Sherri ShadeIntroductionEthics - according to WebsterWhat is What?IT EthicsSlide 6Information Technology EthicsThe Ten Commandments of Computer EthicsEthical Behaviors?Ethical or Unethical?Slide 11Slide 12IT Ethics: Issues Facing EducatorsPlagiarismCode and Content TheftVirusesPornographyChallenges: Code of EthicsChallenges: CyberspaceChallenges: CommerceChallenges: WorkplaceChallenges:WorkplaceMusic DownloadsChallenges: SpeechChallenges: Computing Resource AbuseSlide 26Federal Computer Crime Cases Involving TeensChallenges: PrivacyIntellectual PropertyCopyright InfringementInternet Copyright MythsChallenges: Intellectual PropertySlide 33Challenges: OtherNew Laws – New RulesFuture of IT EthicsSlide 37Conclusion: Some Ideas to PonderSo, What would you do?Works Cited:Sherri ShadeSherri ShadeInformation Technology EthicsInformation Technology EthicsIntroductionIntroductionBackground Background RTM InstituteRTM InstituteEthics, Character, & LeadershipEthics, Character, & LeadershipCurrent projectCurrent projectMaking an Ethical case for CSISMaking an Ethical case for CSISEthics -Ethics -according to Websteraccording to Webstereth•iceth•icPronunciation: Pronunciation: (eth'ik), [key] (eth'ik), [key] ——n.n. 1. 1. the body of moral principles or values the body of moral principles or values governing or distinctive of a particular culture or governing or distinctive of a particular culture or group: group: the Christian ethic; the tribal ethic of the the Christian ethic; the tribal ethic of the Zuni.Zuni. 2. 2. a complex of moral precepts held or rules of a complex of moral precepts held or rules of conduct followed by an individual: conduct followed by an individual: a personal a personal ethic.ethic.What is What?What is What?Computer EthicsComputer EthicsInternet EthicsInternet EthicsCyberEthicsCyberEthicsHumble beginning in the 1940’s (Bynum 1999)Humble beginning in the 1940’s (Bynum 1999)Four distinct technology phases (Tavani 2000)Four distinct technology phases (Tavani 2000)1950s – 1960s1950s – 1960s1970s – 1980s1970s – 1980s1990s – present 1990s – present Threshold Phase 4Threshold Phase 4IT EthicsIT EthicsWhat is the problem?What is the problem?Availability of “Really Good Stuff”Availability of “Really Good Stuff” lots of information, software, hardware, graphics, music, videoslots of information, software, hardware, graphics, music, videosTechnological Ease of Use Technological Ease of Use Myths, Lies, and StatisticsMyths, Lies, and StatisticsNew Laws – New RulesNew Laws – New RulesIT EthicsIT EthicsWho is responsible?Who is responsible?Who is affected?Who is affected?What harm is done?What harm is done?Should IT Professionals be in the ethics Should IT Professionals be in the ethics business?business?TrainingTrainingRefer ethical issues to HRRefer ethical issues to HRInformation Technology EthicsInformation Technology EthicsDeal with proper use of technology devices, data, services, and software.Deal with proper use of technology devices, data, services, and software.Implement policies Implement policies Prior to Technology it may have been easier to know whether the activity was right or Prior to Technology it may have been easier to know whether the activity was right or wrongwrongVirtual World Virtual World Judging behaviors is no longer straight forwardJudging behaviors is no longer straight forwardSome users view their computing actions as less serious than their actions in the “real Some users view their computing actions as less serious than their actions in the “real world”world”Examples:Examples:Stealing software from a store – no way! ….Stealing software from a store – no way! ….However, SW piracy costs businesses billions of dollars per yearHowever, SW piracy costs businesses billions of dollars per yearMost of us would not pick a lock to someone’s houseMost of us would not pick a lock to someone’s houseHowever, guessing passwords to gain access to a website, information, or However, guessing passwords to gain access to a website, information, or programs is a common programs is a common Sometimes the technology is not well understood…romance and fear may Sometimes the technology is not well understood…romance and fear may accompany a new technologies.accompany a new technologies.Movies, books, TV capitalize on this fear and romance and make unethical Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessaryor illegal actions seem heroic, or necessaryThe Ten Commandments of The Ten Commandments of Computer EthicsComputer EthicsComputer Ethics InstituteComputer Ethics InstituteEthical Behaviors?Ethical Behaviors?Is your 80 gigabyte hard drive full? That sure is a great music where Is your 80 gigabyte hard drive full? That sure is a great music where did you get it?did you get it?Have you given a friend a copy of your Microsoft Project software?Have you given a friend a copy of your Microsoft Project software?Software PiracySoftware PiracyDid you read the confidential company file that was accidentally Did you read the confidential company file that was accidentally attached to your email?attached to your email?Computer abuseComputer abuseDid you gain access to the network and invade other workers emails Did you gain access to the network and invade other workers emails and files?and files?Computer abuseComputer abuseYou formatted your hard drive prior to leaving your company because You formatted your hard drive prior to leaving your company because you were angry about leaving.you were angry about leaving.Destruction of propertyDestruction of propertySnooping the network for the “great stuff” and then sharing it with Snooping the network for the “great stuff” and then sharing it with your work friends.your work friends.Computer abuseComputer abuseEthical or Unethical?Ethical or Unethical?A student downloads a sexually explicit picture from the Internet on A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the a computer in the school library. Other students are able to see the picturepictureA student finds the teacher’s password to the school’s information A student finds the teacher’s
or
We will never post anything without your permission.
Don't have an account? Sign up