SlideShare a Scribd company logo
1 of 28
Ethics and Privacy
3
[ Opening Case WikiLeaks Marches On ]
• The Problem: How to Prevent Future
Disclosures?
• The Solution: Security? Cyber Security hasn’t
worked. Fingerprints haven’t worked?
• The Results: Some say reform, shouldn’t have
anything to hide, what do you say
• What We Learned from This Case: How much
access should employees have to sensitive data?
IT’s About [small] business
Pinterest3.1
Who is at fault for the third-party copyright infringements enabled by
Pinterest? Pinterest, its users, or both? (Copyright infringement is discussed
in detail in Chapter 4.)
Compare the ethics of “pinning” on Pinterest with downloading music files
on Napster. Do you think that Pinterest will face the same fate as Napster?
Why or why not?
Ethical Issues3.1
• Ethical Frameworks
• Ethics in the Corporate Environment
• Ethics and Information Technology
Ethical Issues3.1
• Ethics
– The principles of right and wrong that
individuals use to make choices that
guide their behavior.
Ethical Frameworks
• Four Widely Used Standards
– Utilitarian Approach
– Rights Approach
– Fairness Approach
– Common Good Approach
• Combine Four Standards to Create a
Framework for Ethical Decision Making
Ethical Frameworks
• Utilitarian Approach: states that an ethical action is the one that
provides the most good or does the least harm.
• Rights Approach: maintains that an ethical action is the one that
best protects and respects the moral rights of the affected parties.
• Fairness Approach: posits that ethical actions treat all human
beings equally, or, if unequally, then fairly, based on some
defensible standard. For example, most people might believe it is
fair to pay people higher salaries if they work harder or if they
contribute a greater amount to the firm.
• Common Good Approach: highlights the interlocking
relationships that underlie all societies. This approach argues that
respect and compassion for all others is the basis for ethical actions.
Ethical Frameworks
• Five Steps in Ethical Decision Making
Framework
1. Recognize an ethical issue
2. Get the facts
3. Evaluate alternative actions
4. Make a Decisions and Test It
5. Act and Reflect on the Outcome of Decisions
Ethics in the Corporate
Environment
• Code of Ethics
• Fundamental Tenets of Ethics
– Responsibility
– Accountability
– Liability
• What is Unethical is not necessarily Illegal
Fundamental Tenets of Ethics
• Responsibility: means that you accept the
consequences of your decisions and actions.
• Accountability: refers to determining who is
responsible for actions that were taken.
• Liability: is a legal concept that gives individuals
the right to recover the damages done to them by
other individuals, organizations, or systems.
Ethics & Information
Technology
• Four General Categories of Ethical Issues
Related to IT:
1. Privacy Issues
2. Accuracy Issues
3. Property Issues
4. Accessibility Issues
Four General Categories of
Ethical Issues Related to IT:
1. Privacy issues involve collecting, storing, and disseminating
information about individuals.
2. Accuracy issues involve the authenticity, fidelity, and
correctness of information that is collected and processed.
3. Property issues involve the ownership and value of
information.
4. Accessibility issues revolve around who should have access to
information and whether a fee should be paid for this access.
IT’s [about business]
The Dot Clones3.2
As for legality, it partially depends on the legal and licensing
limitations of the country where the site(s) are created. This is
slowly changing as countries permit cross-licensing.
What are some alternative strategies that companies might use
to combat dot clones?
Discuss the ethical implications of the statement from Groupon’s
CEO that the Samwers are superb operators, not simply copycats.
Privacy3.2
• Electronic Surveillance
• Personal Information in Databases
• Information on Internet Bulletin Boards,
Newsgroups, and Social Networking
Sites
• Privacy Codes and Policies
• International Aspects of Privacy
Privacy3.2
• Privacy
– The right to be left alone and to be free
of unreasonable personal intrusions.
• Information Privacy
– The right to determine when, and to what
extent, information about you can be
gathered and/or communicated to others.
Privacy3.2
• Court Decisions in Many Countries
have followed two rules:
1. The right of privacy is not absolute.
Privacy must be balanced against the
needs of society.
2. The public’s right to know supersedes
the individual’s right of privacy.
Privacy3.2
• Digital Dossier
• Profiling
• Data Aggregators
– LexisNexis
– ChoicePoint
– Acxiom
Privacy3.2
• Digital Dossier: data integrated from data gathered about you in a
typical day (surveillance cameras located on toll roads, on other
roadways, in busy intersections, in public places, and at work;
credit card transactions; telephone calls (landline and cellular);
banking transactions; queries to search engines; and government
records (including police records).
• Profiling: The process of forming a digital dossier.
• Data Aggregators: companies that collect public data such as real
estate records and published telephone numbers, in addition to
nonpublic information such as Social Security numbers; fi nancial
data; and police, criminal, and motor vehicle records.
Electronic Surveillance
• Using technology to monitor individuals as
they go about their daily routines.
• Is conducted by employers, governments, and
other institutions.
• Examples:
– Surveillance cameras in airports, subways, banks,
and other public venues.
Electronic Surveillance
• Inexpensive digital sensors are found in laptop
webcams, video game sensors, smartphone
cameras, utility meters, passports, and ID
cards.
• Smartphones create geotags
• Google and Microsoft street view images
• Satellite imaging
Personal Information in Databases
• Personal Data / Record Keepers
– Credit Reporting Agencies
– Banks and Financial Institutions
– Utility Companies
– Employers
– Hospitals
– Schools
– Government Agencies (IRS, State, City)
Personal Information in Databases
• Major Concerns about Information You
Provide Record Keepers
– Do you know where the records are?
– Are the records accurate?
– Can you change inaccurate data?
– How long will it take to make a change?
– Under what circumstances will personal data be
released?
Personal Information in Databases
• Major Concerns about Information You
Provide Record Keepers
– How are the data used?
– To whom are the data given or sold?
– How secure are the data against access by
unauthorized people?
Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
• Free Speech versus Privacy on the Internet
• Derogatory Information Can Influence Hiring
Decisions
• Little to No Recourse for Victims
Privacy Codes & Policies
• An organization’s guidelines for protecting the
privacy of its customers, clients, and
employees.
– Opt-out Model
– Opt-in Model
• Platform for Privacy Preferences (P3P)
– A protocol that communicates privacy policies
between a web site and its visitors
Privacy Codes & Policies
• US Federal Trade Commission’s Fair
Information Practices Standard
• European Directive on Data Privacy
International Aspects of Privacy
• The Global Nature of the Internet Complicates
Data Privacy
• Approximately 50 Countries Have Data-
Protection Laws
– Inconsistent standards from country to country
– Transborder data flow.
[ Closing Case Target Provides
a Surprise ]
• The Problem
• An Interesting IT Solution
• The Results: Initial Uses of Watson
• What We Learned from This Case

More Related Content

What's hot

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)Vladimir Kanchev
 
Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering Dr. SELVAGANESAN S
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
AI and Managerial Decision Making
AI and Managerial Decision MakingAI and Managerial Decision Making
AI and Managerial Decision MakingLee Schlenker
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01stanbridge
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysisSKS
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
INTRODUCTION TO ETHICS
INTRODUCTION TO ETHICSINTRODUCTION TO ETHICS
INTRODUCTION TO ETHICSbina gadhiya
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 

What's hot (20)

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)
 
Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
AI and Managerial Decision Making
AI and Managerial Decision MakingAI and Managerial Decision Making
AI and Managerial Decision Making
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01
 
Data visualization
Data visualizationData visualization
Data visualization
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
INTRODUCTION TO ETHICS
INTRODUCTION TO ETHICSINTRODUCTION TO ETHICS
INTRODUCTION TO ETHICS
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 

Viewers also liked

Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...SURF Events
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Information ethics
Information ethicsInformation ethics
Information ethicsSTCC Library
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

Viewers also liked (17)

Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
Codesof practice
Codesof practiceCodesof practice
Codesof practice
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical Use Of Information
Ethical Use Of InformationEthical Use Of Information
Ethical Use Of Information
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similar to Chapter 3

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
 

Similar to Chapter 3 (20)

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 

More from Jennifer Polack

Catalogued and student workers database(use cases diagram)
Catalogued and student workers database(use cases diagram)Catalogued and student workers database(use cases diagram)
Catalogued and student workers database(use cases diagram)Jennifer Polack
 
Classroom scheduler update
Classroom scheduler updateClassroom scheduler update
Classroom scheduler updateJennifer Polack
 
Temperature data analyzer requirements
Temperature data analyzer requirementsTemperature data analyzer requirements
Temperature data analyzer requirementsJennifer Polack
 
Training Programming Description- Morning Section
Training Programming Description- Morning SectionTraining Programming Description- Morning Section
Training Programming Description- Morning SectionJennifer Polack
 
Training Programming Description- Afternoon Section
Training Programming Description- Afternoon SectionTraining Programming Description- Afternoon Section
Training Programming Description- Afternoon SectionJennifer Polack
 
Cataloged and student workers database
Cataloged and student workers databaseCataloged and student workers database
Cataloged and student workers databaseJennifer Polack
 
Temperature Analyzer Project
Temperature Analyzer ProjectTemperature Analyzer Project
Temperature Analyzer ProjectJennifer Polack
 
What is software engineering
What is software engineeringWhat is software engineering
What is software engineeringJennifer Polack
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringJennifer Polack
 

More from Jennifer Polack (20)

Erd examples
Erd examplesErd examples
Erd examples
 
Catalogued and student workers database(use cases diagram)
Catalogued and student workers database(use cases diagram)Catalogued and student workers database(use cases diagram)
Catalogued and student workers database(use cases diagram)
 
Trainer use cases
Trainer use casesTrainer use cases
Trainer use cases
 
Umw training program
Umw training programUmw training program
Umw training program
 
Classroom scheduler update
Classroom scheduler updateClassroom scheduler update
Classroom scheduler update
 
Temperature data analyzer requirements
Temperature data analyzer requirementsTemperature data analyzer requirements
Temperature data analyzer requirements
 
Training Programming Description- Morning Section
Training Programming Description- Morning SectionTraining Programming Description- Morning Section
Training Programming Description- Morning Section
 
Training Programming Description- Afternoon Section
Training Programming Description- Afternoon SectionTraining Programming Description- Afternoon Section
Training Programming Description- Afternoon Section
 
Cataloged and student workers database
Cataloged and student workers databaseCataloged and student workers database
Cataloged and student workers database
 
Temperature Analyzer Project
Temperature Analyzer ProjectTemperature Analyzer Project
Temperature Analyzer Project
 
Database design
Database designDatabase design
Database design
 
System Modelling
System ModellingSystem Modelling
System Modelling
 
Software process
Software processSoftware process
Software process
 
Agile software process
Agile software processAgile software process
Agile software process
 
What is software engineering
What is software engineeringWhat is software engineering
What is software engineering
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Ccsc 2015 panel
Ccsc 2015 panelCcsc 2015 panel
Ccsc 2015 panel
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Chapter 3

  • 2. [ Opening Case WikiLeaks Marches On ] • The Problem: How to Prevent Future Disclosures? • The Solution: Security? Cyber Security hasn’t worked. Fingerprints haven’t worked? • The Results: Some say reform, shouldn’t have anything to hide, what do you say • What We Learned from This Case: How much access should employees have to sensitive data?
  • 3. IT’s About [small] business Pinterest3.1 Who is at fault for the third-party copyright infringements enabled by Pinterest? Pinterest, its users, or both? (Copyright infringement is discussed in detail in Chapter 4.) Compare the ethics of “pinning” on Pinterest with downloading music files on Napster. Do you think that Pinterest will face the same fate as Napster? Why or why not?
  • 4. Ethical Issues3.1 • Ethical Frameworks • Ethics in the Corporate Environment • Ethics and Information Technology
  • 5. Ethical Issues3.1 • Ethics – The principles of right and wrong that individuals use to make choices that guide their behavior.
  • 6. Ethical Frameworks • Four Widely Used Standards – Utilitarian Approach – Rights Approach – Fairness Approach – Common Good Approach • Combine Four Standards to Create a Framework for Ethical Decision Making
  • 7. Ethical Frameworks • Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. • Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. • Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. • Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  • 8. Ethical Frameworks • Five Steps in Ethical Decision Making Framework 1. Recognize an ethical issue 2. Get the facts 3. Evaluate alternative actions 4. Make a Decisions and Test It 5. Act and Reflect on the Outcome of Decisions
  • 9. Ethics in the Corporate Environment • Code of Ethics • Fundamental Tenets of Ethics – Responsibility – Accountability – Liability • What is Unethical is not necessarily Illegal
  • 10. Fundamental Tenets of Ethics • Responsibility: means that you accept the consequences of your decisions and actions. • Accountability: refers to determining who is responsible for actions that were taken. • Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
  • 11. Ethics & Information Technology • Four General Categories of Ethical Issues Related to IT: 1. Privacy Issues 2. Accuracy Issues 3. Property Issues 4. Accessibility Issues
  • 12. Four General Categories of Ethical Issues Related to IT: 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.
  • 13. IT’s [about business] The Dot Clones3.2 As for legality, it partially depends on the legal and licensing limitations of the country where the site(s) are created. This is slowly changing as countries permit cross-licensing. What are some alternative strategies that companies might use to combat dot clones? Discuss the ethical implications of the statement from Groupon’s CEO that the Samwers are superb operators, not simply copycats.
  • 14. Privacy3.2 • Electronic Surveillance • Personal Information in Databases • Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites • Privacy Codes and Policies • International Aspects of Privacy
  • 15. Privacy3.2 • Privacy – The right to be left alone and to be free of unreasonable personal intrusions. • Information Privacy – The right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
  • 16. Privacy3.2 • Court Decisions in Many Countries have followed two rules: 1. The right of privacy is not absolute. Privacy must be balanced against the needs of society. 2. The public’s right to know supersedes the individual’s right of privacy.
  • 17. Privacy3.2 • Digital Dossier • Profiling • Data Aggregators – LexisNexis – ChoicePoint – Acxiom
  • 18. Privacy3.2 • Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). • Profiling: The process of forming a digital dossier. • Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.
  • 19. Electronic Surveillance • Using technology to monitor individuals as they go about their daily routines. • Is conducted by employers, governments, and other institutions. • Examples: – Surveillance cameras in airports, subways, banks, and other public venues.
  • 20. Electronic Surveillance • Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone cameras, utility meters, passports, and ID cards. • Smartphones create geotags • Google and Microsoft street view images • Satellite imaging
  • 21. Personal Information in Databases • Personal Data / Record Keepers – Credit Reporting Agencies – Banks and Financial Institutions – Utility Companies – Employers – Hospitals – Schools – Government Agencies (IRS, State, City)
  • 22. Personal Information in Databases • Major Concerns about Information You Provide Record Keepers – Do you know where the records are? – Are the records accurate? – Can you change inaccurate data? – How long will it take to make a change? – Under what circumstances will personal data be released?
  • 23. Personal Information in Databases • Major Concerns about Information You Provide Record Keepers – How are the data used? – To whom are the data given or sold? – How secure are the data against access by unauthorized people?
  • 24. Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites • Free Speech versus Privacy on the Internet • Derogatory Information Can Influence Hiring Decisions • Little to No Recourse for Victims
  • 25. Privacy Codes & Policies • An organization’s guidelines for protecting the privacy of its customers, clients, and employees. – Opt-out Model – Opt-in Model • Platform for Privacy Preferences (P3P) – A protocol that communicates privacy policies between a web site and its visitors
  • 26. Privacy Codes & Policies • US Federal Trade Commission’s Fair Information Practices Standard • European Directive on Data Privacy
  • 27. International Aspects of Privacy • The Global Nature of the Internet Complicates Data Privacy • Approximately 50 Countries Have Data- Protection Laws – Inconsistent standards from country to country – Transborder data flow.
  • 28. [ Closing Case Target Provides a Surprise ] • The Problem • An Interesting IT Solution • The Results: Initial Uses of Watson • What We Learned from This Case

Editor's Notes

  1. Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  2. Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  3. Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  4. Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
  5. Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
  6. 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.
  7. 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.
  8. Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). Profiling: The process of forming a digital dossier. Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.
  9. Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). Profiling: The process of forming a digital dossier. Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.