SlideShare a Scribd company logo
ETHICAL AND SOCIAL
ISSUES
IN INFORMATION
SYSTEMS
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
Information rights and obligations
Information Rights: Privacy and Freedom in the Internet Age
Privacy is the claim of individuals to be left alone, free from surveillance or
interference from other individuals or organizations.
Claims to privacy at the workplace: Millions of employees are subject to
electronic and other forms of high-tech surveillance (Ball, 2001). Information
technology and systems threaten individual claims to privacy by making the
invasion of privacy cheap, profitable, and effective.
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
In the United States
• Right to information Act,2005
• Computer Security Act, 1987
• Electronic Communications Privacy Act, 1986
• Children’s Online Privacy protection Act (COPPA), 1998
• Fair Information Practices (FIP), 1973
• Health Insurance Portability and Accountability Act (HIPAA), 1996; Personal
Medical Records
In India
• Article 21 of India Constitution, right to privacy as fundamental right
• Information technology rules, 2011
• The credit information companies Regulation Act (CICRA), 2005: custmers
data protection of banks and other Fi’s
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
European Directives
• European Commission’s Directive on Data Protection, 1998 : inform people
when they collect information about them
• Customers should provide Informed Consent (opt-in/opt-out) to
organizations
• US business firms should have a SAFE HARBOR, a self regulating policy or
enforcement that meet EU standards to use personal data.
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
Property rights and obligations
Property Rights: Intellectual Property
Intellectual property is considered to be intangible property created by
individuals or corporations.
Information technology has made it difficult to protect intellectual property
because computerized information can be so easily copied or distributed on
networks.
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
TRADE SECRET
• Trade secret law grant a monopoly on the ideas behind a work product.
• To make this claim, the creator or owner must take case to bind employees and
customers with nondisclosure agreements and to prevent the secret from
falling into a public domain.
• Copyright is a legal grant that protects creators of intellectual property from
having their work copied by others for any purpose during the life of the
author plus additional 70 years after the author's death.
• It includes books, software, lectures, dramas,mapas,musical compositions,
drawings, artworks, etc.
COPYRIGHT
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
PATENTS
• Provides the owner of the invention with the exclusive right to exploit it
commercially for the life of the patent.
• Widespread use of invention is possible under the license from the owner.
• It grants a monopoly on the underlying concepts and ideas.
• For corporate owned works, copyright protection lasts for 95 years after their
initial creation
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
Accountability and control
• Software constitutes a component of a computer system, and if the system
causes harm to an individual, the operator may be held responsible for any
resulting damage.
• Organizations can be held liable for offensive content on their websites
• Online services might be held liable for posting by their users.
Determining who should take responsibility for decisions and actions. Many of the
laws and court decisions and actions establishing precedents in the area of
accountability, liability and control were firmly in place long before information
systems were invented.
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
System quality
This has to do with data quality and system errors. As we rely more on
information systems, data quality issues are gaining more importance.
Three principal sources of poor system performance:
• Software bugs, errors
• Hardware failures
• Poor input data quality
FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
Quality of life: Equity, access, boundaries
• The negative cosial cost of introducing information technologies are
beginning to mount along with the power of technology.
• Computers and information technologies potentially can destroy valuable
elements of our culture and society even while they bring us benefits.
Negative social consequences of systems
• Balancing power
• Rapidity of change
• Maintaining boundaries
• Employment
• Dependence and vulnerability
KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES
TREND IMPACT
Computing power doubles
every 18 months
More organizations depend on computer
systems for critical operations.
Data storage costs rapidly
decline
Organizations can easily maintain detailed
databases on individuals
KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES
TREND
IMPACT
Data analysis advances
Companies can analyze vast quantities
of data gathered on individuals to
develop detailed profiles of individual
behavior.
KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES
TREND IMPACT
Networking advances
Copying data from one location to
another and accessing personal data
from remote locations are much
easier.
Advances in networking reduce the
costs of moving and accessing data,
permitting privacy invasions on a vast
scale.
ETHICS IN AN INFORMATION SOCIETY
RESPONSIBILITY: Accepting potential costs, duties, and obligations for your
decisions.
ACCOUNTABILITY: Determining who should take responsibility for decisions and
actions.
LIABILITY: Legally placing responsibility with a person or group.
DUE PROCESS: Ensuring the laws are applied fairly and correctly.
ETHICAL ANALYSIS
• Identify and describe clearly the facts.
• Define the conflict or dilemma and identify the higher-order values involved.
• Identify the stakeholders.
• Identify the options that you can reasonably take.
• Identify the potential consequences of your options.
How to conduct a good ethical analysis
TRADITIONAL ETHICAL PRINCIPLES
1. The Golden Rule - Do unto others as you would have them do unto you.
2. Immanuel Kant’s Categorical Imperative - If an action is not right for everyone
to take, it is not right for anyone.
3. Descartes’ rule of change - If an action cannot be taken repeatedly, it is not
right to take at all.
- This is the slippery-slope rule “once started down a slippery path, you may not
be able to stop.”
5. Risk Aversion Principle - Some actions have extremely high failure costs of
very low probability
6. Ethical “no free lunch” rule - Assume that virtually all tangible and intangible
objects are owned by someone else unless there is a specific declaration
otherwise.
4. Utilitarian Principle - Take the action that achieves the higher or greater
value
TRADITIONAL ETHICAL PRINCIPLES
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
• Information Privacy
■ refers to the right of an individual who has to control the access, use,
and distribution of their personal data or information.
⚬ Ethical Guidelines
• Data Collection and Use:
■ Transparency: Inform individuals about the data being collected, why
it's collected, and how it will be used. Ensure clear and accessible
privacy policies.
■ Purpose Limitation: Collect data only for specific, legitimate purposes
and use it only as agreed upon by the individual.
■ Consent: Obtain explicit and informed consent from individuals
before collecting or processing their personal data.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
• Data Security and Protection:
■ Security Measures: Implement robust security measures (encryption,
access controls, etc.)
■ Data Minimization: Collect and retain only the minimum necessary
data to fulfill the intended purpose. Dispose of or anonymize data
when it's no longer needed.
• Data Access and Control:
■ Access Controls: Restrict access to personal data based on job roles
and necessity. Ensure that only authorized personnel can access
sensitive information.
■ User Control: Allow individuals to access, review, edit, and delete
their personal data. Provide options for users to manage their
privacy settings.
• Compliance and Accountability:
■ Legal Compliance: Adhere to applicable laws and regulations
concerning data privacy (RA 10173) and industry standards.
■ Accountability: Take responsibility for ensuring compliance with
ethical standards and provide avenues for addressing privacy
concerns or breaches.
• Education and Awareness:
■ Employee Training: Educate and train employees on ethical data
handling practices, privacy policies, and the importance of protecting
personal data.
■ Public Awareness: Educate users about their privacy rights and
provide resources to understand how their data is handled.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
2. Intellectual Property
■ refers to creations of the mind, such as inventions, artistic works,
designs, symbols, names, and images that are protected by law.
⚬ Ethical Guidelines
• Intellectual Property Laws:
■ Copyright: Protects authored works
■ Patent: Protect inventions
■ Trade secret: Help safeguard information critical to an organizations’
success.
■ Trademarks: Protect symbols, names, phrases, logos, or designs that
distinguish goods or services of one party from others in the
marketplace.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
3. Hacking
■ the unauthorized or illegal access, manipulation, or exploitation of
computer systems, networks, or data.
• Ethical Hacking vs. Illegal Hacking:
⚬ Ethical Hacking: Ethical hackers, also known as "white-hat hackers," are
cybersecurity experts who use their skills to identify and resolve security
vulnerabilities in systems with the permission of the system owner. Their
goal is to improve security and protect systems from cyber threats.
⚬ Illegal Hacking: Unauthorized access, exploitation, or manipulation of
computer systems or networks without proper permission constitutes
illegal hacking.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
3. Hacking
■ the unauthorized or illegal access, manipulation, or exploitation of
computer systems, networks, or data.
⚬ Ethical Guidelines
• Authorized Penetration Testing:
■ Ethical hacking involves conducting authorized penetration testing
or security assessments to identify weaknesses in systems and
networks.
• Adherence to Legal Frameworks:
■ Ethical hackers must adhere to laws, regulations, and ethical
guidelines when conducting security assessments.
• Responsible Disclosure:
■ Ethical hackers should follow responsible disclosure practices.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
3. Hacking
⚬ Ethical Guidelines
• Protecting Privacy and Confidentiality:
■ They should avoid unauthorized data access or disclosure.
• Professional Integrity:
■ Ethical hackers should maintain professional integrity, avoiding
malicious intent or actions that could harm individuals,
organizations, or systems.
• Continuous Education and Compliance:
■ They should comply with industry standards, certifications, and
ethical hacking guidelines.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
4. Software Piracy
■ Piracy is an activity in which the creation of illegal copy of the
software is made.
⚬ Ethical Guidelines
• Respect for Intellectual Property Rights:
■ Ethical standards in IT emphasize respecting the intellectual property
rights of software developers and companies.
• Compliance with Software Licenses:
■ Ethical use of software involves adhering to software licenses and
agreements.
• Avoiding Unlicensed Software Use:
■ Ethical standards require individuals and organizations to avoid
using unlicensed or pirated software.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
4. Software Piracy
⚬ Ethical Guidelines
• Support for Fair Competition:
■ Ethical behavior in IT promotes fair competition in the software
industry. Software piracy can unfairly disadvantage legitimate
software developers and companies by undermining their ability to
compete in the market.
• Education and Awareness:
■ Encouraging education and awareness about software piracy helps
individuals and organizations understand the legal and ethical
implications.
• Encouraging Legal Software Acquisition:
■ Promoting the purchase or use of legal software encourages ethical
behavior.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
4. Software Piracy
⚬ Ethical Guidelines
• Responsible Distribution and Sharing:
■ Ethical standards discourage the unauthorized distribution or
sharing of software.
• Enforcement of Policies and Regulations:
■ Organizations and governing bodies should enforce policies and
regulations that discourage software piracy.
ETHICAL STANDARDS IN INFORMATION TECHNOLOGY

More Related Content

PPTX
3-Professional Ethics Issues.pptx
PPT
3999779.ppt
DOCX
Review questions
PDF
SLIDE 3 Ethical and Social Issues in Information Systems.pdf
PPTX
3 - Social Media and Enterprise
PPT
Technological trends
3-Professional Ethics Issues.pptx
3999779.ppt
Review questions
SLIDE 3 Ethical and Social Issues in Information Systems.pdf
3 - Social Media and Enterprise
Technological trends

Similar to 7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx (20)

PPTX
ethics of Emerging technology . pptx
PPTX
Chapter -6- Ethics and Professionalism of ET (2).pptx
PPTX
Chapter 3
PPTX
Privacy & the Internet: An Overview of Key Issues
PPTX
Adressing AI-Induced Privacy Breaches and Data Protection Challenges.pptx
PPTX
Thierer Internet Privacy Regulation
PPT
chapter05 (1).ppt
PPTX
information system issues, digital identity, collaboration tools and intellec...
PDF
Ch 4.pdf
PPTX
chapter 6 Ethics and Professionalism of ET.pptx
PPTX
Data protection with respect to artificial intellignece
PDF
IT risk discusion qustion.pdf
PPTX
Ehsan Kabir Solicitor-Ethics Frameworks
PPTX
Module 1-History and Overview of Ethical and Legal Issues.pptx
PPTX
Ethical Issues and Relevant Laws on Computing
PPTX
Social, ethical and legal responsibility in these of technology tools
PPTX
ch 19- computer security prenciples and practice
PPT
Stallings ch18 privacy
PDF
7. GE ELECT 1 - The Ethical and Legal Implications of Information Systems.pdf
PPTX
Business Ethics Lecture Notes MUBS class.pptx
ethics of Emerging technology . pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter 3
Privacy & the Internet: An Overview of Key Issues
Adressing AI-Induced Privacy Breaches and Data Protection Challenges.pptx
Thierer Internet Privacy Regulation
chapter05 (1).ppt
information system issues, digital identity, collaboration tools and intellec...
Ch 4.pdf
chapter 6 Ethics and Professionalism of ET.pptx
Data protection with respect to artificial intellignece
IT risk discusion qustion.pdf
Ehsan Kabir Solicitor-Ethics Frameworks
Module 1-History and Overview of Ethical and Legal Issues.pptx
Ethical Issues and Relevant Laws on Computing
Social, ethical and legal responsibility in these of technology tools
ch 19- computer security prenciples and practice
Stallings ch18 privacy
7. GE ELECT 1 - The Ethical and Legal Implications of Information Systems.pdf
Business Ethics Lecture Notes MUBS class.pptx
Ad

Recently uploaded (20)

PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Nidhal Samdaie CV - International Business Consultant
DOCX
Business Management - unit 1 and 2
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
Starting the business from scratch using well proven technique
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPT
Data mining for business intelligence ch04 sharda
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Types of control:Qualitative vs Quantitative
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPT
Chapter four Project-Preparation material
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
MSPs in 10 Words - Created by US MSP Network
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
New Microsoft PowerPoint Presentation - Copy.pptx
Nidhal Samdaie CV - International Business Consultant
Business Management - unit 1 and 2
Reconciliation AND MEMORANDUM RECONCILATION
Starting the business from scratch using well proven technique
ICG2025_ICG 6th steering committee 30-8-24.pptx
Unit 1 Cost Accounting - Cost sheet
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Data mining for business intelligence ch04 sharda
Roadmap Map-digital Banking feature MB,IB,AB
Types of control:Qualitative vs Quantitative
Laughter Yoga Basic Learning Workshop Manual
Power and position in leadershipDOC-20250808-WA0011..pdf
Chapter four Project-Preparation material
Chapter 5_Foreign Exchange Market in .pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
MSPs in 10 Words - Created by US MSP Network
Ad

7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx

  • 1. ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
  • 2. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE
  • 3. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE Information rights and obligations Information Rights: Privacy and Freedom in the Internet Age Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations. Claims to privacy at the workplace: Millions of employees are subject to electronic and other forms of high-tech surveillance (Ball, 2001). Information technology and systems threaten individual claims to privacy by making the invasion of privacy cheap, profitable, and effective.
  • 4. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE In the United States • Right to information Act,2005 • Computer Security Act, 1987 • Electronic Communications Privacy Act, 1986 • Children’s Online Privacy protection Act (COPPA), 1998 • Fair Information Practices (FIP), 1973 • Health Insurance Portability and Accountability Act (HIPAA), 1996; Personal Medical Records In India • Article 21 of India Constitution, right to privacy as fundamental right • Information technology rules, 2011 • The credit information companies Regulation Act (CICRA), 2005: custmers data protection of banks and other Fi’s
  • 5. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE European Directives • European Commission’s Directive on Data Protection, 1998 : inform people when they collect information about them • Customers should provide Informed Consent (opt-in/opt-out) to organizations • US business firms should have a SAFE HARBOR, a self regulating policy or enforcement that meet EU standards to use personal data.
  • 6. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE Property rights and obligations Property Rights: Intellectual Property Intellectual property is considered to be intangible property created by individuals or corporations. Information technology has made it difficult to protect intellectual property because computerized information can be so easily copied or distributed on networks.
  • 7. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE TRADE SECRET • Trade secret law grant a monopoly on the ideas behind a work product. • To make this claim, the creator or owner must take case to bind employees and customers with nondisclosure agreements and to prevent the secret from falling into a public domain. • Copyright is a legal grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus additional 70 years after the author's death. • It includes books, software, lectures, dramas,mapas,musical compositions, drawings, artworks, etc. COPYRIGHT
  • 8. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE PATENTS • Provides the owner of the invention with the exclusive right to exploit it commercially for the life of the patent. • Widespread use of invention is possible under the license from the owner. • It grants a monopoly on the underlying concepts and ideas. • For corporate owned works, copyright protection lasts for 95 years after their initial creation
  • 9. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE Accountability and control • Software constitutes a component of a computer system, and if the system causes harm to an individual, the operator may be held responsible for any resulting damage. • Organizations can be held liable for offensive content on their websites • Online services might be held liable for posting by their users. Determining who should take responsibility for decisions and actions. Many of the laws and court decisions and actions establishing precedents in the area of accountability, liability and control were firmly in place long before information systems were invented.
  • 10. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE System quality This has to do with data quality and system errors. As we rely more on information systems, data quality issues are gaining more importance. Three principal sources of poor system performance: • Software bugs, errors • Hardware failures • Poor input data quality
  • 11. FIVE MORAL DIMENSIONS OF THE INFORMATION AGE Quality of life: Equity, access, boundaries • The negative cosial cost of introducing information technologies are beginning to mount along with the power of technology. • Computers and information technologies potentially can destroy valuable elements of our culture and society even while they bring us benefits. Negative social consequences of systems • Balancing power • Rapidity of change • Maintaining boundaries • Employment • Dependence and vulnerability
  • 12. KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES TREND IMPACT Computing power doubles every 18 months More organizations depend on computer systems for critical operations. Data storage costs rapidly decline Organizations can easily maintain detailed databases on individuals
  • 13. KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES TREND IMPACT Data analysis advances Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behavior.
  • 14. KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES TREND IMPACT Networking advances Copying data from one location to another and accessing personal data from remote locations are much easier. Advances in networking reduce the costs of moving and accessing data, permitting privacy invasions on a vast scale.
  • 15. ETHICS IN AN INFORMATION SOCIETY RESPONSIBILITY: Accepting potential costs, duties, and obligations for your decisions. ACCOUNTABILITY: Determining who should take responsibility for decisions and actions. LIABILITY: Legally placing responsibility with a person or group. DUE PROCESS: Ensuring the laws are applied fairly and correctly.
  • 16. ETHICAL ANALYSIS • Identify and describe clearly the facts. • Define the conflict or dilemma and identify the higher-order values involved. • Identify the stakeholders. • Identify the options that you can reasonably take. • Identify the potential consequences of your options. How to conduct a good ethical analysis
  • 17. TRADITIONAL ETHICAL PRINCIPLES 1. The Golden Rule - Do unto others as you would have them do unto you. 2. Immanuel Kant’s Categorical Imperative - If an action is not right for everyone to take, it is not right for anyone. 3. Descartes’ rule of change - If an action cannot be taken repeatedly, it is not right to take at all. - This is the slippery-slope rule “once started down a slippery path, you may not be able to stop.”
  • 18. 5. Risk Aversion Principle - Some actions have extremely high failure costs of very low probability 6. Ethical “no free lunch” rule - Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. 4. Utilitarian Principle - Take the action that achieves the higher or greater value TRADITIONAL ETHICAL PRINCIPLES
  • 19. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY • Information Privacy ■ refers to the right of an individual who has to control the access, use, and distribution of their personal data or information. ⚬ Ethical Guidelines • Data Collection and Use: ■ Transparency: Inform individuals about the data being collected, why it's collected, and how it will be used. Ensure clear and accessible privacy policies. ■ Purpose Limitation: Collect data only for specific, legitimate purposes and use it only as agreed upon by the individual. ■ Consent: Obtain explicit and informed consent from individuals before collecting or processing their personal data.
  • 20. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY • Data Security and Protection: ■ Security Measures: Implement robust security measures (encryption, access controls, etc.) ■ Data Minimization: Collect and retain only the minimum necessary data to fulfill the intended purpose. Dispose of or anonymize data when it's no longer needed. • Data Access and Control: ■ Access Controls: Restrict access to personal data based on job roles and necessity. Ensure that only authorized personnel can access sensitive information. ■ User Control: Allow individuals to access, review, edit, and delete their personal data. Provide options for users to manage their privacy settings.
  • 21. • Compliance and Accountability: ■ Legal Compliance: Adhere to applicable laws and regulations concerning data privacy (RA 10173) and industry standards. ■ Accountability: Take responsibility for ensuring compliance with ethical standards and provide avenues for addressing privacy concerns or breaches. • Education and Awareness: ■ Employee Training: Educate and train employees on ethical data handling practices, privacy policies, and the importance of protecting personal data. ■ Public Awareness: Educate users about their privacy rights and provide resources to understand how their data is handled. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 22. 2. Intellectual Property ■ refers to creations of the mind, such as inventions, artistic works, designs, symbols, names, and images that are protected by law. ⚬ Ethical Guidelines • Intellectual Property Laws: ■ Copyright: Protects authored works ■ Patent: Protect inventions ■ Trade secret: Help safeguard information critical to an organizations’ success. ■ Trademarks: Protect symbols, names, phrases, logos, or designs that distinguish goods or services of one party from others in the marketplace. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 23. 3. Hacking ■ the unauthorized or illegal access, manipulation, or exploitation of computer systems, networks, or data. • Ethical Hacking vs. Illegal Hacking: ⚬ Ethical Hacking: Ethical hackers, also known as "white-hat hackers," are cybersecurity experts who use their skills to identify and resolve security vulnerabilities in systems with the permission of the system owner. Their goal is to improve security and protect systems from cyber threats. ⚬ Illegal Hacking: Unauthorized access, exploitation, or manipulation of computer systems or networks without proper permission constitutes illegal hacking. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 24. 3. Hacking ■ the unauthorized or illegal access, manipulation, or exploitation of computer systems, networks, or data. ⚬ Ethical Guidelines • Authorized Penetration Testing: ■ Ethical hacking involves conducting authorized penetration testing or security assessments to identify weaknesses in systems and networks. • Adherence to Legal Frameworks: ■ Ethical hackers must adhere to laws, regulations, and ethical guidelines when conducting security assessments. • Responsible Disclosure: ■ Ethical hackers should follow responsible disclosure practices. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 25. 3. Hacking ⚬ Ethical Guidelines • Protecting Privacy and Confidentiality: ■ They should avoid unauthorized data access or disclosure. • Professional Integrity: ■ Ethical hackers should maintain professional integrity, avoiding malicious intent or actions that could harm individuals, organizations, or systems. • Continuous Education and Compliance: ■ They should comply with industry standards, certifications, and ethical hacking guidelines. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 26. 4. Software Piracy ■ Piracy is an activity in which the creation of illegal copy of the software is made. ⚬ Ethical Guidelines • Respect for Intellectual Property Rights: ■ Ethical standards in IT emphasize respecting the intellectual property rights of software developers and companies. • Compliance with Software Licenses: ■ Ethical use of software involves adhering to software licenses and agreements. • Avoiding Unlicensed Software Use: ■ Ethical standards require individuals and organizations to avoid using unlicensed or pirated software. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 27. 4. Software Piracy ⚬ Ethical Guidelines • Support for Fair Competition: ■ Ethical behavior in IT promotes fair competition in the software industry. Software piracy can unfairly disadvantage legitimate software developers and companies by undermining their ability to compete in the market. • Education and Awareness: ■ Encouraging education and awareness about software piracy helps individuals and organizations understand the legal and ethical implications. • Encouraging Legal Software Acquisition: ■ Promoting the purchase or use of legal software encourages ethical behavior. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY
  • 28. 4. Software Piracy ⚬ Ethical Guidelines • Responsible Distribution and Sharing: ■ Ethical standards discourage the unauthorized distribution or sharing of software. • Enforcement of Policies and Regulations: ■ Organizations and governing bodies should enforce policies and regulations that discourage software piracy. ETHICAL STANDARDS IN INFORMATION TECHNOLOGY

Editor's Notes

  • #12: The doubling of computing power every 18 months has made it possible for most organizations to use information systems for their core production processes. As a result, our dependence on systems and our vulnerability to system errors and poor data quality have increased. Social rules and laws have not yet adjusted to this dependence. Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals—employees, customers, and potential customers—maintained by private and public organizations. These advances in data storage have made the routine violation of individual privacy both cheap and effective. Very large data storage systems capable of working with terabytes of data are inexpensive enough for large firms to use in identifying customers.
  • #13: Advances in data analysis techniques enable companies and government agencies to use profiling to determine detailed information about individual’s habits and tastes and create dossiers of detailed information. Nonobvious relationship awareness (NORA) is a new data analysis technology that can take data about people from many sources and correlate relationships to find hidden connections to identify potential criminals and terrorists.
  • #14: Finally, advances in networking, including the Internet, promise to greatly reduce the costs of moving and accessing large quantities of data and open the possibility of mining large pools of data remotely using small desktop machines, permitting an invasion of privacy on a scale and with a precision heretofore unimaginable. In short, Advances in networking reduce the costs of moving and accessing data, permitting privacy invasions on a vast scale.
  • #15: Responsibility :It is a key element of ethical action. Liability: A feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organization Due process is a related feature of law-governed societies and is a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.
  • #16: -Separate fact from fiction. -Remember, no matter how thin you slice it, there's always two sides. -Determine who's really involved. -Compromise; it doesn't always have to be an "either-or" outcome. -Anticipate the outcome; it will help you devise better solutions.
  • #17: Once your analysis is complete, what ethical principles or rules should you use to make a decision? What higher-order values should inform your judgment? before making a decision/judgement it is helpful to consider some ethical principles 1. Putting yourself into the place of others, and thinking of yourself as the object of the decision, can help you think about fairness in decision making. 2. . Ask yourself, “If everyone did this, could the organization, or society, survive?” 3. This is the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.”
  • #18: 4. This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action 5. Take the action that produces the least harm or the least potential cost 6. If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work