Unformatted text preview:

Ch. 8 Ethics, Privacy & SecurityWhat does it mean to act ethically?-Ethics: principles and standards that guide our behavior toward other people.-Ethics are standards society has imposed. Everyone has different standards. Who you are decides how you decide on your ethics. -Ethical decisions are judgments between rewards for yourself and others against responsibilities to yourself and others.How do individuals decide ethical issues?- Based on what you were around growing up- Practical issues involved in decision making- Ethical decisions are complex decisions- Personal ethics and experiences should help guide you- Practice situations may effect certain ethical decisions (feel pressure or you have no other option)o Consequences (how much harm or benefit would come from the decision?)o Societies Opinions such as family members and friendso Likelihood of effect (better for society; no negative impact on others)o Time to Consequences (how quickly you will get caught)o Relatedness (who will be affected?)o Reach of result (how many people will be impacted? A big or a small group)Minor vs. Serious vs. Very Serious Ethical Violations- If looking at a circle, the outside level would consist of things most people wouldn’t consider bad such as sending a couple personal emails during work hours- The middle level consists of serious ethical challenges such as accessing personnel records for personal reasons and reading someone else’s emails- Very Serious Ethical Violations or the innermost ethical level of the circle consists of embezzling funds or selling company records to a competitor. - If everyone around you is doing something unethical, you may start thinking the same way and that it is not big deal and begin to do the same - this could lead to trouble. Copyrights, trademarks, patents, intellectual property- Copyrights: protect literary and dramatic works, musical and theatrical compositions, and works of art.o Definition: legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents. No one is allowed to use you work without your permission.o Fair use doctrine: an exception to a copyright. Allows users to utilize copyrighted material in certain situations, such as for teaching purposes. A professor is allowed to share and distribute an article in class that relates to the material being taught if it is a spur of the moment find. If it something that has been planned ahead of time, permission must be received. o Pirated Software: unauthorized use of, duplication, distribution, or sale of copyrighted software. Privacy-Definition: your right to be left alone, possess full control of your belongings, and not to be observed without consent. Nothing is private once it is put on the Internet. Everything can be traced backto you. For example, emails are saved on at least three different computers (yours, the one the email is sent through, and the receiver’s computer), printers have patterns on the back that are not visible unless looked at with a blue light and microscope, photos have information that can be traced back to when the picture was taken, what type of camera was used, etc. Also, CDs that are burned can be traced back to your CD drive. How is your privacy protected?-Sites notify you of what they can do with your information-Opt-out clauses: consumers’ want the choice to pick what we want (ex. If we want to be on the businesses emailing list or not)-Opt-in clauses: businesses automatically opt the consumer into their mailing list when signing up for a service and we have to notify the business that we do not want to be on the list. Box is already checked when signing up for something – we usually do not pay attention to this-We have access to personal data-We are promised that our information will be secure and that the company will not share this information with any third parties-We are informed of what will be enforced and what will happen if what has been enforced has been violatedIdentity theft-Definition: the forging of someone’s identity for the purpose of fraud (often for financial gain.) - Keyloggers: records every keystroke and mouse click that you make. It can also record emails, instant messages, chats, passwords you type into website, etc. - Phishing: (carding or brand spoofing) is a technique to gain personal information for the purpose of identity theft, usually by fraudulent e-mails. These e-mails usually look official with company logos and ask for verification of information specific to you like account passwords, etc. Look out for bad grammar and misspellings. Another type of phishing scam is an e-mail that gives a link that claims to take you to the website. This link is fraudulent and the hacker gets your personal information through the information you put into the directed website. (Ex. “Your bank account has been compromised…” - Pharming: the rerouting of your request for a legitimate Web site. With this type of scam, you put the correct address into the search bar but are redirected to a fake site, which may be only one letter different from the original site. You may not notice the change in the web address and further give your personal information on this fake website. Look for the padlock in the browser to make sure this is a legitimate site. This shows you if the site is secure or not. Pharming is possible by getting access to the giant databases that Internet providers use to route Web traffic. - Spam: unsolicited email from businesses that advertise goods and services. Spam blockers are available, but do not often work as spammers figure out ways to fool the system. - Adware: banner ads found on the web. Adware is software to generate ads that installs itself on your computer when you download some other program from the Web. It is a type of Trojan horse software (software that you don’t want inside of software that you want.) Spyware is software that collects information about you and reports it to someone without your permission. You usually agree to spyware when clicking the “I agree” button during the downloading process. If what you are downloading has adware, it most likely has spyware. Spyware tracks what you do online and records it. - Cookies: small file that contains information about you and your Web activities, which awebsite you visit places on your computer. Cookies can save ID and password information and what websites you have


View Full Document

FSU ISM 3003 - Ch. 8 Ethics, Privacy & Security

Documents in this Course
Load more
Download Ch. 8 Ethics, Privacy & Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Ch. 8 Ethics, Privacy & Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Ch. 8 Ethics, Privacy & Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?