MUW BU 294 - Ethics and an Introduction to Privacy

Unformatted text preview:

Ethics and an Introduction to PrivacyApril 10 – April 14 Introduction:o With the growth of networked computers, more people’s lives can be affected more quickly than ever before (p. 348).o The most important parts of any IT system are the people who use it and how people are affected by it. Therefore, you must be responsible (p. 348).o The textbook breaks the responsible use of information into four areas (p. 348): Importance of ethics in the ownership and use of information Importance to people of personal privacy and the ways in which it can becompromised The value of information to an organization Threats to information and how to protect against them Ethics:o Ethics are the principles and standards that guide our behavior toward other people. Being ethical involves behaving in a principled way and treating other people with respect and dignity (p. 349).o How you use information is based largely on ethics.o Ethical factors: When faced with an ethical problem, you can be affected primarily by two factors (p. 349):- Basic ethical structure- Practical Circumstanceso Consequences – possible benefit or harmo Society’s opinion – what will society think?o Likelihood of effect – probability of benefit or harmo Time to consequences – length of time until benefit or harm takes effecto Relatedness – how much do you relate to the people whowill receive the benefit or the harm?o Reach of result – how many people will be affected?o Legal vs. Ethical: Legal and ethical, illegal and ethical, legal and unethical, illegal and unethicalo Intellectual Property: Intellectual property is intangible creative work that is embodied in physical form. Examples include music, novels, paintings and sculpturesfrom the world of art and blueprints, sketches, schematics, documents, software, etc. from the world of business (p. 351). Copyright is the legal protection afforded an expression of an idea (a.k.a. intellectual property). Having a copyright means that no one can use your intellectual property without your permission (p. 351).- There are exceptions to U.S. Copyright law. The Fair Use Doctrine allows for copyrighted material to be used in certain situations, for example, in the creation of new work, or within limits, for teaching (p. 352).- The determining factor on copyright infringement is whether the copyright holder has been or is likely to be denied income because of the infringement (p. 352).- Regularly Committed Copyright Infringements (p. 352):o It’s illegal to copy a copyrighted picture, text, or anything else without permission.o It’s illegal to make a copy of software.- Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted material (p. 353).o One in four business applications in United States is thought to be pirated.o In some places, nine of ten business applications are thought to be pirated.- Counterfeit software is software that is manufactured to look likethe real thing and is sold as is (p. 353).o Counterfeits are problematic because they cause the makers of the original to lose revenue.o Counterfeits are also bad for the companies buying thembecause they are often glitchy. Privacy:o Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. It’sthe right to be free of unwanted intrusion into your personal life (p. 353).o Privacy and other Individuals: Information must be protected from other individuals who wist to steal it (p. 355). Snoopware is a type of software that allows people to monitor what’s happening on a computer (p. 354).- Key logger software are programs that record a keystroke and mouse click (p. 354).- Screen capture software captures a picture of a user’s screen at a given point in time (p. 354).- E-mail is vulnerable because it is stored in multiple locations (once on the computer you’re using, once on the e-mail server, once on the recipient’s computer, etc.)o Identity Theft: Identity theft is the forging of someone’s identity for the purpose of fraud. The fraud is often financial fraud, to apply for and use credit cardsin the victim’s name or to apply for a loan (p. 356).- Instances of identity theft have skyrocketed in the last three years.- Phishing is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail (p. 356). o It is done by sending out very authentic looking e-mails that look like they come from legitimate businesses. These e-mails typically ask for personal information on the basis of clearing up an accounting error, auditing an account,


View Full Document

MUW BU 294 - Ethics and an Introduction to Privacy

Download Ethics and an Introduction to Privacy
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Ethics and an Introduction to Privacy and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Ethics and an Introduction to Privacy 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?