SlideShare a Scribd company logo
1 of 23
Social and Ethical
Implications and Issues
This section will make up 25% of the questions on the exam.
Effects of IT
 E-business – electronic business, replaced several jobs in certain sectors, but
created new ones.
 Telemedicine – healthcare can be provided to people that are thousands of
miles away from doctors.
 Privacy – ones right to determine how much information can be collected
about them.
 Fairness in privacy – the data collected should only be used for its intended
purpose.
 Occupational privacy – information that has to do with ones profession.
 Informational privacy – ones personal information.
 Financial privacy – ones financial data.
Cont.
 Organizational privacy – trade secrets or activities that an organization does not want to be public.
 Physical privacy – one’s physical body or medical information.
 Gramm-Leach Bliley Act – financial institutions must handle peoples information with confidentiality.
 Health Insurance Portability and Accountability Act of 1996 – one has a right to see and request a copy
of their medical records.
 Children’s Online Privacy Protection Act (COPPA) – requires parental consent before collecting
information about children online.
 USA PATRIOT Act – the FBI can track emails and website visiting without needing a subpoena.
 Secure Socket Layer (SSL) – uses an encryption technology to allow communication between two
computers that can only be understood by those two computers.
 HTTP – the protocol (procedure) used when visiting an unsecure website
Privacy
 Proxy software – makes ones internet surfing anonymous.
 Anti-phishing software – verifies websites that hide their URL.
 File shredding – deleting a file off of a computer in a way that it
can’t be restored by any means.
 Copyright – books, performances, music, artwork.
 Industrial property – processes, designs, patents trademarks.
 Purposes of intellectual property – monetary incentives, exclusive
rights, economic growth and progress of human beings.
Cont.
Types of Intellectual Property
1. Trademark – a symbol or sign that is unique and is used to identify a product or
company.
2. Industrial designs – how something is created (size, shape, process, materials etc.).
3. Trade secrets – a process, design etc. that is only protected until someone else knows
it.
4. Patents – exclusive rights for something for up to 20 years.
5. Copyright – protection of intellectual property that has no expiration date.
 Open source – a software that has its source code open, this allows for changes to be
made to it by the public.
 Open Source Initiative (OSI) – a nonprofit that was created in order to educate people
about open source and its benefits.
Teams
 Virtual team – consists of people who communicate via the internet, while working
together
 Friendship group- when multiple virtual teams communicate with one another.
 Task group- formed when multiple people are working on a common task.
 Interest group – a virtual group that shares an interest.
 Command group – when the individuals working together are from the same department.
 Global group – when team members come from all over the world.
 Ergonomics – looks at how one’s computer is set up in order to reduce physical injury or
strain that can be caused by using a computer.
 Work-Related Musculoskeletal Disorders (WMSDs) – which can be caused by long time
computer usage is the largest job related injury in the United States.
Cont.
 Job design – lists all of the tasks one must perform for their job.
 Globalization – different countries and governments coming
together to do business.
Factors That Led to Globalization
1. Multinational companies
2. Politics
3. Easier flow of information
4. IT outsourcing
5. Interdependence among countries
Cont.
Effects of Globalization
1. Increased living standards
2. Manufacturing and services globalized
3. More globalized finance and economics
4. Increased competition among businesses
5. Environmental impacts
6. Technological impacts
 Outsourcing – when a company has an outside company provide a good or service that
normally would’ve been done in house.
 Insourcing – when a company makes a process in house, that was normally outsourced.
Outsourcing and Insourcing
Advantages of
Outsourcing
 More choices of services
 Ability to stay competitive
 Expansion & growth
 Time zone advantages
 New technology
 Increased productivity
Disadvantages of
Outsourcing
 Lag time
 Language barriers
 Loss of domestic jobs
 Trade secrets can be
compromised (loss of
control)
 Lack of ability to train your
staff
Cont.
Advantages of Insourcing
1. Creates domestic jobs
2. Boosts the domestic economy
3. Better quality
4. More control
3 Levels of Business Strategy
1. Organizational – the organization’s strategy as a whole
2. Business – each wing or divisions strategy (made up of several departments)
3. Departmental – each individual departments strategy
IT Careers
 Computer programmer
 Computer Scientist
 Computer Hardware Engineer
 Computer Software Engineer
 Network manager
 Network and Computer Systems Admin.
 Manager of Technical Services
 Messaging Administrator
 Network Architect or Network Engineer
 Computer Database
Administrator
 Digital Media Specialist
 Helpdesk Support specialist
 Information Systems Manager
 Lead Applications Developer
 Systems Administrator
 Systems Programmer
 Technical Writer
 Web Developer
 Web Programmer
Applications architect
Business Systems Analysts
(BSA)
Chief Technology Officer (CTO)
Computer-Security Specialist
Cont.
 The IT field is constantly changing due to new technology.
IT Certifications
1. Microsoft IT Certification
2. CompTIA (The Computer Information Technology Industry Association)
3. And many more
Levels of Economic Competition
1. Direct – when two goods perform the same function.
2. Indirect- occurs when two goods perform similar functions and can be
substituted for each other.
3. Budget –when a consumer has a budget.
Cont.
Other Types of Competition
 Monopoly – when only one company has the means to
manufacture a good or provide a service.
 Pure or perfect – when there are several companies that
have the means to manufacture a good or provide a service
Factors Effecting Competition
1. New technology
2. Production costs
3. Unit selling prices
Knowledge Management
 Implicit knowledge (tacit) – is gained through observation or
experience and is not stored on computers.
 Explicit knowledge (formal) – is communicated and obtained in a
systematic format and stored on computers.
 Knowledge Management – the strategies used to collect, analyze,
interpret and store knowledge.
 4 W’s of Knowledge Management – where, who, when, what type
 Push technology – collects information from inside and outside
sources through the use of a product or service (ex. BackWeb or
PointCast)
 Pull technology – when knowledge is collected from outside sources.
Cont.
 Databases – where information is stored.
 Software tools- are used to help simplify the KM process.
 Network communities – allow people to communicate issues
or information regarding KM.
 Data mining
 Enterprise Content Management (ECM) – the strategies that
are put into place to acquire, organize and deliver
documents that are related to an organization.
Computer Security
 Black-hat hackers – hackers with malicious intent.
 White-hat hackers – hackers with the intent of exposing flaws in a company's system (no malicious
intent).
 Script kiddies – use software or a program to hack (they don’t actually know how to hack)
 Viruses – a computer program that can damage a computer's software, hardware or data.
 Trojan Horses- a virus that looks like a useful program, but causes damage to the computer.
 Encryption viruses- makes personal folders or files unable to be read.
 Worms- a program that travels between networks (eventually finding a host which it causes damage
to)
 Boot-sector viruses – can damage a computer upon it “booting up” or turning on.
 Script Viruses – cause damage to a computer through a series of program statements.
Cont.
 Macro viruses – a virus that replaces a computers normal macro.
 Logic bombs- a virus that will be enabled when its conditions (logic) are met.
 Denial-of-service attacks – makes a computer program or function unavailable
for the user.
 Association for Computing Machinery (ACM) – creates computer ethics.
According to the ACM it is both illegal and unethical to hack into or spread
viruses on computers.
 Software piracy – the intentional copying, sale or alteration of a copyrighted
software.
 Intellectual property rights- the rights of a creator of a piece of work.
 Information privacy rights – a person or company has the right to determine
what information about them is able to be collected or used.
Cont.
 Use of Computer Access Controls (Physical Security) – security surrounding the building
or room in which a computer is stored.
 Hardware security – logins or passwords.
 Cryptographic techniques – makes information being transferred between two computers
harder to intercept.
 Biometric devices – use a body part to authorize/identify a use (finger print, palm
scanner, eye scanner etc.)
 Chain of trust techniques – a seal of authenticity.
 Firewall hardware devices- a router that keeps unused ports closed when on the internet.
 Software firewall- closes open ports from attackers when on the internet.
 Anti-virus software – protects a computer from viruses.
Cont.
 Back ups – protect a computer and can restore it to its
“back up” condition.
 Anti-spyware- protects a computer from spyware
programs.
 Anti-spam software – protects against “junk” mail
Strategy
 Business Process Reengineering (BRP) – studying business strategy, organizational
hierarchy and IS systems in order to improve business performance.
 Databases – store information.
 Wireless Communication Devices – make it possible to communicate with anyone,
despite their location.
 AutoCAD software – helps redesign products.
 AutoCAM software – helps make changes to the manufacturing process.
 Decision support systems (DSS)- help make decisions.
 Electronic data interchange (EDI) software – reduces transaction costs by monitoring
electronic data.
 Expert systems – give employees the ability to perform tasks.
Cont.
 Enterprise resource planning (ERP) – allows employees to share information in a central location.
 Customer resource management (CRM) – helps to increase customer satisfaction.
 Supply chain management (SCM) – helps manage the interactions from when a good is still raw
materials to when it is delivered to the final consumer.
 Total quality management (TQM) – helps redesign products to increase their quality.
 Automatic ID and tracking – helps locate/track products.
Three Types of Business Processes
1. Management – involves planning and administering tasks. (Project management)
2. Operational – planning and administering specific tasks. (manufacturing and purchasing)
3. Supporting – help the management and operational processes work. (accounting/human resources)
Cont.
 Business Process Modeling (BPM) – the act of analyzing
and modifying business processes to make them more
efficient.
 The business process – start, inputs, process, outputs, end.
 Quality control (QC) – makes sure that the raw materials
used to create a product are up to par.
 Line graphs – have lines connecting the dots.
 Scatter plots – don’t have lines connecting the dots.
 Run charts – show a processes performance for a period of
time.
Cont.
 Pareto charts – eliminating a small problem leads to great gains
 Checklists – used to keep track of things or processes that must be done in
order to complete a task.
 Check sheets –used to collect data.
 Flowcharts – a graphical picture of a process.
 B2B – business between two businesses.
 B2C – business between a business and a consumer.
 C2C – business between two consumers.
 Licensed software – bought and downloaded for a single fee.
 Hosted software – not downloaded and one pays a periodic usage fee.

More Related Content

What's hot

Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lessonMukalele Rogers
 
Ict presentation pptx
Ict presentation pptxIct presentation pptx
Ict presentation pptxGulsherZ
 

What's hot (20)

Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Review questions
Review questionsReview questions
Review questions
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Ict presentation pptx
Ict presentation pptxIct presentation pptx
Ict presentation pptx
 

Similar to Business ethics ppt

Nota Padat ICT SPM
Nota Padat ICT SPMNota Padat ICT SPM
Nota Padat ICT SPMD.J Md Thani
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxJohnsmithAlberto2
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Chap 8
Chap 8Chap 8
Chap 8GTU
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8GTU
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
Information Security
Information SecurityInformation Security
Information Securityvadapav123
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 

Similar to Business ethics ppt (20)

Nota Padat ICT SPM
Nota Padat ICT SPMNota Padat ICT SPM
Nota Padat ICT SPM
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Chap 8
Chap 8Chap 8
Chap 8
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
Information Security
Information SecurityInformation Security
Information Security
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 

More from Wulax37

Instagram Growth Results 2023
Instagram Growth Results 2023Instagram Growth Results 2023
Instagram Growth Results 2023Wulax37
 
Updated Instagram Growth Results
Updated Instagram Growth ResultsUpdated Instagram Growth Results
Updated Instagram Growth ResultsWulax37
 
Instagram Growth Results
Instagram Growth ResultsInstagram Growth Results
Instagram Growth ResultsWulax37
 
IG Growth Results
IG Growth ResultsIG Growth Results
IG Growth ResultsWulax37
 
Robert Benjamin IG Growth
Robert Benjamin IG GrowthRobert Benjamin IG Growth
Robert Benjamin IG GrowthWulax37
 
Robert Benjamin TikTok Results
Robert Benjamin TikTok ResultsRobert Benjamin TikTok Results
Robert Benjamin TikTok ResultsWulax37
 
Office applications, internet, and the world wide web
Office applications, internet, and the world wide webOffice applications, internet, and the world wide web
Office applications, internet, and the world wide webWulax37
 
Programming concepts and data management
Programming concepts and data management Programming concepts and data management
Programming concepts and data management Wulax37
 
Software development
Software developmentSoftware development
Software developmentWulax37
 
Hardware and systems technology
Hardware and systems technologyHardware and systems technology
Hardware and systems technologyWulax37
 

More from Wulax37 (10)

Instagram Growth Results 2023
Instagram Growth Results 2023Instagram Growth Results 2023
Instagram Growth Results 2023
 
Updated Instagram Growth Results
Updated Instagram Growth ResultsUpdated Instagram Growth Results
Updated Instagram Growth Results
 
Instagram Growth Results
Instagram Growth ResultsInstagram Growth Results
Instagram Growth Results
 
IG Growth Results
IG Growth ResultsIG Growth Results
IG Growth Results
 
Robert Benjamin IG Growth
Robert Benjamin IG GrowthRobert Benjamin IG Growth
Robert Benjamin IG Growth
 
Robert Benjamin TikTok Results
Robert Benjamin TikTok ResultsRobert Benjamin TikTok Results
Robert Benjamin TikTok Results
 
Office applications, internet, and the world wide web
Office applications, internet, and the world wide webOffice applications, internet, and the world wide web
Office applications, internet, and the world wide web
 
Programming concepts and data management
Programming concepts and data management Programming concepts and data management
Programming concepts and data management
 
Software development
Software developmentSoftware development
Software development
 
Hardware and systems technology
Hardware and systems technologyHardware and systems technology
Hardware and systems technology
 

Recently uploaded

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 

Recently uploaded (20)

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 

Business ethics ppt

  • 1. Social and Ethical Implications and Issues This section will make up 25% of the questions on the exam.
  • 2. Effects of IT  E-business – electronic business, replaced several jobs in certain sectors, but created new ones.  Telemedicine – healthcare can be provided to people that are thousands of miles away from doctors.  Privacy – ones right to determine how much information can be collected about them.  Fairness in privacy – the data collected should only be used for its intended purpose.  Occupational privacy – information that has to do with ones profession.  Informational privacy – ones personal information.  Financial privacy – ones financial data.
  • 3. Cont.  Organizational privacy – trade secrets or activities that an organization does not want to be public.  Physical privacy – one’s physical body or medical information.  Gramm-Leach Bliley Act – financial institutions must handle peoples information with confidentiality.  Health Insurance Portability and Accountability Act of 1996 – one has a right to see and request a copy of their medical records.  Children’s Online Privacy Protection Act (COPPA) – requires parental consent before collecting information about children online.  USA PATRIOT Act – the FBI can track emails and website visiting without needing a subpoena.  Secure Socket Layer (SSL) – uses an encryption technology to allow communication between two computers that can only be understood by those two computers.  HTTP – the protocol (procedure) used when visiting an unsecure website
  • 4. Privacy  Proxy software – makes ones internet surfing anonymous.  Anti-phishing software – verifies websites that hide their URL.  File shredding – deleting a file off of a computer in a way that it can’t be restored by any means.  Copyright – books, performances, music, artwork.  Industrial property – processes, designs, patents trademarks.  Purposes of intellectual property – monetary incentives, exclusive rights, economic growth and progress of human beings.
  • 5. Cont. Types of Intellectual Property 1. Trademark – a symbol or sign that is unique and is used to identify a product or company. 2. Industrial designs – how something is created (size, shape, process, materials etc.). 3. Trade secrets – a process, design etc. that is only protected until someone else knows it. 4. Patents – exclusive rights for something for up to 20 years. 5. Copyright – protection of intellectual property that has no expiration date.  Open source – a software that has its source code open, this allows for changes to be made to it by the public.  Open Source Initiative (OSI) – a nonprofit that was created in order to educate people about open source and its benefits.
  • 6. Teams  Virtual team – consists of people who communicate via the internet, while working together  Friendship group- when multiple virtual teams communicate with one another.  Task group- formed when multiple people are working on a common task.  Interest group – a virtual group that shares an interest.  Command group – when the individuals working together are from the same department.  Global group – when team members come from all over the world.  Ergonomics – looks at how one’s computer is set up in order to reduce physical injury or strain that can be caused by using a computer.  Work-Related Musculoskeletal Disorders (WMSDs) – which can be caused by long time computer usage is the largest job related injury in the United States.
  • 7. Cont.  Job design – lists all of the tasks one must perform for their job.  Globalization – different countries and governments coming together to do business. Factors That Led to Globalization 1. Multinational companies 2. Politics 3. Easier flow of information 4. IT outsourcing 5. Interdependence among countries
  • 8. Cont. Effects of Globalization 1. Increased living standards 2. Manufacturing and services globalized 3. More globalized finance and economics 4. Increased competition among businesses 5. Environmental impacts 6. Technological impacts  Outsourcing – when a company has an outside company provide a good or service that normally would’ve been done in house.  Insourcing – when a company makes a process in house, that was normally outsourced.
  • 9. Outsourcing and Insourcing Advantages of Outsourcing  More choices of services  Ability to stay competitive  Expansion & growth  Time zone advantages  New technology  Increased productivity Disadvantages of Outsourcing  Lag time  Language barriers  Loss of domestic jobs  Trade secrets can be compromised (loss of control)  Lack of ability to train your staff
  • 10. Cont. Advantages of Insourcing 1. Creates domestic jobs 2. Boosts the domestic economy 3. Better quality 4. More control 3 Levels of Business Strategy 1. Organizational – the organization’s strategy as a whole 2. Business – each wing or divisions strategy (made up of several departments) 3. Departmental – each individual departments strategy
  • 11. IT Careers  Computer programmer  Computer Scientist  Computer Hardware Engineer  Computer Software Engineer  Network manager  Network and Computer Systems Admin.  Manager of Technical Services  Messaging Administrator  Network Architect or Network Engineer  Computer Database Administrator  Digital Media Specialist  Helpdesk Support specialist  Information Systems Manager  Lead Applications Developer  Systems Administrator  Systems Programmer  Technical Writer  Web Developer  Web Programmer Applications architect Business Systems Analysts (BSA) Chief Technology Officer (CTO) Computer-Security Specialist
  • 12. Cont.  The IT field is constantly changing due to new technology. IT Certifications 1. Microsoft IT Certification 2. CompTIA (The Computer Information Technology Industry Association) 3. And many more Levels of Economic Competition 1. Direct – when two goods perform the same function. 2. Indirect- occurs when two goods perform similar functions and can be substituted for each other. 3. Budget –when a consumer has a budget.
  • 13. Cont. Other Types of Competition  Monopoly – when only one company has the means to manufacture a good or provide a service.  Pure or perfect – when there are several companies that have the means to manufacture a good or provide a service Factors Effecting Competition 1. New technology 2. Production costs 3. Unit selling prices
  • 14. Knowledge Management  Implicit knowledge (tacit) – is gained through observation or experience and is not stored on computers.  Explicit knowledge (formal) – is communicated and obtained in a systematic format and stored on computers.  Knowledge Management – the strategies used to collect, analyze, interpret and store knowledge.  4 W’s of Knowledge Management – where, who, when, what type  Push technology – collects information from inside and outside sources through the use of a product or service (ex. BackWeb or PointCast)  Pull technology – when knowledge is collected from outside sources.
  • 15. Cont.  Databases – where information is stored.  Software tools- are used to help simplify the KM process.  Network communities – allow people to communicate issues or information regarding KM.  Data mining  Enterprise Content Management (ECM) – the strategies that are put into place to acquire, organize and deliver documents that are related to an organization.
  • 16. Computer Security  Black-hat hackers – hackers with malicious intent.  White-hat hackers – hackers with the intent of exposing flaws in a company's system (no malicious intent).  Script kiddies – use software or a program to hack (they don’t actually know how to hack)  Viruses – a computer program that can damage a computer's software, hardware or data.  Trojan Horses- a virus that looks like a useful program, but causes damage to the computer.  Encryption viruses- makes personal folders or files unable to be read.  Worms- a program that travels between networks (eventually finding a host which it causes damage to)  Boot-sector viruses – can damage a computer upon it “booting up” or turning on.  Script Viruses – cause damage to a computer through a series of program statements.
  • 17. Cont.  Macro viruses – a virus that replaces a computers normal macro.  Logic bombs- a virus that will be enabled when its conditions (logic) are met.  Denial-of-service attacks – makes a computer program or function unavailable for the user.  Association for Computing Machinery (ACM) – creates computer ethics. According to the ACM it is both illegal and unethical to hack into or spread viruses on computers.  Software piracy – the intentional copying, sale or alteration of a copyrighted software.  Intellectual property rights- the rights of a creator of a piece of work.  Information privacy rights – a person or company has the right to determine what information about them is able to be collected or used.
  • 18. Cont.  Use of Computer Access Controls (Physical Security) – security surrounding the building or room in which a computer is stored.  Hardware security – logins or passwords.  Cryptographic techniques – makes information being transferred between two computers harder to intercept.  Biometric devices – use a body part to authorize/identify a use (finger print, palm scanner, eye scanner etc.)  Chain of trust techniques – a seal of authenticity.  Firewall hardware devices- a router that keeps unused ports closed when on the internet.  Software firewall- closes open ports from attackers when on the internet.  Anti-virus software – protects a computer from viruses.
  • 19. Cont.  Back ups – protect a computer and can restore it to its “back up” condition.  Anti-spyware- protects a computer from spyware programs.  Anti-spam software – protects against “junk” mail
  • 20. Strategy  Business Process Reengineering (BRP) – studying business strategy, organizational hierarchy and IS systems in order to improve business performance.  Databases – store information.  Wireless Communication Devices – make it possible to communicate with anyone, despite their location.  AutoCAD software – helps redesign products.  AutoCAM software – helps make changes to the manufacturing process.  Decision support systems (DSS)- help make decisions.  Electronic data interchange (EDI) software – reduces transaction costs by monitoring electronic data.  Expert systems – give employees the ability to perform tasks.
  • 21. Cont.  Enterprise resource planning (ERP) – allows employees to share information in a central location.  Customer resource management (CRM) – helps to increase customer satisfaction.  Supply chain management (SCM) – helps manage the interactions from when a good is still raw materials to when it is delivered to the final consumer.  Total quality management (TQM) – helps redesign products to increase their quality.  Automatic ID and tracking – helps locate/track products. Three Types of Business Processes 1. Management – involves planning and administering tasks. (Project management) 2. Operational – planning and administering specific tasks. (manufacturing and purchasing) 3. Supporting – help the management and operational processes work. (accounting/human resources)
  • 22. Cont.  Business Process Modeling (BPM) – the act of analyzing and modifying business processes to make them more efficient.  The business process – start, inputs, process, outputs, end.  Quality control (QC) – makes sure that the raw materials used to create a product are up to par.  Line graphs – have lines connecting the dots.  Scatter plots – don’t have lines connecting the dots.  Run charts – show a processes performance for a period of time.
  • 23. Cont.  Pareto charts – eliminating a small problem leads to great gains  Checklists – used to keep track of things or processes that must be done in order to complete a task.  Check sheets –used to collect data.  Flowcharts – a graphical picture of a process.  B2B – business between two businesses.  B2C – business between a business and a consumer.  C2C – business between two consumers.  Licensed software – bought and downloaded for a single fee.  Hosted software – not downloaded and one pays a periodic usage fee.