Chapter 9
Chapter 9
Chapter 9
Ethics and Information Technology
Ethical Thoughts
“Computes are like Old Testament gods, lots of rules and no mercy.”
Joseph Campbell
2
Learning Objectives
After reading and studying this chapter, students should be able to:
1.Explain the types of critical analysis that can be used to evaluate
information technology.
2.Discuss the issues associated with the privacy of employees.
3.Describe the issues associated with the privacy of customers.
4.Identify ethical issues facing Internet usage.
5.Discuss areas for technology fraud, including those associated with the
Internet.
3
Information Technology Ethical Issues
Importance can be seen through American Management
Association (AMA)/ePolicy Institute survey on electronic
monitoring and surveillance:
30% of firms reported they had fired workers due to misusing the
Internet with the following causes:
Others 12%
Information Technology Ethical Issues
28% reported they had fired employees for misuse of their corporate
email accounts with the following causes:
Others 9%
• 45% monitored the content, the keystrokes and amount of time spent
on the computer by their employees.
Information Technology Ethical Issues
• 73% of the firms notify the employees that they are monitoring the
employees’ voice mail.
• 15% had to address workplace lawsuits that were the result of employee
email.
• 89% told their employees that access to certain Web sites was
blocked.
• 82% told the employees they were saving and receiving their
computer files.
• 23% of the firms had a policy pertaining to the use of personal postings
on corporate blogs.
Costs:
•Offensive communications – e-mail may relay inappropriate and/or offensive
behavior.
•Frivolous use – e-mail can take a disproportionate amount of time relative to its
real value.
•Information overload – e-mail can become the dominant form of communication
within an organization; the sheer volume of e-mail may, at times, overwhelm the
user.
Types of Computer Monitoring
• The Privacy Rights Clearinghouse suggests that there are two main types
of computer monitoring that take place in companies:
• Security transactions
• Illegal activity (fraud, hacking, etc.)
• Privacy
• Honesty/truthfulness
• Judged by same standards as other mediums
• Pornography
• Product warranty
• Plagiarism
• Targeting children
• Unsolicited email
• False advertising
The Role of Government Regulations
• From an ethical perspective, There is a debate over whether there should
be a government agency charged with policing the Internet.
• It is unclear how the Internet should be regulated in one country if other
countries fail to provide adequate Internet regulation.
There were more than 100 arrests and convictions through this program and
represented more than $210 million lost by more than 870,000 victims.
Internet Attacks
• Cyber terrorism is the use of computer technology to
commit terrorism crimes
• Cyber terrorism crimes such as e-mail crimes, identity theft,
viruses, and spyware on computers, can cause harm through
computers.
• Spyware is a software that can be loaded onto a computer so
the computer operations can be monitored by an outside
party without the consent of the computer user.
• Vulnerable industries: defense contractors, medical and
health care companies, pharmaceutical companies, financial
institutions.
All rights reserved. No part of this publication may be
reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise,
without the prior written permission of the publisher.
Printed in the United States of America.
32