Unformatted text preview:

Ch 8 Ethics Privacy Security What does it mean to act ethically Ethics principles and standards that guide our behavior toward other people Ethics are standards society has imposed Everyone has different standards Who you are decides how you decide on your ethics Ethical decisions are judgments between rewards for yourself and others against responsibilities to yourself and others How do individuals decide ethical issues Based on what you were around growing up Practical issues involved in decision making Ethical decisions are complex decisions Personal ethics and experiences should help guide you Practice situations may effect certain ethical decisions feel pressure or you have no other option o Consequences how much harm or benefit would come from the decision o Societies Opinions such as family members and friends o Likelihood of effect better for society no negative impact on others o Time to Consequences how quickly you will get caught o Relatedness who will be affected o Reach of result how many people will be impacted A big or a small group Minor vs Serious vs Very Serious Ethical Violations If looking at a circle the outside level would consist of things most people wouldn t consider bad such as sending a couple personal emails during work hours The middle level consists of serious ethical challenges such as accessing personnel records for personal reasons and reading someone else s emails Very Serious Ethical Violations or the innermost ethical level of the circle consists of embezzling funds or selling company records to a competitor If everyone around you is doing something unethical you may start thinking the same way and that it is not big deal and begin to do the same this could lead to trouble Copyrights trademarks patents intellectual property Copyrights protect literary and dramatic works musical and theatrical compositions and o Definition o Fair use doctrine legal protection afforded an expression of an idea such as a song video works of art game and some types of proprietary documents No one is allowed to use you work without your permission material in certain situations such as for teaching purposes A professor is allowed to share and distribute an article in class that relates to the material being taught if it is a spur of the moment find If it something that has been planned ahead of time permission must be received copyrighted software an exception to a copyright Allows users to utilize copyrighted unauthorized use of duplication distribution or sale of o Pirated Software Privacy Definition your right to be left alone possess full control of your belongings and not to be observed without consent Nothing is private once it is put on the Internet Everything can be traced back to you For example emails are saved on at least three different computers yours the one the email is sent through and the receiver s computer printers have patterns on the back that are not visible unless looked at with a blue light and microscope photos have information that can be traced back to when the picture was taken what type of camera was used etc Also CDs that are burned can be traced back to your CD drive How is your privacy protected businesses emailing list or not Sites notify you of what they can do with your information Opt out clauses consumers want the choice to pick what we want ex If we want to be on the Opt in clauses businesses automatically opt the consumer into their mailing list when signing up for a service and we have to notify the business that we do not want to be on the list Box is already checked when signing up for something we usually do not pay attention to this We have access to personal data We are promised that our information will be secure and that the company will not share this information with any third parties We are informed of what will be enforced and what will happen if what has been enforced has been violated Identity theft Definition the forging of someone s identity for the purpose of fraud often for financial gain Phishing Pharming Keyloggers the rerouting of your request for a legitimate Web site With this type of records every keystroke and mouse click that you make It can also record emails instant messages chats passwords you type into website etc carding or brand spoofing is a technique to gain personal information for the purpose of identity theft usually by fraudulent e mails These e mails usually look official with company logos and ask for verification of information specific to you like account passwords etc Look out for bad grammar and misspellings Another type of phishing scam is an e mail that gives a link that claims to take you to the website This link is fraudulent and the hacker gets your personal information through the information you put into the directed website Ex Your bank account has been compromised scam you put the correct address into the search bar but are redirected to a fake site which may be only one letter different from the original site You may not notice the change in the web address and further give your personal information on this fake website Look for the padlock in the browser to make sure this is a legitimate site This shows you if the site is secure or not Pharming is possible by getting access to the giant databases that Internet providers use to route Web traffic unsolicited email from businesses that advertise goods and services Spam Spam blockers are available but do not often work as spammers figure out ways to fool the system Adware banner ads found on the web Adware is software to generate ads that installs itself on your computer when you download some other program from the Web It is a type of Trojan horse software software that you don t want inside of software that you want Spyware is software that collects information about you and reports it to someone without your permission You usually agree to spyware when clicking the I agree button during the downloading process If what you are downloading has adware it most likely has spyware Spyware tracks what you do online and records it website you visit places on your computer Cookies can save ID and password information and what websites you have visited You can have cookies blocked or be small file that contains information about you and your Web activities which a Cookies notified when one has been put on your computer or you may also get a cookie management software with more detailed options that are not available via your browser


View Full Document

FSU ISM 3003 - Ch. 8 Ethics, Privacy & Security

Documents in this Course
Load more
Download Ch. 8 Ethics, Privacy & Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Ch. 8 Ethics, Privacy & Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Ch. 8 Ethics, Privacy & Security and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?