SlideShare a Scribd company logo
Privacy
What are the ethical issues?
• Many of the ethical issues that face IT professionals involve privacy. For
example:
• Is it OK to monitor the Web sites visited by your network users? Should you
routinely keep logs of visited sites? Is it negligent to not monitor such
Internet usage, to prevent the possibility of pornography in the workplace
that could create a hostile work environment?
• Is it OK to place key loggers on machines on the network to capture
everything the user types? What about screen capture programs so you can
see everything that's displayed? Should users be informed that they're being
watched in this way?
• Is it OK to read the documents and look at the graphics files that are stored
on users' computers or in their directories on the file server?
Summary
• This article has raised a lot of questions, but has not attempted to
provide set answers. That's because, ultimately, the answer to the
question "Is it ethical?" must be answered by each individual IT
professional.
• beginning to be addressed. Voluntary professional associations
such as the Association for Computing Machinery (ACM) have
developed their own codes of ethics and professional conduct,
which can serve as a guideline for individuals and other
organizations.
Sharing of
Information
Discuss the common ethical issues associated with sharing ofDiscuss the common ethical issues associated with sharing of
informationinformation
Ethics and Sharing Personal InformationEthics and Sharing Personal Information
One of the biggest ethical decisions young people have to makeOne of the biggest ethical decisions young people have to make
is how to handle other people’s personal information. Becauseis how to handle other people’s personal information. Because
nearly all of the services and platforms youth use online arenearly all of the services and platforms youth use online are
networkednetworked, every time a friend or contact posts something they, every time a friend or contact posts something they
have to decide whether and how to share it. As well, youth mayhave to decide whether and how to share it. As well, youth may
inadvertently share others’ personal information when postinginadvertently share others’ personal information when posting
their own content.their own content.
An Ethical Approach to Sharing Personal InformationAn Ethical Approach to Sharing Personal Information
With younger children, the best approach is to have a clear andWith younger children, the best approach is to have a clear and
consistent set of rules, both at home and at school, aboutconsistent set of rules, both at home and at school, about
sharing other people’s content.sharing other people’s content.
Commandment 4Commandment 4
IssueIssue
Discuss the common ethical issues associated withDiscuss the common ethical issues associated with
b) sharing of informationb) sharing of information
issuesissues
You shall not use a computer to steal.You shall not use a computer to steal.
•• Do not use computer technology to steal information.Do not use computer technology to steal information.
Explanation: Stealing sensitive information or leaking confidentialExplanation: Stealing sensitive information or leaking confidential
information is as good as robbery. It is wrong to acquire personalinformation is as good as robbery. It is wrong to acquire personal
information of employees from an employee database or patient historyinformation of employees from an employee database or patient history
from a hospital database or other such information that is meant to befrom a hospital database or other such information that is meant to be
confidential. Similarly, breaking into a bank account to collect informationconfidential. Similarly, breaking into a bank account to collect information
about the account or account holder is wrong. Illegal electronic transferabout the account or account holder is wrong. Illegal electronic transfer
of funds is a type of fraud. With the use of technology, stealing ofof funds is a type of fraud. With the use of technology, stealing of
information is much easier.information is much easier.
Ethical Issues Associated with
Usage of Computing Resources
CHALLENGE :
Computer Resource Abuse
computer fraudcomputer fraud
computer crimecomputer crime
- Sending virus in order to hack personal
information and exposing to the others.
- Deleting friend's assignment document.
- Look/change students' grades from the
lecturers' computers.
- Taking someone's personal
information or idea to use without any
approval.
- Posting something like "He or she
did ...." without any proves.
- Cracking demo program and using it
forever.
- Using site's information and publishing a
book without the source to earn benefit.
- Posting New movie that just came out on
Youtube.
- Making program that can spy on other
people's computer.
- Chatting with someone using curse
words.
Common ethical issues

More Related Content

What's hot

Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
Kwame Afreh
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
university of education,Lahore
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
Tawny Brown
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
Sammer Qader
 
Review questions
Review questionsReview questions
Review questions
Anura Kumara
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
university of education,Lahore
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
Kashif Sohail
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
university of education,Lahore
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Ethics in an information society
Ethics in an information societyEthics in an information society
Ethics in an information society
Prakash Raval
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
Kielentot Martinez
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
Noriha Nori
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
Tonmoy zahid Rishad
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technology
Ezzy Izzuddin
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
TBledsoe
 

What's hot (19)

Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Review questions
Review questionsReview questions
Review questions
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Ethics in an information society
Ethics in an information societyEthics in an information society
Ethics in an information society
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technology
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 

Similar to Common ethical issues

Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
sajida zafar
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
samkvarughese
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Kodok Ngorex
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
Johan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
Johan Koren
 
Nfwordle
NfwordleNfwordle
Nfwordle
Nadine Fray
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
Chandika Ruwan
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
guest09fcd1
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 

Similar to Common ethical issues (20)

Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Recently uploaded

The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 

Recently uploaded (20)

The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 

Common ethical issues

  • 1.
  • 3. What are the ethical issues? • Many of the ethical issues that face IT professionals involve privacy. For example: • Is it OK to monitor the Web sites visited by your network users? Should you routinely keep logs of visited sites? Is it negligent to not monitor such Internet usage, to prevent the possibility of pornography in the workplace that could create a hostile work environment? • Is it OK to place key loggers on machines on the network to capture everything the user types? What about screen capture programs so you can see everything that's displayed? Should users be informed that they're being watched in this way? • Is it OK to read the documents and look at the graphics files that are stored on users' computers or in their directories on the file server?
  • 4. Summary • This article has raised a lot of questions, but has not attempted to provide set answers. That's because, ultimately, the answer to the question "Is it ethical?" must be answered by each individual IT professional. • beginning to be addressed. Voluntary professional associations such as the Association for Computing Machinery (ACM) have developed their own codes of ethics and professional conduct, which can serve as a guideline for individuals and other organizations.
  • 6. Discuss the common ethical issues associated with sharing ofDiscuss the common ethical issues associated with sharing of informationinformation Ethics and Sharing Personal InformationEthics and Sharing Personal Information One of the biggest ethical decisions young people have to makeOne of the biggest ethical decisions young people have to make is how to handle other people’s personal information. Becauseis how to handle other people’s personal information. Because nearly all of the services and platforms youth use online arenearly all of the services and platforms youth use online are networkednetworked, every time a friend or contact posts something they, every time a friend or contact posts something they have to decide whether and how to share it. As well, youth mayhave to decide whether and how to share it. As well, youth may inadvertently share others’ personal information when postinginadvertently share others’ personal information when posting their own content.their own content. An Ethical Approach to Sharing Personal InformationAn Ethical Approach to Sharing Personal Information With younger children, the best approach is to have a clear andWith younger children, the best approach is to have a clear and consistent set of rules, both at home and at school, aboutconsistent set of rules, both at home and at school, about sharing other people’s content.sharing other people’s content.
  • 7. Commandment 4Commandment 4 IssueIssue Discuss the common ethical issues associated withDiscuss the common ethical issues associated with b) sharing of informationb) sharing of information issuesissues You shall not use a computer to steal.You shall not use a computer to steal. •• Do not use computer technology to steal information.Do not use computer technology to steal information. Explanation: Stealing sensitive information or leaking confidentialExplanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personalinformation is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient historyinformation of employees from an employee database or patient history from a hospital database or other such information that is meant to befrom a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect informationconfidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transferabout the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing ofof funds is a type of fraud. With the use of technology, stealing of information is much easier.information is much easier.
  • 8. Ethical Issues Associated with Usage of Computing Resources CHALLENGE : Computer Resource Abuse computer fraudcomputer fraud computer crimecomputer crime
  • 9. - Sending virus in order to hack personal information and exposing to the others. - Deleting friend's assignment document. - Look/change students' grades from the lecturers' computers.
  • 10. - Taking someone's personal information or idea to use without any approval. - Posting something like "He or she did ...." without any proves. - Cracking demo program and using it forever.
  • 11. - Using site's information and publishing a book without the source to earn benefit. - Posting New movie that just came out on Youtube. - Making program that can spy on other people's computer. - Chatting with someone using curse words.