Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.

Similar presentations


Presentation on theme: "ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats."— Presentation transcript:

1 ISNE101 Dr. Ken Cosh

2 Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats

3 This Week  Ethics

4 Ethical & Social Impact  Ethical issues in the areas of crime, privacy, individuality, employment, health and working conditions.  Impacts can be positive, negative or both;  Computerising a manufacturing process has lead to people losing jobs, while improving the working conditions of those left and producing higher quality product and less cost.

5 Managing Ethically  Should you monitor employees email?  Should employees use work computers for private purposes?  Should they take copies of software home?  Should you keep electronic copies of employee’s personal records?  Should you sell your customers information?

6 Management’s Ethical Challenges  Employment  The introduction of IS/IT has created many new jobs, while at the same time eliminating some – how do we ethically introduce job cutting systems?  Computer Monitoring  How can we weigh up our employees right to privacy against the desire to monitor computer usage (as a way of managing employees work)?

7 Management’s Ethical Challenges  Working Conditions  While IS/IT has removed many repetitive, monotonous tasks, often the human role has changed from one of a craftsman to one of a machine regulating a machine  Individuality  Many IS/IT remove the individual treatment of people by imposing strict, uncustomisable procedures. Rather than dealing with customers individually, we are constrained by the capabilities of the system.

8 Business Ethics  Stockholder Theory  Managers are agents of the stockholders, with the ethical responsibility to them to increase profits without breaking the law  Social Contract Theory  Companies have an ethical responsibility to all members of society.  Stakeholder Theory  Managers should manage for the benefit of all stakeholders; shareholders, customers, suppliers, local community, employees etc.

9 Unauthorised Use at Work  Time and Resource Theft (Cyberslacking)  Often monitored by sniffing software.  Includes;  General Email abuse (spamming, chain letters, spoofing, virus spreading, harrassment, defamatory statements)  Unauthorised Usage and Access (Sharing passwords and network access)  Copyright Infringement / Plagiarism (illegal or pirate software, copying websites or logos)

10 Unauthorised Use at Work  Transmission of Confidential Data (Sharing company secrets)  Pornography (Accessing inappropriate websites on work resources)  Hacking  Non-work-related bandwidth use (sharing movies, music etc.)  Leisure use (online shopping, chatting, gambling)  Usage of External ISPs (avoiding detection by using external ISP)  Moonlighting (using company resources for personal business).

11 Privacy  A basic human right is the right to privacy, but this right is brought into question by Technology.  Accessing individuals private email conversations and computer records is a violation of privacy  Monitoring peoples whereabouts through CCTV, computer monitoring, Mobile GPS.  Computer matching of customer information gained from different sources.  Collecting telephone number / email addresses etc. to build customer profiles

12 Anonymity  The internet allows almost anonymity  In reality much of it is very visible and open to privacy violations.  But precautions can be taken to protect privacy, such as encryption, authentication etc.

13 Freedom of Speech / Information  Freedom of speech (information and the press), is another important human right.  Do people have a right to know about matters that others may wish to keep private?  With modern communication systems, sharing opinions (using ones right to free speech) becomes easier;  Flaming  Spamming

14 Facebook…  So who has read Facebook’s Privacy Policy?

15

16

17

18

19

20


Download ppt "ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats."

Similar presentations


Ads by Google