SlideShare a Scribd company logo
Ethical Implications of IT
Group # 03
Shahnawaz Salamat 04, Waqar Anwar 05, Waleed Imtiaz 10
M. Irfan Shahid 12, Hafiz M. Mustghas, Sajid Ali 27
BBA-8th Morning
University of Education, Okara Campus
University of Education, Okara Campus
Learning Objectives:
 Understand the distinction among morals, ethics, and laws.
 Be familiar with the most important computer legislation that has
been passed in the U. S., and know how legislation in one
country can influence computer use in others as well.
 Know how a firm creates an ethics culture by first establishing a
corporate credo, then establishing ethics programs, and lastly
establishing a corporate ethics code.
 Know why society demands that computers be used ethically.
 Know the four basic rights that society has concerning the
computer.
 Be aware of computer industry codes of ethics, and the wide
variety of educational programs that can help firms and
employees use computers ethically
2
University of Education, Okara Campus
Introduction:
 Firms have an obligation to establish an ethical culture for
their employees to follow that is supported by a corporate
credo and ethics programs
 Computer ethics are important because society has
certain perceptions, and fears, related to computer use
 The CIO can follow a proactive program to ensure that IT
systems provide:
 What the executives and managers need to support the
firm's ethics efforts
 That stockholders and owners understand that the firm
uses its computers ethically
 That funds spent on IT are not wasted
3
University of Education, Okara Campus
MORALS, ETHICS, AND LAWS:
 Morals are traditions of belief about right and
wrong conduct and “doing what is morally right”
is the bedrock of our social behavior
 Ethics is a suite of guiding beliefs, standards, or
ideals that pervades an individual or a group or
community of people
 Laws are formal rules of conduct that a sovereign
authority, such as a government, imposes on its
subjects or citizens
4
University of Education, Okara Campus
PUTTING MORALS, ETHICS, AND
LAWS IN PERSPECTIVE:
 Because they are written down, laws are
the easiest to interpret
 Ethics, on the other hand, are not clearly
defined and not even agreed on by all
members of society
5
University of Education, Okara Campus
NEED FOR AN ETHICS CULTURE:
 Top-level managers lead by example: if the firm
is to be ethical, then top management must be
ethical in everything that it does and says
 This is known as an ethics culture
 The task of top-level management is to see that
its concept of ethics permeates the
organization, filtering down through the ranks to
touch every employee
 This can be achieved through a corporate
credo, ethics programs, and tailored corporate
codes
6
University of Education, Okara Campus
Top Level Management Imposes the Ethics
Culture in a Top Down Manner:
Establish Corporate
Credo
Establish Ethics Program
Establish Corporate
Ethics Code
7
University of Education, Okara Campus
Ethics Programs and Tailored
Corporate Codes:
 An ethics program consists of multiple activities to
provide employees with direction in carrying out
the corporate credo
 In an ethics audit, an internal auditor meets with
a manager in a several-hour session for the
purpose of learning how the manager’s unit is
carrying out the corporate credo
 Many firms have devised their own corporate
code of ethics that may be adaptations of codes
for a particular industry or profession
8
University of Education, Okara Campus
REASONS FOR A COMPUTER ETHIC:
 Computer ethics consists of two main activities:
 the analysis of the nature and social impact of computer
technology; and
 formulation and justification of policies for the ethical use of
such technology
 The CIO must:
 be alert to the effects that the computer is having on
society; and
 formulate policies to ensure that the technology is used
throughout the firm in the right way
9
University of Education, Okara Campus
Reasons for the Importance of
Computer Ethics:
 James Moor believes there are 3 main reasons for the high
level of interest in computer ethics:
 Logical Malleability: The computer performs exactly as
instructed, so if it’s used for an unethical activity the computer
is not the culprit
 The Transformation Factor: computers can drastically change
the way we do things
 The Invisibility Factor: of internal operations provides the
opportunity for invisible programming values, invisible complex
calculations, and invisible abuse
10
University of Education, Okara Campus
Social Rights and the Computer:
 Mason coined the acronym PAPA (privacy,
accuracy, property, and accessibility) to represent
society’s four basic rights in terms of information
 Mason felt that “the right to be left alone” is being
threatened by two forces:
1. the increasing ability of the computer to be used
for surveillance
2. the increasing value of information in decision
making
 For example, decision makers place such a high
value on information that they will often be willing to
invade someone’s privacy to get it
11
University of Education, Okara Campus
Other Rights:
 Right to Accuracy: the potential for a level of
accuracy that is unachievable in non
computer systems; some computer-based
systems contain more errors than would be
tolerated in manual systems
 Right to Property: copyright and patent laws
provide some degree of protection
 Right to Access: much information has been
converted to commercial databases, making it
less accessible to the public
12
University of Education, Okara Campus
INFORMATION AUDITING:
 Firms of all sizes rely on external auditors to
audit their accounting records to verify their
accuracy
 Larger firms have their own internal auditors,
who perform the same analyses as external
auditors but have a broader range of
responsibilities
 The Securities and Exchange Commission
has placed restrictions on the amount of
internal auditing that external auditors can
perform
13
University of Education, Okara Campus
ACHIEVING ETHICS IN
INFORMATION TECHNOLOGY:
 Companies can get assistance in the form of
ethics codes and ethics educational programs to
provide the foundation for their culture
 The ethics codes can be used as is or tailored to
the firm
 • Educational programs can assist in developing
a corporate credo and in putting ethics programs
in place
14
University of Education, Okara Campus
References:
 http://deden08m.files.wordpress.com/2011/03/ch10-
ethical-implications-of-information-technology.pdf
 http://www.igi-global.com/book/social-ethical-policy-
implications-information/922
 http://www.ask.com/question/ethical-issues-in-information-
technology
 http://www.netcaucus.org/books/egov2001/pdf/Ethicsin.p
df
 http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
 http://www.techrepublic.com/article/10-ethical-issues-
confronting-it-managers/
15

More Related Content

What's hot

Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 

What's hot (20)

Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Ethical Implications of IT

Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
SikanderAnsari4
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Habib Ullah Qamar
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 
Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)JUNAIDJUANID
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
balewayalew
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
IshratFatima288747
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
UNIVERSITAS TEKNOKRAT INDONESIA
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
Sammer Qader
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
YUSRA FERNANDO
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
university of education,Lahore
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
Shehanperamuna
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
normanibarber20063
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
ClaudeDex
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
JyotiPandey43595
 

Similar to Ethical Implications of IT (20)

Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Chap05
Chap05Chap05
Chap05
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
Review questions
Review questionsReview questions
Review questions
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 

More from university of education,Lahore

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
university of education,Lahore
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
university of education,Lahore
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
university of education,Lahore
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
university of education,Lahore
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
university of education,Lahore
 
ePayment Methods
ePayment MethodsePayment Methods
A Star Search
A Star SearchA Star Search
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
university of education,Lahore
 
Uml Diagrams
Uml DiagramsUml Diagrams
eDras Max
eDras MaxeDras Max
RAD Model
RAD ModelRAD Model
Microsoft Project
Microsoft ProjectMicrosoft Project
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
university of education,Lahore
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
university of education,Lahore
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
university of education,Lahore
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
university of education,Lahore
 

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Ethical Implications of IT

  • 1. Ethical Implications of IT Group # 03 Shahnawaz Salamat 04, Waqar Anwar 05, Waleed Imtiaz 10 M. Irfan Shahid 12, Hafiz M. Mustghas, Sajid Ali 27 BBA-8th Morning University of Education, Okara Campus
  • 2. University of Education, Okara Campus Learning Objectives:  Understand the distinction among morals, ethics, and laws.  Be familiar with the most important computer legislation that has been passed in the U. S., and know how legislation in one country can influence computer use in others as well.  Know how a firm creates an ethics culture by first establishing a corporate credo, then establishing ethics programs, and lastly establishing a corporate ethics code.  Know why society demands that computers be used ethically.  Know the four basic rights that society has concerning the computer.  Be aware of computer industry codes of ethics, and the wide variety of educational programs that can help firms and employees use computers ethically 2
  • 3. University of Education, Okara Campus Introduction:  Firms have an obligation to establish an ethical culture for their employees to follow that is supported by a corporate credo and ethics programs  Computer ethics are important because society has certain perceptions, and fears, related to computer use  The CIO can follow a proactive program to ensure that IT systems provide:  What the executives and managers need to support the firm's ethics efforts  That stockholders and owners understand that the firm uses its computers ethically  That funds spent on IT are not wasted 3
  • 4. University of Education, Okara Campus MORALS, ETHICS, AND LAWS:  Morals are traditions of belief about right and wrong conduct and “doing what is morally right” is the bedrock of our social behavior  Ethics is a suite of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people  Laws are formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens 4
  • 5. University of Education, Okara Campus PUTTING MORALS, ETHICS, AND LAWS IN PERSPECTIVE:  Because they are written down, laws are the easiest to interpret  Ethics, on the other hand, are not clearly defined and not even agreed on by all members of society 5
  • 6. University of Education, Okara Campus NEED FOR AN ETHICS CULTURE:  Top-level managers lead by example: if the firm is to be ethical, then top management must be ethical in everything that it does and says  This is known as an ethics culture  The task of top-level management is to see that its concept of ethics permeates the organization, filtering down through the ranks to touch every employee  This can be achieved through a corporate credo, ethics programs, and tailored corporate codes 6
  • 7. University of Education, Okara Campus Top Level Management Imposes the Ethics Culture in a Top Down Manner: Establish Corporate Credo Establish Ethics Program Establish Corporate Ethics Code 7
  • 8. University of Education, Okara Campus Ethics Programs and Tailored Corporate Codes:  An ethics program consists of multiple activities to provide employees with direction in carrying out the corporate credo  In an ethics audit, an internal auditor meets with a manager in a several-hour session for the purpose of learning how the manager’s unit is carrying out the corporate credo  Many firms have devised their own corporate code of ethics that may be adaptations of codes for a particular industry or profession 8
  • 9. University of Education, Okara Campus REASONS FOR A COMPUTER ETHIC:  Computer ethics consists of two main activities:  the analysis of the nature and social impact of computer technology; and  formulation and justification of policies for the ethical use of such technology  The CIO must:  be alert to the effects that the computer is having on society; and  formulate policies to ensure that the technology is used throughout the firm in the right way 9
  • 10. University of Education, Okara Campus Reasons for the Importance of Computer Ethics:  James Moor believes there are 3 main reasons for the high level of interest in computer ethics:  Logical Malleability: The computer performs exactly as instructed, so if it’s used for an unethical activity the computer is not the culprit  The Transformation Factor: computers can drastically change the way we do things  The Invisibility Factor: of internal operations provides the opportunity for invisible programming values, invisible complex calculations, and invisible abuse 10
  • 11. University of Education, Okara Campus Social Rights and the Computer:  Mason coined the acronym PAPA (privacy, accuracy, property, and accessibility) to represent society’s four basic rights in terms of information  Mason felt that “the right to be left alone” is being threatened by two forces: 1. the increasing ability of the computer to be used for surveillance 2. the increasing value of information in decision making  For example, decision makers place such a high value on information that they will often be willing to invade someone’s privacy to get it 11
  • 12. University of Education, Okara Campus Other Rights:  Right to Accuracy: the potential for a level of accuracy that is unachievable in non computer systems; some computer-based systems contain more errors than would be tolerated in manual systems  Right to Property: copyright and patent laws provide some degree of protection  Right to Access: much information has been converted to commercial databases, making it less accessible to the public 12
  • 13. University of Education, Okara Campus INFORMATION AUDITING:  Firms of all sizes rely on external auditors to audit their accounting records to verify their accuracy  Larger firms have their own internal auditors, who perform the same analyses as external auditors but have a broader range of responsibilities  The Securities and Exchange Commission has placed restrictions on the amount of internal auditing that external auditors can perform 13
  • 14. University of Education, Okara Campus ACHIEVING ETHICS IN INFORMATION TECHNOLOGY:  Companies can get assistance in the form of ethics codes and ethics educational programs to provide the foundation for their culture  The ethics codes can be used as is or tailored to the firm  • Educational programs can assist in developing a corporate credo and in putting ethics programs in place 14
  • 15. University of Education, Okara Campus References:  http://deden08m.files.wordpress.com/2011/03/ch10- ethical-implications-of-information-technology.pdf  http://www.igi-global.com/book/social-ethical-policy- implications-information/922  http://www.ask.com/question/ethical-issues-in-information- technology  http://www.netcaucus.org/books/egov2001/pdf/Ethicsin.p df  http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html  http://www.techrepublic.com/article/10-ethical-issues- confronting-it-managers/ 15