrome Repetitive stress injuries Video operator’s distress syndrome Ergonomics: Study of the relationships between people and the things we use.

10-9 And yet another possible ergonomic activity...

10-10 The Workplace l Workplace Design u Include flexibility u OSHA requirements u Ergonomic considerations l Green Computing u Energy Star guidelines u Less printing u Recycle whenever possible

10-11 Ethics: ACM Code of Conduct l Contribute to society and human well-being l Avoid harm to others l Be honest and trustworthy l Be fair and take action not to discriminate l Honor property rights including copyrights and patents l Give proper credit for intellectual property l Respect the privacy of others l Honor confidentiality General Moral Imperatives

10-12 Ethics: Misuse of Personal Information l Sources of Personal Data l Violating Privacy u Selling your information u Cookies l Computer Matching l Privacy Question: No Easy Answers l Computer Monitoring Ethics in Computing 40% of all white- collar workers are afraid of new technology. This is somewhat due to a fear of loss of privacy.

10-13 Ethics: Computer Crime l Law is not always clear l Computer Fraud l Negligence & Incompetence l Crackers (or Hackers) u Evidence is called a footprint l Crime on the Internet l Software Piracy Computer Crime

10-14 Computer, Internet, and System Security l White-Collar Crime l Computer Viruses l Natural Disasters l Vandalism l Carelessness Threats

10-15 Computer-Center Security l Hardware u Use fault-tolerant design u Install uninterruptible power source (UPS) for backup l Software u Minimize opportunities for unlawful modification of software u Use antiviral programs u Protect and backup files/databases

10-16 Computer-Center Security l Data Communications u Employ cryptography technology u Encryption/Decryption u Secure Sockets Layer - SSL u Digital ID l Personnel Serendipitous Surfing: Music Courtesy of E-Systems, Inc.

10-17 Other Security Issues l Information Systems Security u Physical Security u Logical Security (ID and Password) l PC Security l Acceptable Level of Risk Courtesy of Kensington Technology Group

Copyright Prentice-Hall, Inc End of Chapter 10 Interactive Study Guide