DOC PREVIEW
Information Technology Ethics

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Sherri ShadeIntroductionEthics - according to WebsterWhat is What?IT EthicsSlide 6Information Technology EthicsThe Ten Commandments of Computer EthicsEthical Behaviors?Ethical or Unethical?Slide 11Slide 12IT Ethics: Issues Facing EducatorsPlagiarismCode and Content TheftVirusesPornographyChallenges: Code of EthicsChallenges: CyberspaceChallenges: CommerceChallenges: WorkplaceChallenges:WorkplaceMusic DownloadsChallenges: SpeechChallenges: Computing Resource AbuseSlide 26Federal Computer Crime Cases Involving TeensChallenges: PrivacyIntellectual PropertyCopyright InfringementInternet Copyright MythsChallenges: Intellectual PropertySlide 33Challenges: OtherNew Laws – New RulesFuture of IT EthicsSlide 37Conclusion: Some Ideas to PonderSo, What would you do?Works Cited:Sherri ShadeSherri ShadeInformation Technology EthicsInformation Technology EthicsIntroductionIntroductionBackground Background RTM InstituteRTM InstituteEthics, Character, & LeadershipEthics, Character, & LeadershipCurrent projectCurrent projectMaking an Ethical case for CSISMaking an Ethical case for CSISEthics -Ethics -according to Websteraccording to Webstereth•iceth•icPronunciation: Pronunciation: (eth'ik), [key] (eth'ik), [key] ——n.n. 1. 1. the body of moral principles or values the body of moral principles or values governing or distinctive of a particular culture or governing or distinctive of a particular culture or group: group: the Christian ethic; the tribal ethic of the the Christian ethic; the tribal ethic of the Zuni.Zuni. 2. 2. a complex of moral precepts held or rules of a complex of moral precepts held or rules of conduct followed by an individual: conduct followed by an individual: a personal a personal ethic.ethic.What is What?What is What?Computer EthicsComputer EthicsInternet EthicsInternet EthicsCyberEthicsCyberEthicsHumble beginning in the 1940’s (Bynum 1999)Humble beginning in the 1940’s (Bynum 1999)Four distinct technology phases (Tavani 2000)Four distinct technology phases (Tavani 2000)1950s – 1960s1950s – 1960s1970s – 1980s1970s – 1980s1990s – present 1990s – present Threshold Phase 4Threshold Phase 4IT EthicsIT EthicsWhat is the problem?What is the problem?Availability of “Really Good Stuff”Availability of “Really Good Stuff” lots of information, software, hardware, graphics, music, videoslots of information, software, hardware, graphics, music, videosTechnological Ease of Use Technological Ease of Use Myths, Lies, and StatisticsMyths, Lies, and StatisticsNew Laws – New RulesNew Laws – New RulesIT EthicsIT EthicsWho is responsible?Who is responsible?Who is affected?Who is affected?What harm is done?What harm is done?Should IT Professionals be in the ethics Should IT Professionals be in the ethics business?business?TrainingTrainingRefer ethical issues to HRRefer ethical issues to HRInformation Technology EthicsInformation Technology EthicsDeal with proper use of technology devices, data, services, and software.Deal with proper use of technology devices, data, services, and software.Implement policies Implement policies Prior to Technology it may have been easier to know whether the activity was right or Prior to Technology it may have been easier to know whether the activity was right or wrongwrongVirtual World Virtual World Judging behaviors is no longer straight forwardJudging behaviors is no longer straight forwardSome users view their computing actions as less serious than their actions in the “real Some users view their computing actions as less serious than their actions in the “real world”world”Examples:Examples:Stealing software from a store – no way! ….Stealing software from a store – no way! ….However, SW piracy costs businesses billions of dollars per yearHowever, SW piracy costs businesses billions of dollars per yearMost of us would not pick a lock to someone’s houseMost of us would not pick a lock to someone’s houseHowever, guessing passwords to gain access to a website, information, or However, guessing passwords to gain access to a website, information, or programs is a common programs is a common Sometimes the technology is not well understood…romance and fear may Sometimes the technology is not well understood…romance and fear may accompany a new technologies.accompany a new technologies.Movies, books, TV capitalize on this fear and romance and make unethical Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessaryor illegal actions seem heroic, or necessaryThe Ten Commandments of The Ten Commandments of Computer EthicsComputer EthicsComputer Ethics InstituteComputer Ethics InstituteEthical Behaviors?Ethical Behaviors?Is your 80 gigabyte hard drive full? That sure is a great music where Is your 80 gigabyte hard drive full? That sure is a great music where did you get it?did you get it?Have you given a friend a copy of your Microsoft Project software?Have you given a friend a copy of your Microsoft Project software?Software PiracySoftware PiracyDid you read the confidential company file that was accidentally Did you read the confidential company file that was accidentally attached to your email?attached to your email?Computer abuseComputer abuseDid you gain access to the network and invade other workers emails Did you gain access to the network and invade other workers emails and files?and files?Computer abuseComputer abuseYou formatted your hard drive prior to leaving your company because You formatted your hard drive prior to leaving your company because you were angry about leaving.you were angry about leaving.Destruction of propertyDestruction of propertySnooping the network for the “great stuff” and then sharing it with Snooping the network for the “great stuff” and then sharing it with your work friends.your work friends.Computer abuseComputer abuseEthical or Unethical?Ethical or Unethical?A student downloads a sexually explicit picture from the Internet on A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the a computer in the school library. Other students are able to see the picturepictureA student finds the teacher’s password to the school’s information A student finds the teacher’s


Information Technology Ethics

Download Information Technology Ethics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Information Technology Ethics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Information Technology Ethics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?