The document discusses key ethical issues for IT organizations including the use of contingent workers, outsourcing, whistleblowing, and green computing. It describes contingent workers as temporary employees provided by contract firms. Outsourcing is defined as a long-term arrangement where a company contracts an outside organization for specific functions. The summary explains the whistleblowing process and that green computing aims to reduce hazardous materials and electricity usage while supporting reuse and recycling.
This chapter discusses key ethical issues for IT organizations, including their use of contingent workers, outsourcing, and whistleblowing policies. It covers the types of contingent workers like temporary employees and independent contractors. Offshoring is defined as outsourcing work to foreign countries to reduce costs. Whistleblowing is explained as reporting wrongdoing, and an effective process involves documentation and escalation. Green computing aims to reduce environmental impacts through initiatives like reducing hazardous materials and increasing recyclability.
This document discusses ethics for information technology (IT) professionals. It begins by outlining the chapter's objectives, which are to examine what defines an IT worker as a professional, how codes of ethics and organizations influence IT worker behavior, and the relationships IT workers must manage. It then discusses how IT workers fit some but not all criteria for professionals legally. The document also outlines the key relationships IT workers have with employers, clients, suppliers, other professionals, users, and society, and some of the ethical issues that can arise in each. Finally, it discusses how professional codes of ethics, organizations, and certification can benefit IT workers and the field.
The document discusses ethics for IT workers and users. It addresses key characteristics of professionals and whether IT workers are considered professionals. IT workers must manage relationships with employers, clients, suppliers, other professionals, users, and society. Each relationship faces ethical issues like software piracy, conflicts of interest, and information sharing. Codes of ethics, certification, licensing, and compliance programs aim to promote ethical behavior, though applying them to IT workers presents challenges due to the field's varied roles and lack of universal standards.
This chapter discusses ethics for IT workers and users. It describes how IT workers are considered professionals due to their specialized knowledge but are not legally defined as such. The chapter outlines the key relationships IT workers must manage, including with employers, clients, suppliers, other professionals, and users. It discusses ethical issues that can arise in each relationship and how codes of ethics promote compliance.
This chapter discusses ethics for IT workers and users. It defines what distinguishes a profession and examines if IT workers are considered professionals. It also explores the relationships IT workers must manage, such as with employers, clients, suppliers, and users, and the key ethical issues that can arise in each. Professional codes of ethics, organizations, certification, licensing, compliance, and how they affect ethical behavior are also covered.
A presentation on chapter 10 of Information system ethics by George W. Reynolds presented by Md. Habibur Rahman,BIT0217, Saeed Siddik, BIT 0218 and Iftekhar Ahmed, BIT0220 in Institute of Information technology, University of Dhaka.
This chapter discusses key ethical issues for IT organizations, including their use of contingent workers, outsourcing, and whistleblowing policies. It covers the types of contingent workers like temporary employees and independent contractors. Offshoring is defined as outsourcing work to foreign countries to reduce costs. Whistleblowing is explained as reporting wrongdoing, and an effective process involves documentation and escalation. Green computing aims to reduce environmental impacts through initiatives like reducing hazardous materials and increasing recyclability.
This document discusses ethics for information technology (IT) professionals. It begins by outlining the chapter's objectives, which are to examine what defines an IT worker as a professional, how codes of ethics and organizations influence IT worker behavior, and the relationships IT workers must manage. It then discusses how IT workers fit some but not all criteria for professionals legally. The document also outlines the key relationships IT workers have with employers, clients, suppliers, other professionals, users, and society, and some of the ethical issues that can arise in each. Finally, it discusses how professional codes of ethics, organizations, and certification can benefit IT workers and the field.
The document discusses ethics for IT workers and users. It addresses key characteristics of professionals and whether IT workers are considered professionals. IT workers must manage relationships with employers, clients, suppliers, other professionals, users, and society. Each relationship faces ethical issues like software piracy, conflicts of interest, and information sharing. Codes of ethics, certification, licensing, and compliance programs aim to promote ethical behavior, though applying them to IT workers presents challenges due to the field's varied roles and lack of universal standards.
This chapter discusses ethics for IT workers and users. It describes how IT workers are considered professionals due to their specialized knowledge but are not legally defined as such. The chapter outlines the key relationships IT workers must manage, including with employers, clients, suppliers, other professionals, and users. It discusses ethical issues that can arise in each relationship and how codes of ethics promote compliance.
This chapter discusses ethics for IT workers and users. It defines what distinguishes a profession and examines if IT workers are considered professionals. It also explores the relationships IT workers must manage, such as with employers, clients, suppliers, and users, and the key ethical issues that can arise in each. Professional codes of ethics, organizations, certification, licensing, compliance, and how they affect ethical behavior are also covered.
A presentation on chapter 10 of Information system ethics by George W. Reynolds presented by Md. Habibur Rahman,BIT0217, Saeed Siddik, BIT 0218 and Iftekhar Ahmed, BIT0220 in Institute of Information technology, University of Dhaka.
Module 2: Cyber-Crimes and Cyber Laws
Ethics for IT Workers and IT Users-IT Professionals-IT professional malpractice-IT , IT Act cyber
laws - Information Technology Act, 2000 (“IT Act”) - Digital Signature - Confidentiality, Integrity and Authenticity (CIA)
The document outlines the recruitment and selection process, which includes determining personnel needs through planning and forecasting, recruiting candidates from internal and external sources, screening candidates through interviews and assessments, and making offers to the best candidates. It provides details on factors to consider in personnel forecasting, effective recruitment strategies, and ensuring diversity in the hiring process. The goal of the process is to select the most qualified candidates to fill open positions.
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
1. Ethics for IT Professionals and IT Users
2. Privacy
Ethics in IT
Reference: Professional Ethics for Computer Science by Klaus Mueller (Stony Brook University)
Ethics for IT Professionals and IT Users
Objective:
• What key characteristics distinguish a professional from other
kinds of workers, and what is the role of an IT professional?
• What relationships must an IT professional manage, and what
key ethical issues can arise in each?
• How do codes of ethics, professional organizations, certification,
and licensing affect the ethical behavior of IT professionals?
• What are the key tenets of four different codes of ethics that
provide guidance for IT professionals?
• What are the common ethical issues that face IT users?
• What approaches can support the ethical practices of IT users?
2
IT Professionals
Profession is a calling that requires:
• specialized knowledge
• long and intensive academic preparation
Partial list of IT specialists:
• Programmers
• systems analysts
• software engineers
• database administrators
• local area network (LAN) administrators
• chief information officers (CIOs)
3
Are IT Workers Professionals?
Legal perspective:
• IT workers are not recognized as professionals
• Not licensed
• IT workers are not liable for malpractice
IT professionals have many different relationships with:
• Employers
• Clients and Suppliers
• Other professionals
• IT users
• Society at large
4
Relationships Between IT Professionals and Employers
IT professionals must set an example and enforce policies
regarding the ethical use of IT
Software piracy is the act of illegally making copies of
software or enabling others to access software to which they
are not entitled
Software piracy is an area in which IT professionals can be
tempted to violate laws and policies
The Business Software Alliance (BSA) is a trade group that
represents the world’s largest software and hardware
manufacturers
• its mission is to stop the unauthorized copying of software
produced by its members
• penalties can be up to $100,000 per copyrighted work
5
Relationships Between IT Professionals and Employers
Trade secret:
• information used in business
• generally unknown to the public
• company has taken strong measures to keep
confidential
• employees must sign a non-disclosure agreement
(NDA)
• problems due to high IT employee turn-over
Whistle-blowing: attracts attention to a negligent, illegal,
unethical, abusive, or dangerous act that threatens the
public interest
6
Relationships Between IT Professionals and Clients
• IT professional provides hardware, software, or services
at a certain cost and within a given time frame
• Client provides compensation, access to key contacts and
work space
• Relationship is usually documented in contractual terms
Ethical problems arise if a company recommends its own
products and services to remedy problems they detected
.
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
1. Ethics for IT Professionals and IT Users
2. Privacy
Ethics in IT
Reference: Professional Ethics for Computer Science by Klaus Mueller (Stony Brook University)
Ethics for IT Professionals and IT Users
Objective:
• What key characteristics distinguish a professional from other
kinds of workers, and what is the role of an IT professional?
• What relationships must an IT professional manage, and what
key ethical issues can arise in each?
• How do codes of ethics, professional organizations, certification,
and licensing affect the ethical behavior of IT professionals?
• What are the key tenets of four different codes of ethics that
provide guidance for IT professionals?
• What are the common ethical issues that face IT users?
• What approaches can support the ethical practices of IT users?
2
IT Professionals
Profession is a calling that requires:
• specialized knowledge
• long and intensive academic preparation
Partial list of IT specialists:
• Programmers
• systems analysts
• software engineers
• database administrators
• local area network (LAN) administrators
• chief information officers (CIOs)
3
Are IT Workers Professionals?
Legal perspective:
• IT workers are not recognized as professionals
• Not licensed
• IT workers are not liable for malpractice
IT professionals have many different relationships with:
• Employers
• Clients and Suppliers
• Other professionals
• IT users
• Society at large
4
Relationships Between IT Professionals and Employers
IT professionals must set an example and enforce policies
regarding the ethical use of IT
Software piracy is the act of illegally making copies of
software or enabling others to access software to which they
are not entitled
Software piracy is an area in which IT professionals can be
tempted to violate laws and policies
The Business Software Alliance (BSA) is a trade group that
represents the world’s largest software and hardware
manufacturers
• its mission is to stop the unauthorized copying of software
produced by its members
• penalties can be up to $100,000 per copyrighted work
5
Relationships Between IT Professionals and Employers
Trade secret:
• information used in business
• generally unknown to the public
• company has taken strong measures to keep
confidential
• employees must sign a non-disclosure agreement
(NDA)
• problems due to high IT employee turn-over
Whistle-blowing: attracts attention to a negligent, illegal,
unethical, abusive, or dangerous act that threatens the
public interest
6
Relationships Between IT Professionals and Clients
• IT professional provides hardware, software, or services
at a certain cost and within a given time frame
• Client provides compensation, access to key contacts and
work space
• Relationship is usually documented in contractual terms
Ethical problems arise if a company recommends its own
products and services to remedy problems they detected
...
This document discusses ethics for IT professionals and users. It defines IT professionals as those who meet four criteria including having specialized knowledge, creative work, exercising discretion and producing intellectual outputs. Some IT roles are legally considered professionals while others are not due to licensing. The document outlines relationships IT professionals have with employers, clients, suppliers, other professionals, users and society. It discusses codes of ethics from professional organizations like ACM, AITP, IEEE-CS and PMI which aim to improve ethical decision making and enhance public trust.
This document discusses ethics for IT professionals and users. It addresses key characteristics of IT professionals, the relationships they must manage and potential ethical issues. These include relationships with employers, clients, suppliers and other stakeholders. It also discusses codes of ethics, professional organizations, certification and licensing for IT professionals. Common ethical issues for IT users like software piracy and inappropriate information sharing are also covered, along with approaches to support ethical user practices through policies.
This document discusses recruitment and personnel planning. It covers workforce planning, forecasting personnel needs, forecasting the supply of inside and outside candidates, and internal and external sources of recruitment. Internal sources include promotions, transfers, former employees, and job postings. External sources include advertising, employment agencies, executive recruiters, campus recruitment, employee referrals, internet recruiting, and walk-ins. Advantages and disadvantages of internal and external recruitment are also presented.
The document outlines the top 10 IT trends and priorities for 2014 that CIOs should focus on to maximize their impact, including: choosing the right technology partners, attracting and retaining skills, cybersecurity and governance, enabling BYOD and mobile apps, leveraging big data analytics, improving collaboration and interoperability, preparing for cloud adoption, rethinking IT spending to focus on growth, ensuring business relevance, and reducing time to service delivery. Focusing on these key areas will allow CIOs to position IT as a strategic business enabler rather than just a cost center.
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...Axios Systems
Stephen Mann (ITSM.tools) explains how to drive IT service desk improvement through three high-value ITSM capabilities – self-service, knowledge management, and automation. And, importantly, how best to avoid the common pitfalls to delivering success. Register and watch now: https://hubs.ly/H0jnfTp0
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
Defining the B2B On-Demand and Outsourced Talent MarketCatalyst Investors
Catalyst believes that Outsourcing the Office presents a compelling market opportunity and welcomes discussion with growth-stage business services outsourcing companies.
This document discusses information systems management and the challenges associated with it. It provides a competitive forces model and total cost of ownership model that can be used to develop and manage an IT infrastructure for a multi-national insurance company. It discusses the key steps in the information systems acquisition process, including project identification and planning, IT architecture, acquisition and development options, testing installation and integration, and ongoing operations, maintenance and updating.
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
This document discusses I.T. strategy, risk management, and governance. It begins with an introduction of Steve Howse, the president of Millington & Associates, and his background. The document then discusses what I.T. strategy and governance entail and why they are important. It introduces the "20 questions" framework as a tool to assess I.T. strategy, risk, and governance. The questions are categorized into strategic issues, internal control issues, and risk issues. The document dives deeper into examples of risks and what organizations can do to address risks such as dedicating board members to I.T. committees and ensuring business continuity plans are tested.
Here are potential responses to the questions:
Regarding an overview of IT operations:
- We currently utilize [ERP application] for finance/HR functions across all departments.
- Key departmental applications include [list top 3-5].
- Email is hosted through Office 365 with [number] mailboxes.
- Server infrastructure consists of [number] physical servers virtualized with VMware. Desktops/laptops are on a 5 year refresh cycle.
- Storage is provided by [vendor] with [capacity] of on-premise storage and [capacity] of cloud-based storage.
Regarding immediate challenges:
- Aging server and storage infrastructure in need of upgrades.
-
The document discusses several topics related to enterprise IT management including:
- Problems with payroll checks at ASU and potential problems with their student information system implementation.
- Mixed reactions to ASU's implementation approach and questions that could be asked to interview subjects.
- Whether ASU's approach should be recommended to other universities.
- Requirements for selecting an ERP system and how Hunter Manufacturing could have improved their evaluation and implementation process.
- The benefits and drawbacks of open source ERP software.
- Privacy and monitoring issues from a court case on employer monitoring.
- Ethical issues from a case against iiNet for copyright infringement by users.
- Reasons for resistance in enforcing SLAs between
Chapter 10: Gathering and Using Information: Marketing Research and Market In...tjamisonedu
The document discusses marketing research and market intelligence. It defines marketing research as gathering information to help with business decisions, such as developing new products or evaluating promotions. Market intelligence involves regularly collecting information on market trends. The document outlines the components of a marketing information system and provides examples of how companies gather market intelligence from sources like trade publications and customers. It also describes best practices for conducting marketing research, such as defining the problem, designing the study, collecting and analyzing the data.
Transforming Accountancy, Insurance & Legal Services with AI & DataKTN
UK Research and Innovation will invest up to £12 million in innovation projects to support the application of artificial intelligence (AI) and data technologies. Projects should aim to transform the 3 target sectors:
Accountancy
Insurance
Legal services
Find out more: https://ktn-uk.co.uk/funding/transforming-accountancy-insurance-and-legal-services-with-ai-and-data-small-projects-strand
This webinar, from July 25, 2012, features it staffing thought leader and speaker Matthew J. Ripaldi and discusses how to get mid-market businesses to accomplish big goals while working with limited resources.
Topics discussed include:
• The impact of the economy on the job market
• The high costs of making the wrong hire
• Best practices for hiring & retaining IT talent
• Methods for incorporating metrics in an interview evaluation
This chapter discusses sources of information for making human resource decisions. It covers human resource planning, strategy, economic conditions, and job analysis. Human resource planning involves forecasting supply and demand for human resources. Strategy and economic conditions provide context for forecasting demand. Job analysis is described as a fundamental input that informs selection, performance evaluation, training, and compensation. Different techniques for conducting job analysis are also outlined.
Module 2: Cyber-Crimes and Cyber Laws
Ethics for IT Workers and IT Users-IT Professionals-IT professional malpractice-IT , IT Act cyber
laws - Information Technology Act, 2000 (“IT Act”) - Digital Signature - Confidentiality, Integrity and Authenticity (CIA)
The document outlines the recruitment and selection process, which includes determining personnel needs through planning and forecasting, recruiting candidates from internal and external sources, screening candidates through interviews and assessments, and making offers to the best candidates. It provides details on factors to consider in personnel forecasting, effective recruitment strategies, and ensuring diversity in the hiring process. The goal of the process is to select the most qualified candidates to fill open positions.
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
1. Ethics for IT Professionals and IT Users
2. Privacy
Ethics in IT
Reference: Professional Ethics for Computer Science by Klaus Mueller (Stony Brook University)
Ethics for IT Professionals and IT Users
Objective:
• What key characteristics distinguish a professional from other
kinds of workers, and what is the role of an IT professional?
• What relationships must an IT professional manage, and what
key ethical issues can arise in each?
• How do codes of ethics, professional organizations, certification,
and licensing affect the ethical behavior of IT professionals?
• What are the key tenets of four different codes of ethics that
provide guidance for IT professionals?
• What are the common ethical issues that face IT users?
• What approaches can support the ethical practices of IT users?
2
IT Professionals
Profession is a calling that requires:
• specialized knowledge
• long and intensive academic preparation
Partial list of IT specialists:
• Programmers
• systems analysts
• software engineers
• database administrators
• local area network (LAN) administrators
• chief information officers (CIOs)
3
Are IT Workers Professionals?
Legal perspective:
• IT workers are not recognized as professionals
• Not licensed
• IT workers are not liable for malpractice
IT professionals have many different relationships with:
• Employers
• Clients and Suppliers
• Other professionals
• IT users
• Society at large
4
Relationships Between IT Professionals and Employers
IT professionals must set an example and enforce policies
regarding the ethical use of IT
Software piracy is the act of illegally making copies of
software or enabling others to access software to which they
are not entitled
Software piracy is an area in which IT professionals can be
tempted to violate laws and policies
The Business Software Alliance (BSA) is a trade group that
represents the world’s largest software and hardware
manufacturers
• its mission is to stop the unauthorized copying of software
produced by its members
• penalties can be up to $100,000 per copyrighted work
5
Relationships Between IT Professionals and Employers
Trade secret:
• information used in business
• generally unknown to the public
• company has taken strong measures to keep
confidential
• employees must sign a non-disclosure agreement
(NDA)
• problems due to high IT employee turn-over
Whistle-blowing: attracts attention to a negligent, illegal,
unethical, abusive, or dangerous act that threatens the
public interest
6
Relationships Between IT Professionals and Clients
• IT professional provides hardware, software, or services
at a certain cost and within a given time frame
• Client provides compensation, access to key contacts and
work space
• Relationship is usually documented in contractual terms
Ethical problems arise if a company recommends its own
products and services to remedy problems they detected
.
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
1. Ethics for IT Professionals and IT Users
2. Privacy
Ethics in IT
Reference: Professional Ethics for Computer Science by Klaus Mueller (Stony Brook University)
Ethics for IT Professionals and IT Users
Objective:
• What key characteristics distinguish a professional from other
kinds of workers, and what is the role of an IT professional?
• What relationships must an IT professional manage, and what
key ethical issues can arise in each?
• How do codes of ethics, professional organizations, certification,
and licensing affect the ethical behavior of IT professionals?
• What are the key tenets of four different codes of ethics that
provide guidance for IT professionals?
• What are the common ethical issues that face IT users?
• What approaches can support the ethical practices of IT users?
2
IT Professionals
Profession is a calling that requires:
• specialized knowledge
• long and intensive academic preparation
Partial list of IT specialists:
• Programmers
• systems analysts
• software engineers
• database administrators
• local area network (LAN) administrators
• chief information officers (CIOs)
3
Are IT Workers Professionals?
Legal perspective:
• IT workers are not recognized as professionals
• Not licensed
• IT workers are not liable for malpractice
IT professionals have many different relationships with:
• Employers
• Clients and Suppliers
• Other professionals
• IT users
• Society at large
4
Relationships Between IT Professionals and Employers
IT professionals must set an example and enforce policies
regarding the ethical use of IT
Software piracy is the act of illegally making copies of
software or enabling others to access software to which they
are not entitled
Software piracy is an area in which IT professionals can be
tempted to violate laws and policies
The Business Software Alliance (BSA) is a trade group that
represents the world’s largest software and hardware
manufacturers
• its mission is to stop the unauthorized copying of software
produced by its members
• penalties can be up to $100,000 per copyrighted work
5
Relationships Between IT Professionals and Employers
Trade secret:
• information used in business
• generally unknown to the public
• company has taken strong measures to keep
confidential
• employees must sign a non-disclosure agreement
(NDA)
• problems due to high IT employee turn-over
Whistle-blowing: attracts attention to a negligent, illegal,
unethical, abusive, or dangerous act that threatens the
public interest
6
Relationships Between IT Professionals and Clients
• IT professional provides hardware, software, or services
at a certain cost and within a given time frame
• Client provides compensation, access to key contacts and
work space
• Relationship is usually documented in contractual terms
Ethical problems arise if a company recommends its own
products and services to remedy problems they detected
...
This document discusses ethics for IT professionals and users. It defines IT professionals as those who meet four criteria including having specialized knowledge, creative work, exercising discretion and producing intellectual outputs. Some IT roles are legally considered professionals while others are not due to licensing. The document outlines relationships IT professionals have with employers, clients, suppliers, other professionals, users and society. It discusses codes of ethics from professional organizations like ACM, AITP, IEEE-CS and PMI which aim to improve ethical decision making and enhance public trust.
This document discusses ethics for IT professionals and users. It addresses key characteristics of IT professionals, the relationships they must manage and potential ethical issues. These include relationships with employers, clients, suppliers and other stakeholders. It also discusses codes of ethics, professional organizations, certification and licensing for IT professionals. Common ethical issues for IT users like software piracy and inappropriate information sharing are also covered, along with approaches to support ethical user practices through policies.
This document discusses recruitment and personnel planning. It covers workforce planning, forecasting personnel needs, forecasting the supply of inside and outside candidates, and internal and external sources of recruitment. Internal sources include promotions, transfers, former employees, and job postings. External sources include advertising, employment agencies, executive recruiters, campus recruitment, employee referrals, internet recruiting, and walk-ins. Advantages and disadvantages of internal and external recruitment are also presented.
The document outlines the top 10 IT trends and priorities for 2014 that CIOs should focus on to maximize their impact, including: choosing the right technology partners, attracting and retaining skills, cybersecurity and governance, enabling BYOD and mobile apps, leveraging big data analytics, improving collaboration and interoperability, preparing for cloud adoption, rethinking IT spending to focus on growth, ensuring business relevance, and reducing time to service delivery. Focusing on these key areas will allow CIOs to position IT as a strategic business enabler rather than just a cost center.
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...Axios Systems
Stephen Mann (ITSM.tools) explains how to drive IT service desk improvement through three high-value ITSM capabilities – self-service, knowledge management, and automation. And, importantly, how best to avoid the common pitfalls to delivering success. Register and watch now: https://hubs.ly/H0jnfTp0
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
Defining the B2B On-Demand and Outsourced Talent MarketCatalyst Investors
Catalyst believes that Outsourcing the Office presents a compelling market opportunity and welcomes discussion with growth-stage business services outsourcing companies.
This document discusses information systems management and the challenges associated with it. It provides a competitive forces model and total cost of ownership model that can be used to develop and manage an IT infrastructure for a multi-national insurance company. It discusses the key steps in the information systems acquisition process, including project identification and planning, IT architecture, acquisition and development options, testing installation and integration, and ongoing operations, maintenance and updating.
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
This document discusses I.T. strategy, risk management, and governance. It begins with an introduction of Steve Howse, the president of Millington & Associates, and his background. The document then discusses what I.T. strategy and governance entail and why they are important. It introduces the "20 questions" framework as a tool to assess I.T. strategy, risk, and governance. The questions are categorized into strategic issues, internal control issues, and risk issues. The document dives deeper into examples of risks and what organizations can do to address risks such as dedicating board members to I.T. committees and ensuring business continuity plans are tested.
Here are potential responses to the questions:
Regarding an overview of IT operations:
- We currently utilize [ERP application] for finance/HR functions across all departments.
- Key departmental applications include [list top 3-5].
- Email is hosted through Office 365 with [number] mailboxes.
- Server infrastructure consists of [number] physical servers virtualized with VMware. Desktops/laptops are on a 5 year refresh cycle.
- Storage is provided by [vendor] with [capacity] of on-premise storage and [capacity] of cloud-based storage.
Regarding immediate challenges:
- Aging server and storage infrastructure in need of upgrades.
-
The document discusses several topics related to enterprise IT management including:
- Problems with payroll checks at ASU and potential problems with their student information system implementation.
- Mixed reactions to ASU's implementation approach and questions that could be asked to interview subjects.
- Whether ASU's approach should be recommended to other universities.
- Requirements for selecting an ERP system and how Hunter Manufacturing could have improved their evaluation and implementation process.
- The benefits and drawbacks of open source ERP software.
- Privacy and monitoring issues from a court case on employer monitoring.
- Ethical issues from a case against iiNet for copyright infringement by users.
- Reasons for resistance in enforcing SLAs between
Chapter 10: Gathering and Using Information: Marketing Research and Market In...tjamisonedu
The document discusses marketing research and market intelligence. It defines marketing research as gathering information to help with business decisions, such as developing new products or evaluating promotions. Market intelligence involves regularly collecting information on market trends. The document outlines the components of a marketing information system and provides examples of how companies gather market intelligence from sources like trade publications and customers. It also describes best practices for conducting marketing research, such as defining the problem, designing the study, collecting and analyzing the data.
Transforming Accountancy, Insurance & Legal Services with AI & DataKTN
UK Research and Innovation will invest up to £12 million in innovation projects to support the application of artificial intelligence (AI) and data technologies. Projects should aim to transform the 3 target sectors:
Accountancy
Insurance
Legal services
Find out more: https://ktn-uk.co.uk/funding/transforming-accountancy-insurance-and-legal-services-with-ai-and-data-small-projects-strand
This webinar, from July 25, 2012, features it staffing thought leader and speaker Matthew J. Ripaldi and discusses how to get mid-market businesses to accomplish big goals while working with limited resources.
Topics discussed include:
• The impact of the economy on the job market
• The high costs of making the wrong hire
• Best practices for hiring & retaining IT talent
• Methods for incorporating metrics in an interview evaluation
This chapter discusses sources of information for making human resource decisions. It covers human resource planning, strategy, economic conditions, and job analysis. Human resource planning involves forecasting supply and demand for human resources. Strategy and economic conditions provide context for forecasting demand. Job analysis is described as a fundamental input that informs selection, performance evaluation, training, and compensation. Different techniques for conducting job analysis are also outlined.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
2. Objectives
• As you read this chapter, consider the following
questions:
– What are contingent workers, and how are they
employed in the information technology industry?
– What key ethical issues are associated with the use
of contingent workers, including H-1B visa holders
and offshore outsourcing companies?
– What is whistle-blowing, and what ethical issues are
associated with it?
Ethics in Information Technology, Fourth Edition 2
3. Ethics in Information Technology, Fourth Edition 3
Objectives (cont’d.)
– What is an effective whistle-blowing process?
– What measures are members of the electronics
manufacturing industry taking to ensure the ethical
behavior of the many participants in their long and
complex supply chains?
– What is green computing, and what are organizations
doing to support this initiative?
4. Key Ethical Issues for Organizations
• Ethical topics are pertinent to organizations in the
IT industry and organizations that make use of IT
– Use of nontraditional workers
– Whistle-blowing
– Green computing
– ICT code of ethics
Ethics in Information Technology, Fourth Edition 4
5. The Need for Nontraditional Workers
• Bureau of Labor Statistics (BLS) forecast
– Network systems and data communications analysts
will be 2nd fastest growing occupation from 2008-
2018
– Employment of computer software engineers will
grow 34%
• Concern about a shortfall in the number of U.S.
workers to fill these positions
• Several IT positions in the top-ten paid majors for
2010-2011 bachelor’s degree graduates
Ethics in Information Technology, Fourth Edition 5
6. The Need for Nontraditional Workers
(cont’d.)
• Long-term shortage of IT workers
– Employers turning to nontraditional sources
• Sources include:
– Contingent workers
– H-1B workers
– Outsourced offshore workers
• Ethical decisions about whether to:
– Recruit new/more workers from these sources
– Develop their own staff to meet their needs
Ethics in Information Technology, Fourth Edition 6
7. Ethics in Information Technology, Fourth Edition 7
Contingent Workers
• Contingent work is a job situation in which an
individual does not have an explicit or implicit
contract for long-term employment
• Contingent workers include:
– Independent contractors
– Temporary workers through employment agencies
– On-call or day laborers
– On-site workers provided by contract firms
• Needed for pronounced IT staffing fluctuations
• Workers hired for the life of the project only
8. Ethics in Information Technology, Fourth Edition 8
Contingent Workers (cont’d.)
• Sources
– Temporary agencies
– Employee leasing
– Consulting organizations
• Firms that provide temporary help:
– Recruit, train, and test their employees in a wide
range of job categories and skill levels
– Assign them to clients
10. Ethics in Information Technology, Fourth Edition 10
Contingent Workers (cont’d.)
• Employee leasing
– Business outsources all or part of its workforce to a
professional employer organization
– Subject to special regulations regarding workers’
compensation and unemployment insurance
• Coemployment relationship
– Two employers have actual or potential legal rights
and duties with respect to the same employee or
group of employees
11. Contingent Workers (cont’d.)
• Advantages of using contingent workers
– Business does not pay for benefits
– Can continually adjust the number of contingent
workers to stay consistent with its business needs
– Does not customarily incur training costs
Ethics in Information Technology, Fourth Edition 11
12. Ethics in Information Technology, Fourth Edition 12
Contingent Workers (cont’d.)
• Disadvantages of using contingent workers
– Workers may lack a strong relationship with the firm
• Low commitment to the company and its projects
• High turnover rate
– Workers gain valuable practical experience working
within a company’s structure and culture
• Lost when workers depart at the project’s completion
13. Ethics in Information Technology, Fourth Edition 13
Contingent Workers (cont’d.)
• When deciding to use contingent workers:
– Recognize the trade-off between:
• Completing a single project quickly and cheaply
• Developing people in the organization
– When staffing is truly temporary:
• Use of contingent workers is a good approach
– Think twice about using contingent workers:
• When they are likely to learn corporate processes and
strategies that are key to the company’s success
– Worker’s next assignment may be with major
competitor
14. Ethics in Information Technology, Fourth Edition 14
Contingent Workers (cont’d.)
• Deciding when to use contingent workers
– Can raise ethical and legal issues
– Potential liability for:
• Withholding payroll taxes
• Payment of employee retirement benefits
• Payment of health insurance premiums
• Administration of workers’ compensation
15. Ethics in Information Technology, Fourth Edition 15
Contingent Workers (cont’d.)
• Deciding when to use contingent workers (cont’d.)
– Can be viewed as permanent employees by:
• Internal Revenue Service
• Labor Department
• State workers’ compensation agency
• State unemployment agencies
– Vizcaino v. Microsoft lawsuit
• Deciding factor is degree of control company
exercises over employees
• Employers must exercise care in the treatment of
contingent workers
17. Ethics in Information Technology, Fourth Edition 17
H-1B Workers
• Temporary work visa
– U.S. Citizenship and Immigration Services (USCIS)
– For people who work in specialty occupations
• H-1B workers
– Meet critical business needs
– Have essential technical skills and knowledge not
readily found in the U.S.
– Employers must pay H-1B workers the prevailing
wage for the work being performed
18. Ethics in Information Technology, Fourth Edition 18
H-1B Workers (cont’d.)
• Maximum continuous period of six years
– After six years, the foreign worker must remain
outside the United States for one year before
another H-1B petition can be approved
• Continued use of H-1B workers
– Symptom of a larger, more fundamental problem
– U.S. not developing sufficient IT employees
19. Ethics in Information Technology, Fourth Edition 19
H-1B Workers (cont’d.)
• Top five outsourcing countries
– India
– China
– Canada
– Philippines
– Korea
• Federal cap of 65,000 for number of H-1B visas
– Applies only to certain IT professionals
– Large number of workers are exempt from cap
20. Ethics in Information Technology, Fourth Edition 20
H-1B Workers (cont’d.)
• English as a second language
– Workers who are not fluent in English:
• May find it difficult and uncomfortable to participate
• May create their own cliques
• May stop trying to acclimate
• Can hurt a project team’s morale and lead to division
• Managers and coworkers should:
– Strive to help improve H-1B workers’ English skills
and cultural understanding
– Be sensitive to workers’ heritage and needs
21. Ethics in Information Technology, Fourth Edition 21
H-1B Workers (cont’d.)
• H-1B application process
– Employer making job offer must also offer
sponsorship
– Application has two stages
• Labor Condition Attestation (LCA)
• H-1B visa application
– If H-1B are more than 15% percent of company’s
workforce:
• Must prove that it first tried to find U.S. workers
• Must prove not hiring H-1B after laying off similar U.S.
worker
22. H-1B Workers (cont’d.)
• American Competitiveness in the Twenty-First
Century Act (2000)
– Allows current H-1B holders to start working for
employers as soon as their petitions are filed
• Using H-1B workers instead of U.S. workers
– Good for short-term hiring
– Long-term hiring
• Lessens incentive to educate and develop U.S.
workforces
• Does nothing to develop strong core of permanent
U.S. IT workers needed in future
Ethics in Information Technology, Fourth Edition 22
23. Ethics in Information Technology, Fourth Edition 23
H-1B Workers (cont’d.)
• Potential exploitation of H-1B workers
– Salary abuse by unethical companies
– Some H1-B workers are paid $10,000 to $30,000
less than U.S. workers in the same job
– Visa Reform Act (2004)
• Defined a modified wage-rate system
– At end of the six-year visa term:
• If no green card, firm loses worker
• Suddenly unemployed worker must return home
24. B - 1 Visa Controversy
• B-1 visitor visa for people who wish to enter U.S.
temporarily:
– For pleasure or medical treatment
– To travel for short periods of time to consult with
business associates; attend convention or
conference; negotiate a contract; or install or
maintain machinery
• B-1 visa faster, easier, and cheaper to obtain
– Lot of gray area in the use of B-1 visas
Ethics in Information Technology, Fourth Edition 24
25. Outsourcing
• Outsourcing
– Approach to meeting staffing needs
– Long-term business arrangement
• Company contracts with an outside organization that
has expertise in providing a specific function
• Rationale
– Coemployment legal problems are minimal
– Lower costs
– Obtain strategic flexibility
– Keep staff focused on core competencies
Ethics in Information Technology, Fourth Edition 25
26. Ethics in Information Technology, Fourth Edition 26
Offshore Outsourcing
• Variation of outsourcing
– Services provided by an organization whose
employees are in a foreign country
• Companies reduce labor costs
• Increasing in IT industry
• As key processes move offshore, U.S. IT providers
are forced to lower prices
• Common to use offshore outsourcing for major
programming projects
30. Ethics in Information Technology, Fourth Edition 30
Offshore Outsourcing (cont’d.)
• Pros and cons of offshore outsourcing
– Low wages
• Demand for offshoring driving up salaries
– Dramatically speeds up development efforts
• Make progress on a project around the clock
– Can also result in new expenses
• Additional time to select an offshore vendor
• Additional costs for travel and communications
– Same ethical issues as H1-B and contingent workers
– Difficulty of communications over long distances and
differences in culture and language
31. Ethics in Information Technology, Fourth Edition 31
Offshore Outsourcing (cont’d.)
• Strategies for successful offshore outsourcing
– Expertise in technologies involved in the project
– Project manager speaks native language of
employer
– Large staff available
– State-of-the-art telecommunications setup
– High-quality on-site managers and supervisors
32. Ethics in Information Technology, Fourth Edition 32
Whistle-Blowing
• Effort to attract public attention to a negligent,
illegal, unethical, abusive, or dangerous act by a
company
• Whistle-blower
– Usually has personal or special knowledge
– Risks own career
– Might even affect lives of friends and family
– Must choose between protecting society and
remaining silent
33. Ethics in Information Technology, Fourth Edition 33
Whistle-Blowing (cont’d.)
• Protection laws allow employees to alert authorities
to employer actions that are unethical, illegal, or
unsafe or that violate specific public policies
– No comprehensive federal law
– Each law has different:
• Filing provisions
• Administrative and judicial remedies
• Statutes of limitations
34. Ethics in Information Technology, Fourth Edition 34
Whistle-Blowing (cont’d.)
• False Claims Act (“Lincoln Law”)
– Enacted during the Civil War
– Enticed whistle-blowers to come forward
– Offered a share of the money recovered
• Qui tam provision allows private citizen to file in
name of government
• Violators are liable for three times the dollar
amount the government is defrauded
• Provides strong whistle-blower protection
• Complexity requires advice of an attorney
35. Whistle-Blowing (cont’d.)
• Whistle-blower protection for private-sector workers
– Many states, not all, have laws that prevent workers
from being fired because of an employee’s
participation in “protected” activities
• Whistle-blowers can file claims against their
employers for retaliatory termination
• Whistle-blowers are entitled to jury trials
• If successful at trial, can receive punitive damage
awards
Ethics in Information Technology, Fourth Edition 35
36. Whistle-Blowing (cont’d.)
• Dealing with a whistle-blowing situation
– Assess the seriousness of the situation
– Begin documentation
– Attempt to address the situation internally
– Consider escalating the situation within the company
– Assess implications of becoming a whistle-blower
– Use experienced resources to develop action plan
– Execute the action plan
– Live with the consequences
Ethics in Information Technology, Fourth Edition 36
37. Green Computing
• To manufacture truly “green” products, companies
must:
– Produce product that requires less electricity
– Reduce the amount of hazardous materials used
– Increase amount of reusable or recyclable materials
– Help consumers dispose of their products in an
environmentally safe manner at the end of the
product’s useful life
Ethics in Information Technology, Fourth Edition 37
38. Green Computing (cont’d.)
• Personal computers and cell phones contain
thousands of components composed of many
different materials
– Some harmful to humans and environment
– Workers along the entire supply chain at risk
– Users can also be exposed to these materials
Ethics in Information Technology, Fourth Edition 38
39. Green Computing (cont’d.)
• EPEAT (Electronic Product Environmental
Assessment Tool)
– Enables purchasers to evaluate, compare, and
select electronic products
• Based on a total of 51 environmental criteria
• Products are ranked in three tiers of environmental
performance
• European Restriction of Hazardous Substances
Directive
– Restricts use of many hazardous materials in
computer manufacturing
Ethics in Information Technology, Fourth Edition 39
40. Green Computing (cont’d.)
• How to safely dispose of obsolete computers
– Many states have recycling programs
– Some manufacturers have developed programs
• Greenpeace environmental activist organization
– Issues quarterly ratings of manufacturers according
to the manufacturers’ policies on toxic chemicals,
recycling, and climate change
• Manufacturers have long way to go to meet the high
standards
Ethics in Information Technology, Fourth Edition 40
41. ICT Industry Code of Conduct
• Electronic Industry Citizenship Coalition (EICC)
– Promotes common code of conduct for ICT industry
– Focuses on the areas of:
• Worker safety and fairness
• Environmental responsibility
• Business efficiency
– Coalition membership is voluntary
• Code of conduct defines performance, compliance,
auditing, and reporting guidelines across five areas
of social responsibility
Ethics in Information Technology, Fourth Edition 41
42. ICT Industry Code of Conduct (cont’d.)
• Guiding principles of social responsibility
– Labor
• Must uphold the human rights of workers
– Health and safety
• Must provide safe and healthy work environment
– Environment
• Adverse effects minimized
– Management system
• Ensures compliance with code
– Ethics
• Must uphold the highest standards of ethics
Ethics in Information Technology, Fourth Edition 42
43. Ethics in Information Technology, Fourth Edition 43
Summary
• Contingent workforce includes:
– Independent contractors
– Temporary workers through employment agencies
– On-call or day laborers
– On-site workers provided by contract firms
• Outsourcing
– Long-term business arrangement
– Contract for services with outside organization
– Expertise in providing a specific function
44. Summary (cont’d.)
• Whistle-blowing
– Effort to attract public attention to negligent, illegal,
unethical, abusive, or dangerous acts by company
– Whistle-blowing process
• Assess the seriousness of the situation
• Begin documentation
• Attempt to address the situation internally
• Consider escalating the situation within the company
• Assess the implications of becoming a whistle-blower
• Use experienced resources to develop an action plan
• Execute the action plan
• Live with the consequences
Ethics in Information Technology, Fourth Edition 44
45. Summary (cont’d.)
• Green computers
– Use less electricity
– Include fewer hazardous materials
– Contain reusable or recyclable material
• Manufacturers must help consumers:
– Dispose of products in an environmentally safe
manner at the end of the product’s useful life
• EPEAT (Electronic Product Assessment Tool)
– Purchasers can evaluate, compare, and select
– Based on 51 environmental criteria
Ethics in Information Technology, Fourth Edition 45