🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

1-introduction-2.pptx

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

PROFESSION AL ETHICS IN COMPUTING IC122 OBJECTIVES a) What is ethics, and why is it important to act according to a code of principles? b) Why is business ethics becoming increasingly important? c) What are corporations doing to improve business ethics? d) Why are corporatio...

PROFESSION AL ETHICS IN COMPUTING IC122 OBJECTIVES a) What is ethics, and why is it important to act according to a code of principles? b) Why is business ethics becoming increasingly important? c) What are corporations doing to improve business ethics? d) Why are corporations interested in fostering good business ethics? e) What approach can you take to ensure ethical decision making? f) What trends have increased the risk of using information technology unethically? ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 2 MIX WORD TEMA TIAMNORIVE LIEDAPP WHAT IS ETHICS? Ethics is a set of moral principles that govern the behaviour of a group or individual. WHAT IS ETHICS? Moral code Set of rules Establishes boundaries of generally accepted behaviour Different rules often have contradictions Morality Social conventions about right and wrong Widely shared Book Page 3 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 13 WHAT IS ETHICS? (CONTINUED) Morality may vary by: Age Cultural group Ethnic background Religion Gender Book Page 3 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 14 DEFINITION OF ETHICS Ethics - set of beliefs about right and wrong behaviour Ethical behaviour conforms to generally accepted social norms Virtues - Habits that incline people to do what is acceptable  Fairness, generosity, and loyalty Vices - Habits of unacceptable behavior  vanity, greed, envy, and anger Value system - Scheme of moral values  People’s virtues and vices help define their personal value system— the complex scheme of moral values by which they live. Book Page 3-4 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 15 THE IMPORTANCE OF INTEGRITY Integrity is a cornerstone of ethical behaviour People with integrity Act in accordance with a personal code of principles Extend to all people the same respect and consideration that you desire  Page 4 the same moral standards in all BookApply ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 21 EXAMPLE You might believe it is important to do as your employer requests while also believing that you should be fairly compensated for your work. Thus, if your employer insists that, due to budget constraints, you not report the overtime hours that you have worked, a moral conflict arises. You can do as your employer requests or you can insist on being fairly compensated, but you cannot do both. In this situation, you may be forced to compromise one of your principles and act with an apparent lack of integrity. You might consider it morally acceptable to tell a little white lie to spare a friend some pain or embarrassment, but would you lie to a work colleague or customer about a business issue to avoid unpleasantness? Clearly, many ethical dilemmas are not as simple as right versus wrong but involve choices between right versus right. As an example, for some people it is “right” to protect the Alaskan wildlife from being spoiled and also “right” to find new sources of oil to maintain U.S. oil reserves, but how do they balance these two concerns? DIFFERENCE BETWEEN MORALS, ETHICS AND LAWS. ETHICS ARE… Set of beliefs about right and wrong behavior A gauge of personal integrity The basis of trust and cooperation in relationships with others AN ETHICAL PERSON… Has an inner sense of what is moral and is able to choose correct behavior MORALS ARE… One’s personal beliefs about right and wrong. LAWS ARE… A system of regulations that tells us what we can and cannot do. Laws are enforced by a set of institutions.... Ethics- Society Morals- Individual Laws- Institutions Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law- making bodies). Legal acts are acts that conform to the law. Moral acts conform to what an individual believes to be the right thing to do. Laws can proclaim an act as legal, although many people may consider the act immoral—for example, abortion. WHAT IS COMPUTER ETHICS? Computer Ethics is the set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. TEN COMMANDMENTS OF COMPUTER ETHICS 1. Should not use a computer to harm other people. 2. Should not interfere with other people’s computer work. 3. Should not snoop around in other people’s files. 4. Should not use a computer to steal. 5. Should not use a computer to bear false. 6. Should not use or copy software for which you have not paid. 7. Should not use other people’s computer resources without authorization. TEN COMMANDMENTS OF COMPUTER ETHICS 8. Should not appropriate other people’s intellectual output. 9. Should think about the social consequences of the program you write. 10. Should use a computer in ways that show consideration and respect. COMMANDMENT 1: SHOULD NOT USE A COMPUTER TO HARM OTHER PEOPLE. This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. COMMANDMENT 2: SHOULD NOT INTERFERE WITH OTHER PEOPLE’S COMPUTER WORK. Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. COMMANDMENT 3: SHOULD NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy. COMMANDMENT 4: SHOULD NOT USE A COMPUTER TO STEAL. Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. COMMANDMENT 5: SHOULD NOT USE A COMPUTER TO BEAR FALSE. Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to-believe information, are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong. Giving wrong information can hurt other parties or organizations that are affected on that particular theme. COMMANDMENT 6: SHOULD NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his name. In case of a developer writing software for the organization he works for, the organization holds the copyright for it. COMMANDMENT 7 : SHOULD NOT USE OTHER PEOPLE’S COMPUTER RESOURCES WITHOUT AUTHORIZATION. Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. COMMANDMENT 8: SHOULD NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT. Programs developed by a software developer are his/her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. COMMANDMENT 9: SHOULD THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE. Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. COMMANDMENT 10: SHOULD USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT. The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. ETHICS IN THE BUSINESS WORLD BUSINESS ETHICS Comprises principles and standards that guide behavior in the world of business Right or wrong, acceptable or unacceptable behavior within the organization Determined by you and key stakeholders ETHICS IN THE BUSINESS WORLD Risk is the product of multiplying the likelihood of an event by the impact of its occurrence Risks associated with inappropriate behaviour have increased due to  Globalization  Heightened vigilance by  Employees  Shareholders  Regulatory agencies Book Page 5 ETHICS IN INFORMATION TECHNOLOGY, FIFTH EDITION 63 BERNARD MADOFF - an American fraudster and a former stockbroker, investment advisor, and financier. - He is the former non-executive chairman of the National Association of Securities Dealers Automated Quotations (NASDAQ) stock market, and the admitted operator of a Ponzi scheme that is considered the largest financial fraud LIKELIHOOD OF UNETHICAL BEHAVIOR 1. For many organizations, greater globalization has created a much more complex work environment that spans diverse cultures and societies, making it more difficult to apply principles and codes of ethics consistently. 2. In today’s difficult and uncertain economic climate, organizations are extremely challenged to maintain revenue and profits. Some organizations are sorely tempted to resort to unethical behavior to maintain profits. ETHICS IN THE BUSINESS WORLD (CONTINUED) Recent scandals in IT companies  WorldCom  Qwest Communications International Inc.  Adelphia Communications Corp.  Computer Associates (CA)  Enron accounting scandal  result of faulty accounting  Enron’s debts and losses were not reported in its financial statements Book Page 5-6 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 66 LEGAL OVERVIEW: SOX - THE SARBANES-OXLEY ACT Enacted in response to public outrage over several major accounting scandals Section 404 requires that the CEO and CFO sign any SEC filing to attest to its accuracy Public Company Accounting Oversight Board (PCAOB) provides oversight for auditors of public companies IT organizations must build controls that ensure information stands up to audit scrutiny Book Page 6-7 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 67 SOX - THE SARBANES-OXLEY ACT OF 2002 an act passed by U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations. The SOX Act mandated strict reforms to improve financial disclosures from corporations and prevent accounting fraud. LAPSES IN BUSINESS ETHICS BY EMPLOYEES IN IT ORGANIZATIONS 1. In 2011, IBM agreed to pay $10 million to settle civil charges arising from a lawsuit filed by the Securities and Exchange Commission (SEC) alleging the firm had violated the Foreign Corrupt Practices Act for bribing government officials in China and South Korea to secure the sale of IBM products. (The act makes it illegal for corporations listed on U.S. stock exchanges to bribe foreign officials.) The bribes allegedly occurred over a decade and included hundreds of thousands of dollars of cash, electronics, and entertainment and travel expenses in exchange for millions of dollars in government contracts. CONT… 2. The founders of the three largest Internet poker companies were indicted for using fraudulent methods to circumvent U.S. antigambling laws and to obtain billions of dollars from U.S. residents who gambled on their sites 3. The Office of the Comptroller of the Currency (OCC), which oversees large U.S. banks, accused Citibank in 2012 of failing to comply with rules intended to enforce the Bank Secrecy Act. This act is designed to deter and detect money laundering, terrorist financing, and other criminal acts. Citibank neither admitted nor denied the allegations, but the company did agree to provide the OCC with a plan outlining how it would bring its program into compliance THE BATHSHEBA SYNDROME A reference to the biblical story of King David, who became corrupted by his power and success. According to the story, David became obsessed with Bathsheba, the wife of one of his generals, and eventually ordered her husband on a mission of certain death so that he could marry Bathsheba. EXAMPLE A low-level employee of the Technical Services Department of Monroe County, Florida, was entrusted with responsibility for both acquisition and distribution of the county’s cell phones. A few months after her retirement, the employee was indicted on charges of stealing 52 county-purchased iPhones and iPads and then selling them to friends and coworkers. Army Private First Class Bradley Manning is believed to be responsible for the release of thousands of classified U.S. embassy cables, which caused an incident that became known as Cablegate. The incident caused many to seriously question security at the Department of Defense and led to many changes in the handling of intelligence and other classified information at various U.S. intelligence agencies and departments. According to CyberSource Corporation (a subsidiary of Visa Inc. that offers e- commerce payment management services), online revenue lost to fraud increased 26 percent from 2010 to 2011 to the amount of $3.4 billion. This represents 1 percent of the $340 billion retail e-commerce sales for the United States and Canada.16 CORPORATE SOCIAL RESPONSIBILITY (CSR) is the concept that an organization should act ethically by taking responsibility for the impact of its actions on the environment, the community, and the welfare of its employees. goals encourages an organization to achieve higher moral and ethical standards. As highlighted in the opening vignette, Cisco is an example of an organization that has set and achieved a number of CSR goals for itself, and as a result is recognized as a highly ethical company SUPPLY CHAIN SUSTAINABILITY is a component of CSR that focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs. Supply chain sustainability takes into account such issues as fair labor practices, energy and resource conservation, human rights, and community responsibility. Many IT equipment manufacturers have made supply chain sustainability a priority, in part, because they must adhere to various European Union directives and regulations (including the Restriction of Hazardous Substances WHY FOSTERING GOOD BUSINESS ETHICS IS IMPORTANT Note: Slide on each item follows 1. To gain the goodwill of the community 2. To create an organization that operates consistently 3. To produce good business 4. To protect the organization and its employees from legal action 5. To avoid unfavorable publicity Book Page 8 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 77 GAINING THE GOODWILL OF THE COMMUNITY Basic responsibilities to society Declared in formal statement of company’s principles or beliefs Include:  Making contributions to charitable organizations and nonprofit institutions  Providing benefits for employees in excess of legal requirements  Choosing economic opportunities that might be more socially desirable than profitable Book Page 8-9 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 78 EXAMPLE GAINING THE GOODWILL OF THE COMMUNITY (CONTINUED) Goodwill that socially responsible activities create can make it easier for corporations to conduct business Book Page 8-9 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 80 CREATING AN ORGANIZATION THAT OPERATES CONSISTENTLY Organizations develop and abide by values to create an organizational culture and to define a consistent approach for dealing with the needs of their stakeholders— shareholders, employees, customers, suppliers, and the community CREATING AN ORGANIZATION THAT OPERATES CONSISTENTLY Many business values include: Operating with honesty and integrity, staying true to corporate principles Operating according to standards of ethical conduct, in words and action Treating colleagues, customers, and consumers with respect Striving to be the best at what matters most to the company Accepting personal responsibility for actions Valuing diversity Making Book Page 9 decisions based on facts and principles ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 83 GOOD ETHICS CAN MEAN GOOD BUSINESS Produce safe and effective products Avoid costly recalls and lawsuits Provide excellent service Maintain customers Develop and maintain strong employee relations Suffer less turnover Enjoy better employee morale Book Page 9 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 84 GOOD ETHICS CAN MEAN GOOD BUSINESS (CONTINUED) Suppliers and other business partners prefer companies that operate in a fair and ethical manner Bad ethics can lead to bad business results Book Page 9 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 85 PROTECTING THE CORPORATION AND ITS EMPLOYEES FROM LEGAL ACTIONS U.S. Justice Department sentencing guidelines suggest more lenient treatment for convicted executives if their companies had ethics programs Fines for criminal violations can be lowered by up to 80 percent if the organization has implemented an ethics management program and cooperates with authorities Book Page 9-10 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 86 AVOIDING UNFAVORABLE PUBLICITY Public reputation of company strongly influences  Value of its stock  How consumers regard products and services  Degree of oversight received from government agencies  Amount of support and cooperation received from business partners Book Page 10 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 87 IMPROVING CORPORATE ETHICS Risks of unethical behaviour are increasing Improvement of business ethics is becoming more important Book Page 10 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 88 IMPROVING CORPORATE ETHICS 1. Appointing a corporate Ethics Officer 2. Ethical Standards Set by Board of Directors 3. Establishing a Corporate Code of Ethics 4. Conducting Social Audits 5. Requiring Employees to Take Ethics Training 6. Including Ethical Criteria in Employee Appraisals REDUCING ETHICS RISK The ERC has defined the following characteristics of a successful ethics program:  Employees are willing to seek advice about ethics issues.  Employees feel prepared to handle situations that could lead to misconduct.  Employees are rewarded for ethical behavior.  The organization does not reward success obtained through questionable means.  Employees feel positively about their company CORPORATE ETHICS OFFICER A corporate ethics officer (also called a corporate compliance officer) provides an organization with vision and leadership in the area of business conduct. This individual “aligns the practices of a workplace with the stated ethics and beliefs of that workplace, holding people accountable to ethical standards. Ethics officers come from diverse backgrounds, such as legal staff, human resources, finance, auditing, security, or line operations. APPOINTING A CORPORATE ETHICS OFFICER Corporate ethics definition includes  Ethical conduct  Legal compliance  Corporate social responsibility Corporate ethics officer  Is a senior-level manager  Provides vision and direction in the area of business conduct  Tries to establish an environment that encourages ethical decision making Book Page 11 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 93 WHY IT STRENGTHEN? BECAUSE… The first flurry of appointments began following a series of defense- contracting scandals during the administration of Ronald Reagan in the late 1980s—when firms used bribes to gain inside information that they could use to improve their contract bids. A second spike in appointments came in the early 1990s, following the new federal sentencing guidelines that stated that “companies with effective compliance and ethics programs could receive preferential treatment during prosecutions for white-collar crimes.” A third surge followed the myriad accounting scandals of the early 2000s. Another increase in appointments followed in the aftermath of the mortgage loan scandals uncovered beginning in 2008. APPOINTING A CORPORATE ETHICS OFFICER (CONTINUED) Responsibilities include:  Complete oversight of the ethics function  Collecting and analyzing data  Developing and interpreting ethics policy  Developing and administering ethics education and training  Overseeing ethics investigations Book Page 11 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 95 ETHICAL STANDARDS SET BY BOARD OF DIRECTORS Board responsible for supervising management team Directors of company are expected to  Conduct themselves according to the highest standards of personal and professional integrity  Set standard for company-wide ethical conduct  Ensure compliance with laws and regulations Book Page 11-12 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 96 ESTABLISHING A CORPORATE CODE OF ETHICS Code of ethics:  Highlights an organization’s key ethical issues  Identifies overarching values and principles important to an organization  Focuses employees on areas of ethical risk  Cannot gain company-wide acceptance unless  Developed with employee participation  Fully endorsed by organization’s leadership  Must continually be applied to company’s decision making Book Page 12 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 97 CONDUCTING SOCIAL AUDITS Social audit an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year.  Identifies ethical lapses committed in the past  Sets directives for avoiding similar missteps in the future Book Page 13-14 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 98 REQUIRING EMPLOYEES TO TAKE ETHICS TRAINING Comprehensive ethics education program encourages employees to act responsibly and ethically  Often presented in small workshop formats Principle-based decision making is based on principles in corporate code of ethics Book Page 14 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 99 INCLUDING ETHICAL CRITERIA IN EMPLOYEE APPRAISALS Some companies base a portion of employee performance evaluations on:  Treating others fairly and with respect  Operating effectively in a multicultural environment  Accepting personal accountability  Continually developing themselves and others  Operating openly and honestly with suppliers, customers, and other employees Book Page 14 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 100 WHEN GOOD ETHICS RESULT IN SHORT- TERM LOSSES Operating ethically does not always guarantee business success Organizations that operate outside the United States  Deal with a “business as usual” climate  Are placed at a significant competitive disadvantage Hope good ethics will prove to be good business in the long term Book Page 15 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 101 CREATING AN ETHICAL WORK ENVIRONMENT Good employees sometimes make bad ethical choices May be encouraged to do “whatever it takes” to get the job done Employees must have a knowledgeable and potent resource available to discuss perceived unethical practices Book Page 15 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 102 HOW MANAGEMENT CAN AFFECT EMPLOYEES’ ETHICAL BEHAVIOUR Book Page 16 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 103 HOW MANAGEMENT CAN AFFECT EMPLOYEES’ ETHICAL BEHAVIOUR (CONTINUED) Book Page 16 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 104 MANAGER’S CHECKLIST Book Page 16 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 105 INCLUDING ETHICAL CONSIDERATIONS IN DECISION MAKING DEVELOP A PROBLEM STATEMENT A problem statement is a clear, concise description of the issue that needs to be addressed. A good problem statement answers the following questions:  What do people observe that causes them to think there is a problem?  Who is directly affected by the problem?  Is anyone else affected?  How often does the problem occur?  What is the impact of the problem?  How serious is the problem? DEVELOP A PROBLEM STATEMENT You must gather and analyze facts to develop a good problem statement. Seek information and opinions from a variety of people to broaden your frame of reference.  During this process, you must be extremely careful not to make assumptions about the situation.  Simple situations can sometimes turn into complex controversies because no one takes the time to gather the facts. EXAMPLE You might see your boss receive what appears to be an employment application from a job applicant and then throw the application into the trash after the applicant leaves. This would violate your organization’s policy to treat each applicant with respect and to maintain a record of all applications for one year. You could report your boss for failure to follow the policy, or you could take a moment to speak directly to your boss. You might be pleasantly surprised to find out that the situation was not as it appeared. Perhaps the “applicant” was actually a salesperson promoting a product for which your company had no use, and the “application” was marketing literature. EXAMPLE Good problem statement: Our product supply organization is continually running out of stock of finished products, creating an out-of-stock situation on over 15 percent of our customer orders, resulting in over $300,000 in lost sales per month. Poor problem statement: We need to implement a new inventory control system. (This is a possible solution, not a problem statement.) Poor problem statement: We have a problem with finished product inventory. (This is not specific enough.) IDENTIFY ALTERNATIVE During this stage of decision making, it is ideal to enlist the help of others, including stakeholders, to identify several alternative solutions to the problem. Brainstorming with others will increase your chances of identifying a broad range of alternatives and determining the best solution. EVALUATE AND CHOOSE AN ALTERNATIVE Once a set of alternatives has been identified, the group must evaluate them based on numerous criteria, such as effectiveness at addressing the issue, the extent of risk associated with each alternative, cost, and time to implement. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply.  You certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others.  Do any corporate policies or guidelines apply?  Does the organizational code of ethics offer guidance?  Do any of your own personal principles apply? PHILOSOPHICAL THEORIES FOR ETHICAL DECISION MAKING Book Page 18-20 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 113 IMPLEMENT THE DECISION Communication is the key to helping people accept a change. It is imperative that someone whom the stakeholders trust and respect answer the following questions:  Why are we doing this?  What is wrong with the current way we do things?  What are the benefits of the new way for you? EVALUATE THE RESULT monitor the results to see if the desired effect was achieved, and observe its impact on the organization and the various stakeholders.  Were the success criteria fully met?  Were there any unintended consequences? This evaluation may indicate that further refinements are needed. ETHICS IN INFORMATION TECHNOLOGY Public concern about the ethical use of information technology includes:  E-mail and Internet access monitoring  Peer-to-peer networks violation of copyright  Unsolicited e-mail  Hackers and identify theft  Plagiarism  Cookies and spyware Book Page 20 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 116 ETHICS IN INFORMATION TECHNOLOGY (CONTINUED) The general public has not realized the critical importance of ethics as applied to IT Important technical decisions are often left to technical experts General business managers must assume greater responsibility for these decisions They must be able to make broad-minded, objective, ethical decisions based on technical savvy, business know-how, and a sense of ethics They must also try to create a working environment in which ethical dilemmas can be discussed openly, objectively, and constructively Book Page 20 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 117 SUMMARY Ethics is a set of beliefs about right and wrong behavior Ethics in business is becoming more important because the risks associated with inappropriate behavior have grown Corporations want to protect themselves and their employees from legal action Book Page 22 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 118 SUMMARY (CONTINUED) 7-step approach to ethical decision making Trends contributing to the risk of using information technology unethically include:  Growth of the Internet  Ability to capture and store vast amounts of personal data online  Greater reliance on information systems Book Page 22 ETHICS IN INFORMATION TECHNOLOGY, SECOND EDITION 119 DISCUSSION There are many ethical issues about which people hold very strong opinions—abortion, gun control, and the death penalty, to name a few. If you were a team member on a project with someone whom you knew held an opinion different from yours on one of these issues, how would it affect your ability to work effectively with this person? DISCUSSION Identify two important life experiences that helped you define your own personal code of ethics. CASE STUDY Topic: Is There a Place for Ethics in IT? Page 56 -57– Pdf Encode the question and your answers only Legal size Font size=12 Font Face=Arial Alignment= Justify Number of Words= 250

Use Quizgecko on...
Browser
Browser