SlideShare a Scribd company logo
1 of 13
Download to read offline
Computer Ethics & Society
Chapter # 1
Overview of Ethics
Prepared by: Shahid Hussain
Ethics in information technology by George W. Reynolds
What is Ethics?
• Each society forms a set of rules that establishes the
boundaries of generally accepted behavior. These rules are
often expressed in statements about how people should
behave, and they fit together to form the moral code by
which a society lives.
• The term morality refers to social conventions about right and
wrong those are so widely shared that they become the basis
for an established consensus.
Definition of Ethics & other terms
• Ethics is a set of beliefs about right and wrong behavior within
a society.
• Ethical behavior conforms to generally accepted norms—
many of which are almost universal.
• Virtues are habits that incline people to do what is
acceptable.
• Vices are habits of unacceptable behavior.
The Difference Between Morals, Ethics, and Laws
• Morals are one’s personal beliefs about right and wrong.
• The term ethics describes standards or codes of behavior expected
of an individual by a group (nation, organization, profession) to
which an individual belongs.
• Law is a system of rules that tells us what we can and cannot do.
Laws are enforced by a set of institutions (the police, courts, law-
making bodies).
• Legal acts are acts that conform to the law. Moral acts conform to
what an individual believes to be the right thing to do.
ETHICS IN THE BUSINESS WORLD
• Ethics has risen to the top of the business
agenda because the risks associated with
inappropriate behavior have increased, both
in their likelihood and in their potential
negative impact.
Why Fostering Good Business Ethics Is Important
• Organizations have at least five good reasons for promoting
a work environment in which employees are encouraged to
act ethically when making business decisions:
1. Gaining the good will of the community
2. Creating an organization that operates consistently
3. Fostering good business practices
4. Protecting the organization and its employees from legal
action
5. Avoiding unfavorable publicity
Characteristics of a successful ethical program
The Ethics Resource Center has defined the following
characteristics of a successful ethics program:
1. Employees are willing to seek advice about ethics
issues.
2. Employees feel prepared to handle situations that
could lead to misconduct.
3. Employees are rewarded for ethical behavior.
4. The organization does not reward success obtained
through questionable means.
5. Employees feel positively about their company.
Improving Corporate Ethics
• The risk of unethical behavior is increasing, so the improvement of
business ethics is becoming more important. The following sections
explain some of the actions corporations can take to improve
business ethics.
1) Appointing a Corporate Ethics Officer
2) Ethical Standards Set by Board of Directors
3) Establishing a Corporate Code of Ethics
4) Conducting Social Audits
5) Requiring Employees to Take Ethics Training
6) Including Ethical Criteria in Employee Appraisals
Creating an Ethical Work Environment
Including Ethical Considerations in Decision Making
Four common approaches to ethical decision making
• Virtue Ethics Approach
• The virtue ethics approach to decision making focuses on how you should
behave and think about relationships if you are concerned with your daily
life in a community.
• Utilitarian Approach
• The utilitarian approach to ethical decision making states that you should
choose the action or policy that has the best overall consequences for all
people who are directly or indirectly affected.
• Fairness Approach
• The fairness approach focuses on how fairly actions and policies distribute
benefits and burdens among people affected by the decision. The guiding
principle of this approach is to treat all people the same.
• Common Good Approach
• The common good approach to decision making is based on a vision of
society as a community whose members work together to achieve a
common set of values and goals.
ETHICS IN INFORMATION TECHNOLOGY
Here are some examples that raise public concern about the ethical use of
information technology:
• Many employees might have their e-mail and Internet access monitored
while at work, as employers struggle to balance their need to manage
important company assets and work time with employees’ desire for
privacy and self-direction.
• Millions of people have downloaded music and movies at no charge and in
apparent violation of copyright laws at tremendous expense to the owners
of those copyrights.
• Organizations contact millions of people worldwide through unsolicited e-
mail (spam) as an extremely low-cost marketing approach.
• Hackers break into databases of financial and retail institutions to steal
customer information, and then use it to commit identity theft—opening
new accounts and charging purchases to unsuspecting victims.
• Students around the world have been caught downloading material from
the Web and plagiarizing content for their term papers.
• Web sites plant cookies or spyware on visitors’ hard drives to track their
online purchases and activities.
Question & Answer
Session

More Related Content

Similar to Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf

Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) - YUSRA FERNANDO
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01stanbridge
 
Basic principles ethics and business
Basic principles ethics and businessBasic principles ethics and business
Basic principles ethics and businessJubayer Alam Shoikat
 
Managerial ethics and corporate social responsibility
Managerial ethics and corporate social responsibilityManagerial ethics and corporate social responsibility
Managerial ethics and corporate social responsibilityKnight1040
 
Lecture 7 industry studies student
Lecture 7   industry studies studentLecture 7   industry studies student
Lecture 7 industry studies studentmoduledesign
 
Lecture 7 industry studies student
Lecture 7   industry studies studentLecture 7   industry studies student
Lecture 7 industry studies studentmoduledesign
 
IBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptx
IBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptxIBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptx
IBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptxReylonTungol1
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business EthicsSaqib Raza
 
Introduction to management groups g - i - managerial ethics and corporate s...
Introduction to management   groups g - i - managerial ethics and corporate s...Introduction to management   groups g - i - managerial ethics and corporate s...
Introduction to management groups g - i - managerial ethics and corporate s...Diego Thomas
 

Similar to Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf (20)

lecture 1234.ppt
lecture 1234.pptlecture 1234.ppt
lecture 1234.ppt
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
business ethics
business ethicsbusiness ethics
business ethics
 
Ch 1.pptx
Ch 1.pptxCh 1.pptx
Ch 1.pptx
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01
 
chapter01
chapter01chapter01
chapter01
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethics
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
Basic principles ethics and business
Basic principles ethics and businessBasic principles ethics and business
Basic principles ethics and business
 
Managerial ethics and corporate social responsibility
Managerial ethics and corporate social responsibilityManagerial ethics and corporate social responsibility
Managerial ethics and corporate social responsibility
 
Lecture 7 industry studies student
Lecture 7   industry studies studentLecture 7   industry studies student
Lecture 7 industry studies student
 
Lecture 7 industry studies student
Lecture 7   industry studies studentLecture 7   industry studies student
Lecture 7 industry studies student
 
Suza dds 05 ethics and development show
Suza dds 05 ethics and development   showSuza dds 05 ethics and development   show
Suza dds 05 ethics and development show
 
BE&CG.pptx
BE&CG.pptxBE&CG.pptx
BE&CG.pptx
 
BE&CG.pptx
BE&CG.pptxBE&CG.pptx
BE&CG.pptx
 
IBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptx
IBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptxIBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptx
IBT LESSON 5 ETHICS, CORPORATE SOCIAL RESPONSIBILITY & SUSTAINABILITY.pptx
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
 
Introduction to management groups g - i - managerial ethics and corporate s...
Introduction to management   groups g - i - managerial ethics and corporate s...Introduction to management   groups g - i - managerial ethics and corporate s...
Introduction to management groups g - i - managerial ethics and corporate s...
 

More from FahmiOlayah

Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...FahmiOlayah
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
 
endoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with Microcontrollerpptendoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with MicrocontrollerpptFahmiOlayah
 
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptxfffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptxFahmiOlayah
 
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...FahmiOlayah
 
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdfTRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdfFahmiOlayah
 
10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.ppt10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.pptFahmiOlayah
 
SAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use themSAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use themFahmiOlayah
 
11Jaundice is one of the most common conditions requiring medical attention...
11Jaundice is one of the most  common conditions requiring medical  attention...11Jaundice is one of the most  common conditions requiring medical  attention...
11Jaundice is one of the most common conditions requiring medical attention...FahmiOlayah
 
Phototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptxPhototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptxFahmiOlayah
 
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptxFahmiOlayah
 
L4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptxL4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptxFahmiOlayah
 
L9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptxL9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptxFahmiOlayah
 
60Click to edit Master title style467.ppt
60Click to edit Master title style467.ppt60Click to edit Master title style467.ppt
60Click to edit Master title style467.pptFahmiOlayah
 
Click to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title styleClick to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title styleFahmiOlayah
 

More from FahmiOlayah (15)

Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
endoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with Microcontrollerpptendoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with Microcontrollerppt
 
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptxfffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
 
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
 
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdfTRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
 
10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.ppt10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.ppt
 
SAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use themSAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use them
 
11Jaundice is one of the most common conditions requiring medical attention...
11Jaundice is one of the most  common conditions requiring medical  attention...11Jaundice is one of the most  common conditions requiring medical  attention...
11Jaundice is one of the most common conditions requiring medical attention...
 
Phototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptxPhototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptx
 
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
 
L4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptxL4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptx
 
L9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptxL9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptx
 
60Click to edit Master title style467.ppt
60Click to edit Master title style467.ppt60Click to edit Master title style467.ppt
60Click to edit Master title style467.ppt
 
Click to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title styleClick to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title style
 

Recently uploaded

05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawlmakika9823
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 

Recently uploaded (20)

05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 

Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf

  • 1. Computer Ethics & Society Chapter # 1 Overview of Ethics Prepared by: Shahid Hussain Ethics in information technology by George W. Reynolds
  • 2. What is Ethics? • Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the moral code by which a society lives. • The term morality refers to social conventions about right and wrong those are so widely shared that they become the basis for an established consensus.
  • 3. Definition of Ethics & other terms • Ethics is a set of beliefs about right and wrong behavior within a society. • Ethical behavior conforms to generally accepted norms— many of which are almost universal. • Virtues are habits that incline people to do what is acceptable. • Vices are habits of unacceptable behavior.
  • 4. The Difference Between Morals, Ethics, and Laws • Morals are one’s personal beliefs about right and wrong. • The term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs. • Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law- making bodies). • Legal acts are acts that conform to the law. Moral acts conform to what an individual believes to be the right thing to do.
  • 5. ETHICS IN THE BUSINESS WORLD • Ethics has risen to the top of the business agenda because the risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact.
  • 6. Why Fostering Good Business Ethics Is Important • Organizations have at least five good reasons for promoting a work environment in which employees are encouraged to act ethically when making business decisions: 1. Gaining the good will of the community 2. Creating an organization that operates consistently 3. Fostering good business practices 4. Protecting the organization and its employees from legal action 5. Avoiding unfavorable publicity
  • 7. Characteristics of a successful ethical program The Ethics Resource Center has defined the following characteristics of a successful ethics program: 1. Employees are willing to seek advice about ethics issues. 2. Employees feel prepared to handle situations that could lead to misconduct. 3. Employees are rewarded for ethical behavior. 4. The organization does not reward success obtained through questionable means. 5. Employees feel positively about their company.
  • 8. Improving Corporate Ethics • The risk of unethical behavior is increasing, so the improvement of business ethics is becoming more important. The following sections explain some of the actions corporations can take to improve business ethics. 1) Appointing a Corporate Ethics Officer 2) Ethical Standards Set by Board of Directors 3) Establishing a Corporate Code of Ethics 4) Conducting Social Audits 5) Requiring Employees to Take Ethics Training 6) Including Ethical Criteria in Employee Appraisals
  • 9. Creating an Ethical Work Environment
  • 10. Including Ethical Considerations in Decision Making
  • 11. Four common approaches to ethical decision making • Virtue Ethics Approach • The virtue ethics approach to decision making focuses on how you should behave and think about relationships if you are concerned with your daily life in a community. • Utilitarian Approach • The utilitarian approach to ethical decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected. • Fairness Approach • The fairness approach focuses on how fairly actions and policies distribute benefits and burdens among people affected by the decision. The guiding principle of this approach is to treat all people the same. • Common Good Approach • The common good approach to decision making is based on a vision of society as a community whose members work together to achieve a common set of values and goals.
  • 12. ETHICS IN INFORMATION TECHNOLOGY Here are some examples that raise public concern about the ethical use of information technology: • Many employees might have their e-mail and Internet access monitored while at work, as employers struggle to balance their need to manage important company assets and work time with employees’ desire for privacy and self-direction. • Millions of people have downloaded music and movies at no charge and in apparent violation of copyright laws at tremendous expense to the owners of those copyrights. • Organizations contact millions of people worldwide through unsolicited e- mail (spam) as an extremely low-cost marketing approach. • Hackers break into databases of financial and retail institutions to steal customer information, and then use it to commit identity theft—opening new accounts and charging purchases to unsuspecting victims. • Students around the world have been caught downloading material from the Web and plagiarizing content for their term papers. • Web sites plant cookies or spyware on visitors’ hard drives to track their online purchases and activities.