Download presentation
Presentation is loading. Please wait.
Published byEmily Ferguson Modified over 9 years ago
1
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property, Viruses, Worms, Adware, Spyware, Privacy Issues, Spamming, Computer Monitoring
2
What is Ethics? Ethics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right and wrong
3
Effect of IT on Ethics Society as a calm pond IT as rock dropped in pond, creating ripples of new situations not covered by old rules Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws ○ Requires understanding of ethics to make choices in legally gray areas
4
Ethical Responsibility Business professionals have a responsibility to promote ethical uses of information technology in the workplace.
5
Principles of Technology Ethics Proportionality – the good achieved by the technology must outweigh the harm or risk Informed Consent – those affected by the technology should understand and accept the risks
6
Principles of Technology Ethics Justice – the benefits and burdens of the technology should be distributed fairly Minimized Risk – even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk
7
Freedoms vs. Censorship Issues Spamming Indiscriminate sending of unsolicited e-mail messages to many Internet users (Junk mail) Flaming Sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup postings to other users on the Internet or online services (Flame mail) Racist or defamatory messages or sexually explicit material have led to calls for censorship and laws for libel
8
Internet Abuses in the Workplace General e-mail abuses
9
Internet Abuses in the Workplace Leisure use of the Internet (time and resource theft)
10
Internet Abuses in the Workplace Unauthorized usage and access
11
Internet Abuses in the Workplace Copyright infringement/plagiarism Newsgroup postings
12
Internet Abuses in the Workplace Transmission of confidential data Pornography – accessing sexually explicit sites
13
Internet Abuses in the Workplace Hacking Non-work related download or upload
14
Internet Abuses in the Workplace Usage of external ISPs Moonlighting
15
Software Piracy Unauthorized copying of computer programs Licensing Purchase of software is really a payment for a license for fair use Site license allow a certain number of copies A third of the software industry’s revenues are lost due to piracy
16
Theft of Intellectual Property Intellectual property Copyrighted material Peer-to-peer networking techniques have made it easy to trade pirated intellectual property
17
CAN-SPAM Act Controlling the Assault of Non-Solicited Pornography and Marketing Act. signed into law by President George W. Bush on December 16, 2003 referred to as the "You-Can-Spam" Act
18
CAN-SPAM Act permits e-mail marketers to send unsolicited commercial e-mail as long as it adheres to 3 basic types of compliance 1. Unsubscribe compliance (Visible Opt-out) 2. Content compliance – label if adult content, legitimate and visible address, relevant subject 3. Sending behavior compliance – can’t have a false header, can’t send on open relay (sending through a third-party)
19
Adware and Spyware Adware Software that purports to serve a useful purpose but also allows Internet advertisers to display advertisements (pop-up and banner ads)
20
Adware and Spyware Spyware Adware that employs the user’s Internet connection in the background without your permission or knowledge. It usually sends information to a third party for identity theft.
21
Cookies Information about you can be captured legitimately and automatically each time you visit a website This information is recorded as a “cookie” on your disk Then the website owners may sell the information from cookies to third parties Cookies can also be intercepted or retrieved form your hard disk by hackers
22
Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Figure 4-3 HOW COOKIES IDENTIFY WEB VISITORS
23
European Directive on Data Protection: Companies must inform people information is collected and disclose how it is stored and used. Requires informed consent of customer. EU member nations cannot transfer personal data to countries without similar privacy protection (e.g., the United States). U.S. businesses use safe harbor framework. ○ Self-regulating policy and enforcement that meets objectives of government legislation but does not involve government regulation or enforcement.
24
Privacy: Opt-in versus Opt-out Opt-in You (the customer) explicitly consent to allow data to be compiled about you.
25
Privacy: Opt-in versus Opt-out Opt-out Data can be compiled about you (the customer) unless you specifically request it not be
26
Privacy Issues Violation of Privacy: Accessing individuals’ private e-mail conversations and computer records, Collecting and sharing information about individuals gained from their visits to Internet websites
27
Privacy Issues Computer Monitoring: Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places Computers used to monitor the productivity and behavior of employees as they work
28
Privacy Issues Computer Matching Using customer information gained from many sources to market additional business services Unauthorized Personal Files Collecting telephone numbers, e-mail addresses, credit card numbers, and other personal information to build individual customer profiles
29
Protecting your Privacy on the Internet E-mail can be encrypted ISP can be asked not to sell your name and personal information to mailing list providers and other marketers Decline to reveal personal data and interests on online service and website user profiles
30
Encryption Symmetric Key Asymmetric Key Three Pass Protocol Asymmetric Key
31
Advances in IT Advances in data analysis techniques ○ Profiling Combining data from multiple sources to create dossiers of detailed information on individuals ○ Nonobvious relationship awareness (NORA) Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
32
Mobile device growth ○ Tracking of individual cell phones
33
Read the Interactive Session and discuss the following questions Interactive Session: Technology Why do mobile phone manufacturers (Apple, Google, and BlackBerry) want to track where their customers go? Do you think mobile phone customers should be able to turn tracking off? Should customers be informed when they are being tracked? Why or why not? Do you think mobile phone tracking is a violation of a person’s privacy? Life on the Grid: iPhone becomes iTrack
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.