0% found this document useful (0 votes)
14 views

AI - Lecture 9

1) Managers must deal with conflicting moral, ethical, legal, and professional issues and ensure organizational compliance. 2) Information technology professionals have a duty to act ethically and competently according to professional codes of conduct. 3) Privacy and monitoring concerns exist regarding organizations' collection and sharing of personal data through information systems.

Uploaded by

darkwaflorence2
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

AI - Lecture 9

1) Managers must deal with conflicting moral, ethical, legal, and professional issues and ensure organizational compliance. 2) Information technology professionals have a duty to act ethically and competently according to professional codes of conduct. 3) Privacy and monitoring concerns exist regarding organizations' collection and sharing of personal data through information systems.

Uploaded by

darkwaflorence2
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

LEGAL AND ETHICAL ISSUES IN

BIS
Management issues
• From a managerial perspective, this lecture addresses
the following areas:
– Managers must deal with moral, ethical, professional
and legal issues that often conflict with one another.
– Responsible organisations must show an awareness of
issues that cause concern for employees and the
public such as monitoring of employees.
– An understanding of legislation is required to ensure
that the organisation operates within the law.
• Constraints and potential areas of conflict related to
the duties and responsibilities of the IS professional
Context
• Professionalism
– Acting to meet the standards set by a profession in
terms of individual conduct, competence and integrity.
• Ethics
– In general terms, this describes beliefs concerning right
and wrong that can be used by individuals to guide
their behaviour.
• Morality
– Individual character or personality and beliefs
governing right and wrong.
British Computer Society (BCS)
• Code of conduct: Members of professional
associations are expected to abide by a set of
principles that set out minimum standards of
competence, conduct and behaviour.

• British Computer Society (BCS): Widely regarded


as the UK’s leading professional association for
those involved in the management and
development of computer-based information
systems.
Ghana
• The Institute of ICT Professionals Ghana
(IIPGH)

• www.iipgh.org
Information Society
• Information society
– Describes a modern population that is conversant
with – and reliant upon – information and
communications technology.
Digital Divide
• Concern is growing that society may
eventually become divided into two distinct
groups.
• One group will be made up of those who have
access to technology and are able to obtain
information via the Internet.
• The other will be made up of those who are
unable to gain access to technology and
information.
Privacy concerns
Two examples can be used to illustrate common concerns related to privacy:
• The use of computer-based information systems enables an organisation
to combine or analyse data in ways not previously possible with manual
systems.
– As an example, a bank might build up profiles of its customers by analysing their
spending, borrowing and saving habits. This information could then be supplied
to other organisations involved in marketing relevant goods or services.

• Communications technology allows organisations to share data, allowing


them to develop a comprehensive pool of information regarding
individuals.
– An insurance company, for example, might gather medical information before
deciding whether or not to offer a policy to an individual.
Computer monitoring
• Computer monitoring: The use of computer and
communications technology to monitor the activities of
individuals.
• Echelon:
– Echelon is a global surveillance system that monitors
communications around the world. The project is operated
by the USA, the UK, Canada, Australia and New Zealand.
Each day, millions of telephone calls, faxes and e-mail
messages are intercepted and scanned for key words and
phrases. Messages matching the search criteria used are
collected and sent to the United States for further analysis.
Computer criminals
• Computer criminals
– Make use of technology to perform a variety of criminal acts, ranging
from vandalism and sabotage to hacking and fraud.

• Information warrior
– Seeks to obtain data by any means necessary. Such people may
resort to illegal methods, such as hacking, in order to obtain the
information they require.

• Hacker
– Individuals who seek to break into systems as a test of their abilities.
Few hackers attempt to cause damage to the systems they access,
and few are interested in gaining any sort of financial profit.
Hacking motivation
(a) Some hackers hold the belief that all information should be free.
Such individuals feel a duty to ensure free access to information
held by government departments and private companies.
(b) Many hackers believe that they provide an important service to
companies by exposing flaws in security.
(c) Some people believe that hacking serves an educational
purpose by helping them to improve their knowledge and skills.
Since no harm is caused to any systems accessed, their actions
are acceptable and should not be considered threatening.
(d) A final motive for hacking is simply for enjoyment or excitement.
Many hackers find stimulation in the challenge of defeating the
designers of the security measures used by a given system.
Data Protection Act
• Ghana
– https://www.dataprotection.org.gh/
Copyright
• Provides owner of an original work five rights
– Reproduction
– Distribution
– Public display
– Public performance
– Production of derivative works

• The length of the protection is defined by


copyright laws (refer to Ghana Copyright
document).
Software Copyrights
• Included in Ghana copyright law
• What gets copyrighted?
– Expression of idea, not idea itself

• Examples of violations:
– Copying a program to give or sell to someone else
– Preloading a program onto the hard disk of a
computer being sold
– Distributing a program over the Internet

You might also like