AI - Lecture 9
AI - Lecture 9
BIS
Management issues
• From a managerial perspective, this lecture addresses
the following areas:
– Managers must deal with moral, ethical, professional
and legal issues that often conflict with one another.
– Responsible organisations must show an awareness of
issues that cause concern for employees and the
public such as monitoring of employees.
– An understanding of legislation is required to ensure
that the organisation operates within the law.
• Constraints and potential areas of conflict related to
the duties and responsibilities of the IS professional
Context
• Professionalism
– Acting to meet the standards set by a profession in
terms of individual conduct, competence and integrity.
• Ethics
– In general terms, this describes beliefs concerning right
and wrong that can be used by individuals to guide
their behaviour.
• Morality
– Individual character or personality and beliefs
governing right and wrong.
British Computer Society (BCS)
• Code of conduct: Members of professional
associations are expected to abide by a set of
principles that set out minimum standards of
competence, conduct and behaviour.
• www.iipgh.org
Information Society
• Information society
– Describes a modern population that is conversant
with – and reliant upon – information and
communications technology.
Digital Divide
• Concern is growing that society may
eventually become divided into two distinct
groups.
• One group will be made up of those who have
access to technology and are able to obtain
information via the Internet.
• The other will be made up of those who are
unable to gain access to technology and
information.
Privacy concerns
Two examples can be used to illustrate common concerns related to privacy:
• The use of computer-based information systems enables an organisation
to combine or analyse data in ways not previously possible with manual
systems.
– As an example, a bank might build up profiles of its customers by analysing their
spending, borrowing and saving habits. This information could then be supplied
to other organisations involved in marketing relevant goods or services.
• Information warrior
– Seeks to obtain data by any means necessary. Such people may
resort to illegal methods, such as hacking, in order to obtain the
information they require.
• Hacker
– Individuals who seek to break into systems as a test of their abilities.
Few hackers attempt to cause damage to the systems they access,
and few are interested in gaining any sort of financial profit.
Hacking motivation
(a) Some hackers hold the belief that all information should be free.
Such individuals feel a duty to ensure free access to information
held by government departments and private companies.
(b) Many hackers believe that they provide an important service to
companies by exposing flaws in security.
(c) Some people believe that hacking serves an educational
purpose by helping them to improve their knowledge and skills.
Since no harm is caused to any systems accessed, their actions
are acceptable and should not be considered threatening.
(d) A final motive for hacking is simply for enjoyment or excitement.
Many hackers find stimulation in the challenge of defeating the
designers of the security measures used by a given system.
Data Protection Act
• Ghana
– https://www.dataprotection.org.gh/
Copyright
• Provides owner of an original work five rights
– Reproduction
– Distribution
– Public display
– Public performance
– Production of derivative works
• Examples of violations:
– Copying a program to give or sell to someone else
– Preloading a program onto the hard disk of a
computer being sold
– Distributing a program over the Internet