1 / 13

Ethics and IS

Ethics and IS. The Ethics of IS. Ethics and Privacy Ethical Issues Law & Order. Security & Ethical Challenges. Privacy Accuracy Property Access Human Impacts. Ethical Principles Proportionality Informed Consent Justice Minimized Risk. Standard of Conduct Act with integrity

natara
Download Presentation

Ethics and IS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethics and IS

  2. The Ethics of IS • Ethics and Privacy • Ethical Issues • Law & Order

  3. Security & Ethical Challenges • Privacy • Accuracy • Property • Access • Human Impacts

  4. Ethical Principles Proportionality Informed Consent Justice Minimized Risk Standard of Conduct Act with integrity Protect the information privacy & confidentiality Do not misrepresent or withhold information Do not misuse resources Do not exploit weakness of systems Advance the health and welfare of general public Ethical Considerations

  5. Privacy Internet privacy Corporate email Matching Accuracy Credit card accounts Student Records Property Intellectual property Software piracy Identity Theft Who owns the bandwidth? Access Who can see it? Who should see it? Can everybody with appropriate rights get access to see it? Ethical Issues

  6. Privacy Issues • IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily. • Benefit – increases efficiency and effectiveness • But, may also have a negative effect on individual’s right to privacy • Accessing private e-mail and computer records & sharing information about individuals gained from their visits to websites and newsgroups

  7. Privacy Issues • Always knowing where a person is via mobile and paging services • Computer Matching • Computer profiling and matching personal data to that profile • Mistakes can be a major problem • Protect your privacy by • Encrypting your messages • Post to newsgroups through anonymous re-mailers • Ask your ISP not to sell your information to mailing list providers and other marketers • Decline to reveal personal data and interests online

  8. Computer Libel and Censorship(The opposite side of the privacy debate) • Right to know (freedom of information) • Right to express opinions (freedom of speech) • Right to publish those opinions (freedom of the press) • Spamming • Flaming • Anonymity of domain ownership • From where did my campaign funds come?

  9. Human Impacts • Employee Monitoring (especially online) • Deskilling (robotic welders) • Intellectual Property Protection (Napster or KaZaA) • Human Control (Airbus Fly-by-Wire)

  10. Computer Monitoring • Concerns workplace privacy • Monitors individuals, not just work • Is done continually. May be seen as violating workers’ privacy & personal freedom • Workers may not know that they are being monitored or how the information is being used • May increase workers’ stress level • May rob workers of the dignity of their work

  11. Health Issues • Job stress • Muscle damage • Eye strain • Radiation exposure • Accidents • Ergonomic design to ameliorate these problems

  12. E-mail Monitoring • “Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.” • Widespread monitoring of email • Magic Lantern • Carnivore

  13. Law & Order • Irony of a private person being accessible by so many • It’s always been doable; just not this easily (see examples throughout the episode) • Worms • Privacy and the law • Who’s morally responsible for how information is used? • If your software or service is used by somebody as a means to kill another, who’s responsible?

More Related