CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada.

Slides:



Advertisements
Similar presentations
Chapter 13: Control processes and systems
Advertisements

Ethics, Privacy and Information Security
TECHNOLOGY GUIDE 4: Intelligent Systems
Accounting for Merchandising Operations
Slide 1-1 Chapter 2 Principles of Accounting Analyzing Business Transactions.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Prepared by: Gabriela H. Schneider, CMA Northern Alberta Institute of Technology INTERMEDIATE ACCOUNTING Seventh Canadian Edition KIESO, WEYGANDT, WARFIELD,
7-1 Impacts of IT Organizations, Individuals, and Society.
Schermerhorn- Chapter 61 Management, 6e Schermerhorn Prepared by Cheryl Wyrick California State Polytechnic University Pomona John Wiley & Sons, Inc.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3 Ethics and Privacy.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
Managerial Accounting by James Jiambalvo Chapter 1: Introduction to Managerial Accounting Slides Prepared by: Scott Peterson Northern State University.
Financial Accounting: Tools for Business Decision Making
Financial Accounting: Tools for Business Decision Making
TENTH CANADIAN EDITION Kieso Weygandt Warfield Young Wiecek McConomy INTERMEDIATE ACCOUNTING PREPARED BY: Dragan Stojanovic, CA Rotman School of Management,
TENTH CANADIAN EDITION INTERMEDIATE ACCOUNTING Prepared by: Lisa Harvey, CPA, CA Rotman School of Management, University of Toronto 1 CHAPTER 15 Appendix.
Chapter 2: The Recording Process
TECHNOLOGY GUIDE 2: Software 1. 2 TG2.1 Introduction to Software TG2.2 Software Issues TG2.3 Systems Software TG2.4 Application Software TECHNOLOGY GUIDE.
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
ACCOUNTING PRINCIPLES SIXTH CANADIAN EDITION Prepared by: Debbie Musil Kwantlen Polytechnic University Chapter 3 Adjusting the Accounts.
INVESTMENTS: Analysis and Management Second Canadian Edition INVESTMENTS: Analysis and Management Second Canadian Edition W. Sean Cleary Charles P. Jones.
C4- Social, Legal, and Ethical Issues in the Digital Firm
ACCOUNTING PRINCIPLES SIXTH CANADIAN EDITION Prepared by: Debbie Musil Kwantlen Polytechnic University Chapter 16 Investments.
Chapter 15 Long-Term Liabilities
Today’s Agenda  Any questions about the assignment (due Mon)?  Quiz  Quiz review  Homework for Friday:  Watch the two videos on the Coursera db website.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
6 Ethics and Privacy.
FINANCIAL ACCOUNTING Prepared by L. de Grace C.A. a user perspective Sixth Canadian Edition John Wiley & Sons Canada, Ltd. ©2011 CHAPTER 2 ANALYZING TRANSACTIONS.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
CHAPTER 1: THE PURPOSE AND USE OF FINANCIAL STATEMENTS
WEYGANDT. KIESO. KIMMEL. TRENHOLM. KINNEAR. BARLOW. ATKINS PRINCIPLES OF FINANCIAL ACCOUNTING CANADIAN EDITION Chapter 6 Inventory Costing Prepared by:
MARKETING RESEARCH ESSENTIALS WITH DATA ANALYSIS IN EXCEL AND SPAA McDaniel │ Gates │ Sivaramakrishnan │ Main Chapter Three: Secondary Data Collection.
CHAPTER 1 Prepared By: Debbie Musil Kwantlen Polytechnic University Tools for Business Decision- Making Fifth Canadian Edition Financial Accounting 6 Copyright.
CHAPTER 4: ACCRUAL ACCOUNTING CONCEPTS
WEYGANDT. KIESO. KIMMEL. TRENHOLM. KINNEAR. BARLOW. ATKINS PRINCIPLES OF FINANCIAL ACCOUNTING CANADIAN EDITION Chapter 17 Financial Statement Analysis.
INVESTMENTS: Analysis and Management Second Canadian Edition INVESTMENTS: Analysis and Management Second Canadian Edition W. Sean Cleary Charles P. Jones.
Weygandt, Kieso, Kimmel, Trenholm, Kinnear Accounting Principles, Third Canadian Edition © 2009 John Wiley & Sons Canada, Ltd. Prepared by: Debbie Musil.
WEYGANDT. KIESO. KIMMEL. TRENHOLM. KINNEAR. BARLOW. ATKINS PRINCIPLES OF FINANCIAL ACCOUNTING CANADIAN EDITION Chapter 2 The Recording Process Prepared.
6 Ethics and Privacy.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
Calter & Calter, Technical Mathematics with Calculus, Canadian Edition ©2008 John Wiley & Sons Canada, Ltd. More Applications of the Derivative Prepared.
CHAPTER 5 ETHICS & PRIVACY.
WEYGANDT. KIESO. KIMMEL. TRENHOLM. KINNEAR. BARLOW. ATKINS PRINCIPLES OF FINANCIAL ACCOUNTING CANADIAN EDITION Chapter 10 Current Liabilities Prepared.
TENTH CANADIAN EDITION INTERMEDIATE ACCOUNTING PREPARED BY: Lisa Harvey, CPA, CA Rotman School of Management, University of Toronto 1 CHAPTER 16 Appendix.
FINANCIAL FINANCIAL ACCOUNTING ACCOUNTING A U s e r P e r s p e c t i v e A U s e r P e r s p e c t i v e Third Canadian Edition Third Canadian Edition.
Chapter 8 Accounting for Foreign Investments © 2013 Advanced Accounting, Canadian Edition by G. Fayerman.
Chapter 171 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
FINANCIAL ACCOUNTING Tools for Business Decision-Making KIMMEL  WEYGANDT  KIESO  TRENHOLM  IRVINE CHAPTER 3: THE ACCOUNTING INFORMATION SYSTEM.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Chapter 2 Appendix 2A Chapter 2 Appendix 2A Fair Value Measurements Prepared by: Dragan Stojanovic, CA Rotman School of Management, University of Toronto.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Chapter 15 Appendix 15A Chapter 15 Appendix 15A Par Value and Treasury Shares Prepared by: Dragan Stojanovic, CA Rotman School of Management, University.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie Tech Guide D: The Details of SQL, Data Modelling,
CHAPTER 5 Network Applications. Chapter Outline 5.1 Network Applications 5.2 Web E-Learning and Distance Learning 5.4 Telecommuting.
CHAPTER 12 Ethics and Privacy
Using Technology to Manage Information
Chapter 9 Ethics and Professional Practice in IT
Information Systems: Concepts and Management
Accrual Accounting Concepts
Chapter 16 Appendix 16C Advanced Models for Measuring Fair Value
ACCOUNTING INFORMATION SYSTEMS
CHAPTER 3 Ethics and Privacy.
Presentation transcript:

CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

Ethical Issues 12.2 Privacy Chapter 12: ETHICS AND PRIVACY

3 LEARNING OBJECTIVES 1.Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 2.Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there. Copyright John Wiley & Sons Canada

4 OPENING CASE What to Do About WikiLeaks? The Problem Whistleblowers can capture huge amounts of incriminating documents on a laptop, memory stick, or portable hard drive. This information can be sent through personal accounts or online drop sites, or they can simply submit it directly to WikiLeaks ( WikiLeaks receives approximately 10,000 new documents every day. Since its inception, in December 2006, WikiLeaks has had significant impacts on both businesses and governments; how can future disclosures be prevented? Copyright John Wiley & Sons Canada

5 OPENING CASE The IT Solution –Several cyber security measures from the DLP (data leak protection) industry have been tried. However, none have been effective. Recently, organizations have turned to network forensics, which is the process of constantly collecting every digital “fingerprint” on an organization’s servers to trace and identify an intruder who has broken into the system. Although this software gathers data and makes them easily available, it does not identify the culprit. Copyright John Wiley & Sons Canada

6 OPENING CASE The Results –How can organizations and governments respond to WikiLeaks? Lawsuits will not work, because WikiLeaks, is a mere conduit for documents. Moreover, even if a company or a government somehow won a judgment against WikiLeaks, that would not shut down the company, because its assets are spread all over the world. Governments may need to revise their practices to avoid being targeted. Copyright John Wiley & Sons Canada

7 OPENING CASE What we learned from this case? –All organizations, large and small, must be concerned with ethics. You will encounter numerous ethical and privacy issues in your career, many of which will involve IT requiring solutions that do not violate the privacy of governments, organizations, and individuals. Copyright John Wiley & Sons Canada

8 DISCUSSION 1.Define the term “whistleblower” as it relates to IT issues. 2.How can governments, organizations, and even individuals prevent future disclosures from whistleblowers? Is it possible to accomplish this task, given that the sources of WikiLeaks’ information appear to be internal? Copyright John Wiley & Sons Canada

ETHICAL ISSUES Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behaviour. Copyright John Wiley & Sons Canada

10 ETHICAL FRAMEWORKS Ethical Frameworks are standards used to develop general frameworks for ethics or ethical decision making: –Utilitarian –Rights –Fairness –Common Good For examples of standards used in Canada click here: Copyright John Wiley & Sons Canada

11 TRADITIONAL AND GVV APPROACHES Traditional GVV 1. Recognize an ethical issue1. Identify an ethical issue 2. Get the facts2. Purpose and choice 3. Evaluate alternative actions3. Stakeholder analysis 4. Make a decision and test it4. Powerful response 5. Scripting and coaching Copyright John Wiley & Sons Canada

12 ETHICS IN THE CORPORATE ENVIRONMENT Code of ethics: a collection of principles that are intended to guide decision making by members of an organization. organization Fundamental tenets of ethics include: –Responsibility –Accountability –Liability Copyright John Wiley & Sons Canada

13 ETHICS AND IT Four general categories of ethical issues in IT applications: –Privacy –Accuracy –Property –Accessibility Copyright John Wiley & Sons Canada

14 UNETHICAL VS. ILLEGAL What is unethical is not necessarily illegal. –Ethics scenariosEthics scenarios Copyright John Wiley & Sons Canada

15 IT’S ABOUT BUSINESS 12.2 Big Brother Is Watching You –People today live with a degree of surveillance that would have been unimaginable just a few generations ago. Examples include surveillance cameras, GPS and facial-recognition software. Facebook encourage users to assign names to people in photos, Once you are tagged in a photo, that photo could be used to search for matches across the entire Internet or in private databases, including databases fed by surveillance cameras.Facebook

PRIVACY Court decisions have followed two rules for defining privacy: 1.The right of privacy is not absolute. Your privacy must be balanced against the needs of society. 2.The public’s right to know supersedes the individual’s right of privacy. Copyright John Wiley & Sons Canada

17 IT TECHNOLOGIES Data aggregators, digital dossiers, and profiling Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites Copyright John Wiley & Sons Canada

18 DATA AGGREGATORS, DIGITAL DOSSIERS, AND PROFILING Data Aggregators collect public and non-public data then integrate these data to form digital dossiers on most adults in North America. Click on the following links to review examples of data aggregators: – – – Copyright John Wiley & Sons Canada

19 ELECTRONIC SURVEILLANCE 1.The law supports the right of employers to read their employees’ and other electronic documents and to monitor their employees’ Internet use. 2.See the Globe & Mail article regarding surveillance in Canada.Globe & Mail Copyright John Wiley & Sons Canada

20 PERSONAL INFORMATION IN DATABASES 1.Banks and financial institutions 2.Utility companies 3.Employers 4.Government agenciesGovernment agencies 5.Credit reporting agenciesCredit reporting agencies 6.Hospitals 7.Schools and universities 8.Retail establishments © Nicolas Nadjar/Age Fotostock America, Inc. Copyright John Wiley & Sons Canada

21 INFORMATION ON INTERNET BULLETIN BOARDS, NEWSGROUPS, AND SOCIAL NETWORKING SITES Social Networking Sites often include electronic discussions such as chat rooms. These sites appear on the Internet, within corporate intranets, and on blogs. A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. Clicking here will take you to the Government of Canada article on the Pros and Cons of Social Networking in businessClicking here © Marina Bordjieva/Age Fotostock America, Inc. Click on the picture to read about the pros and cons of Social Networking in business

22 PRIVACY CODES AND POLICIES Opt-in Model prohibits an organization from collecting any personal information unless the customer specifically authorizes it.Opt-in Model Opt-out model permits the company to collect personal information until the customer specifically requests that the data not be collected.Opt-out model Copyright John Wiley & Sons Canada

23 IT’S ABOUT BUSINESS 12.3 Your Privacy on Facebook –The Office of the Privacy Commissioner of Canada has engaged in numerous actions against Facebook due to potential privacy concerns. Facebook continues to innovate, providing new products such as Graph Search and software for Android users. Every new product announcement is greeted by privacy concerns, while Facebook’s view is that users still have the ability to tailor their privacy settings while having better services available.Office of the Privacy Commissioner of Canada Copyright John Wiley & Sons Canada

24 INTERNATIONAL ASPECTS OF PRIVACY Approximately 50 countries have some form of data- protection laws.50 countries Many of these laws conflict with those of other countries, or they require specific security measures. Some countries have no privacy laws at all Whose laws have jurisdiction when records are stored in a different country for reprocessing or retransmission purposes. Copyright John Wiley & Sons Canada

25 CHAPTER CLOSING 1.Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior including responsibility, accountability, and liability. 2.Major ethical issues related to IT are privacy, accuracy, property and access to information. Copyright John Wiley & Sons Canada

26 CHAPTER CLOSING (CONTINUED) 3.Threats to privacy include advances in information technologies, electronic surveillance, personal information in databases, Internet bulletin boards, newsgroups, and social networking sites. 4.One personal threat to the privacy of data stored is that you might post too much personal information that many unknown people can see. Copyright John Wiley & Sons Canada

Copyright Copyright © 2014 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (the Canadian copyright licensing agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these files or programs or from the use of the information contained herein. 27