The document discusses the ethical stances an IT department should take regarding security, surveillance/privacy, and intellectual property. Regarding security, the IT department should protect company hardware, software, and data from unauthorized access through firewalls and secure email accounts. For surveillance/privacy, the department should avoid installing trojan viruses or excessively monitoring employees. On intellectual property, whether ideas created using company devices belong to the employee or company depends on individual company policies and patent/copyright laws. In conclusion, while IT support aims to protect the company, departments should also respect employee privacy and ownership over their work.
Python Notes for mca i year students osmania university.docx
Ethical Stance a company should have in the IT Department. Rob.docx
1. Ethical Stance a company should have in the IT Department.
Robert DeSimone
What ethics are involved in IT?
IT stands for information technology
Security
Surveillance / Privacy
Intellectual Property
Security
Protection of hardware, software, computers from unauthorized
access.
Example: Sending office emails through a firewall protected
email account is inconvenient, Sending office emails through a
personal emails are not. Therefore if you need to reach
someone urgently from home you should use your personal
email.
IT security is meant to protect its employees and the company.
Surveillance / Privacy
Trojan Virus
Track and record employees in order to access their ability to
2. work for a company.
Sharing this information with others.
Example: If apple creates the iPhone, they should be able to
perform statistical analysis on the customers who use it. Apple
created the iPhone, therefore take statistical analysis on the
customers who use it.
Intellectual Property
What your mind creates should be yours.
Patents, Copyrights, Trademarks
Is an idea created on a companies device the employees or the
company?
If a company owns a computer, it owns everything inside that
computer is owned by the company. An employee writes an
idea of his in a company computer, the computer is owned by
the company. Therefore the company has rights to that idea. (if
not patented)
Conclusion
IT support is becoming a larger and larger part of companies.
It is meant to protect the company and its employees, but more
the company than the employees.
Is this an ethical form of security for your company?
Sources
3. "Introduction to Social and Ethical Computing." Texts in
Computer Science Ethical And Social Issues In The Information
Age (n.d.): 1-18. Web.
Points: 210
Assignment 1: Digital Computer Crime
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain the four (4) major categories of computer crimes, and
provide at least one (1) example for each.
Weight: 15%
Did not submit or incompletely explained the four (4) major
categories of computer crimes; did not submit or incompletely
provided at least one (1) example for each.
Insufficiently explained the four (4) major categories of
computer crimes; insufficiently provided at least one (1)
example for each.
Partially explained the four (4) major categories of computer
crimes; partially provided at least one (1) example for each.
Satisfactorily explained the four (4) major categories of
computer crimes; satisfactorily provided at least one (1)
4. example for each.
Thoroughly explained the four (4) major categories of computer
crimes; thoroughly provided at least one (1) example for each.
2. Explain the most common forms of digital crime.
Weight: 15%
Did not submit or incompletely explained the most common
forms of digital crime.
Insufficiently explained the most common forms of digital
crime.
Partially explained the most common forms of digital crime.
Satisfactorily explained the most common forms of digital
crime.
Thoroughly explained the most common forms of digital crime.
3. Determine the category of computer crimes or cyber terrorism
that presents the greatest overall threat at the present time.
Provide a rationale to support your response.
Weight: 25%
Did not submit or incompletely determined the category of
computer crimes or cyber terrorism that presents the greatest
overall threat at the present time. Did not submit or
incompletely provided a rationale to support your response.
Insufficiently determined the category of computer crimes or
cyber terrorism that presents the greatest overall threat at the
present time. Insufficiently provided a rationale to support your
response.
Partially determined the category of computer crimes or cyber
terrorism that presents the greatest overall threat at the present
time. Partially provided a rationale to support your response.
Satisfactorily determined the category of computer crimes or
cyber terrorism that presents the greatest overall threat at the
present time. Satisfactorily provided a rationale to support your
response.
Thoroughly determined the category of computer crimes or
cyber terrorism that presents the greatest overall threat at the
present time. Thoroughly provided a rationale to support your
response.
5. 4. Summarize the roles and responses that the U.S. government,
court systems, and law enforcement agencies in combatting
computer crime. Next, suggest one (1) additional way—i.e., one
not discussed in the textbook—that the law enforcement
agencies can better counteract computer crime.
Weight: 30%
Did not submit or incompletely summarized the roles and
responses that the U.S. government, court systems, and law
enforcement agencies in combatting computer crime. Did not
submit or incompletely suggested one (1) additional way—i.e.,
one not discussed in the textbook—that the law enforcement
agencies can better counteract computer crime.
Insufficiently summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Insufficiently suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
Partially summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Partially suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
Satisfactorily summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Satisfactorily suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
Thoroughly summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Thoroughly suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
6. 5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present