Ethics in Information Technology,
Second Edition
1
Ethics in Information
Technology,
Ethics for IT Professionals and IT
Users
Ethics in Information Technology,
Second Edition
2
Objectives
โ€ข What key characteristics distinguish a professional
from other kinds of workers, and what is the role of
an IT professional?
โ€ข What relationships must an IT professional manage,
and what key ethical issues can arise in each?
Book page 34
โ€ข How do codes of ethics, professional
organizations, certification, and licensing affect
the ethical behavior of IT professionals?
Ethics in Information Technology,
Second Edition
3
Objectives (continued)
โ€ข What are the key principles of four different codes of
ethics that provide guidance for IT professionals?
โ€ข What are the common ethical issues that face IT
users?
โ€ข What approaches can support the ethical practices
of IT users?
Book page 34
Ethics in Information Technology,
Second Edition
4
IT Professionals
โ€ข Profession is a calling that requires
โ€“ Specialized knowledge
โ€“ Long and intensive academic preparation
Book page 35
Ethics in Information Technology,
Second Edition
5
Are IT Workers Professionals?
โ€ข Partial list of IT specialists
โ€“ Programmers
โ€“ Systems analysts
โ€“ Software engineers
โ€“ Database administrators
โ€“ Local area network (LAN) administrators
โ€“ Chief information officers (CIOs)
Book page 35
Ethics in Information Technology,
Second Edition
6
Professional Relationships That Must
Be Managed
โ€ข IT professionals have many different relationships
with:
โ€“ Employers
โ€“ Clients
โ€“ Suppliers
โ€“ Other professionals
โ€“ IT users
โ€“ Society at large
Book page 34
Ethics in Information Technology,
Second Edition
7
Relationships Between IT
Professionals and Employers
โ€ข IT professionals must set an example and enforce
policies regarding the ethical use of IT
โ€ข Software piracy is the act of illegally making copies of
software or enabling others to access software to which
they are not entitled
โ€ข Software piracy is an area in which IT professionals can
be tempted to violate laws and policies
โ€ข The Business Software Alliance (BSA) is a trade group
that represents the worldโ€™s largest software and
hardware manufacturers
โ€“ Its mission is to stop the unauthorized copying of software
produced by its members
Book page 36
Ethics in Information Technology,
Second Edition
8
Relationships Between IT
Professionals and Employers
(continued)
โ€ข Trade secret
โ€“ Information used in business
โ€“ Generally unknown to the public
โ€“ Company has taken strong measures to keep
confidential
โ€ข Whistle-blowing
โ€“ Attracts attention to a negligent, illegal, unethical,
abusive, or dangerous act that threatens the public
interest
Book page 38
Ethics in Information Technology,
Second Edition
9
Relationships Between IT
Professionals and Clients
โ€ข IT professional provides
โ€“ Hardware, software, or services at a certain cost and
within a given time frame
โ€ข Client provides
โ€“ $$ Compensation
โ€“ Access to key contacts
โ€“ Work space
โ€ข Relationship is usually documented in contractual
terms
Book page 39
Ethics in Information Technology,
Second Edition
10
Legal Overview:
Fraud, Misrepresentation,
and Breach of Contract
โ€ข Fraud
โ€“ Crime of obtaining goods, services, or property
through deception or trickery
โ€“ Fraud is proven in court
โ€ข Breach of contract
โ€“ One party fails to meet the terms of a contract
Book page 40
Ethics in Information Technology,
Second Edition
11
Legal Overview:
Fraud, Misrepresentation, and
Breach of Contract (continued)
โ€ข IT projects are joint efforts in which vendors and
customers work together
โ€“ Difficult to assign blame
Book page 40
Ethics in Information Technology,
Second Edition
12
Relationships Between IT
Professionals and Suppliers
โ€ข Develop good relationships with suppliers
โ€“ Deal fairly with them
โ€“ Do not make unreasonable demands
โ€ข Bribery
โ€“ Providing money, property, or favors to someone in
business or government to obtain a business
advantage
โ€“ U.S. Foreign Corrupt Practices Act (FCPA) makes it a
crime to bribe a foreign official, a foreign political party
official, or a candidate for foreign political office
Book page 41
Ethics in Information Technology,
Second Edition
13
Relationships Between IT
Professionals and Suppliers
(continued)
โ€ข Bribery
โ€“ At what point does a gift become a bribe?
โ€“ No gift should be hidden
โ€“ Perceptions of donor and recipient can differ
โ€“ Eaton Example: Flowers, lunch @ IBM, Jack Davis,
Graphical OOP tools
Book page 41
Ethics in Information Technology,
Second Edition
14
Distinguishing Between a Bribe and a
Gift
Book page 42
Ethics in Information Technology,
Second Edition
15
Relationships Between IT
Professionals and Other Professionals
โ€ข Professionals owe each other adherence to a
professionโ€™s code of conduct
โ€ข Ethical problems between members of the IT
profession
โ€“ Rรฉsumรฉ inflation
Eaton example: 2 instructor applications Fall 08
โ€“ Inappropriate sharing of corporate information
Book page 42-43
Ethics in Information Technology,
Second Edition
16
Relationships Between IT
Professionals and IT Users
โ€ข IT user is a person for whom a hardware or software
product is designed
โ€ข IT professionalsโ€™ duty
โ€“ Understand usersโ€™ needs and capabilities
โ€“ Deliver products and services that best meet those
needs
โ€“ Establish an environment that supports ethical
behavior by users
Book page 43
Ethics in Information Technology,
Second Edition
17
Relationships Between IT
Professionals and Society
โ€ข Actions of an IT professional can affect society
Book page 43
Ethics in Information Technology,
Second Edition
18
The Ethical Behavior of IT
Professionals
โ€ข Corporations are taking actions to ensure good
business ethics among employees
Book page 44
Ethics in Information Technology,
Second Edition
19
Professional Codes of Ethics
โ€ข A professional code of ethics states the principles
and core values that are essential to the work of a
particular occupational group
โ€ข Main parts:
โ€“ Outlines what the professional organization aspires to
become
โ€“ Lists rules and principles by which members of the
organization are expected to abide
Book page 44
Ethics in Information Technology,
Second Edition
20
Professional Codes of Ethics
(continued)
โ€ข Benefits for individual, profession, and society
โ€“ Improves ethical decision making
โ€“ Promotes high standards of practice and ethical
behavior
โ€“ Enhances trust and respect from the general public
โ€“ Provides an evaluation benchmark
Book page 44
Ethics in Information Technology,
Second Edition
21
Professional Organizations
โ€ข No universal code of ethics for IT professionals
โ€ข No single, formal organization of IT professionals
has emerged as preeminent
โ€ข Most prominent organizations include:
โ€“ ACM - Association for Computing Machinery (
www.acm.org)
โ€“ AITP - Association of Information Technology
Professionals (aitp.org)
โ€“ IEEE-CS - Computer Society of the Institute of
Electrical and Electronics Engineers (ieee.org,
ieee job site)
โ€“ PMI - Project Management Institute (www.pmi.org)
Book page 45-46
Ethics in Information Technology,
Second Edition
22
Certification
โ€ข Indicates a professional possesses a particular set
of skills, knowledge, or abilities in the opinion of a
certifying organization
โ€ข Can also apply to products
โ€ข Generally voluntary
โ€ข Carries no requirement to adhere to a code of ethics
Book page 46
Ethics in Information Technology,
Second Edition
23
Certification (continued)
โ€ข Vendor certifications
โ€“ Some certifications substantially improve IT workersโ€™
salaries and career prospects
โ€“ Relevant for narrowly defined roles
โ€ข Or certain aspects of broader roles
โ€“ Require passing a written exam
โ€“ Workers are commonly recertified as newer
technologies become available
Book page 47
Ethics in Information Technology,
Second Edition
24
Certification (continued)
โ€ข Industry association certifications
โ€“ Require a certain level of experience and a broader
perspective than vendor certifications
โ€“ Lag in developing tests that cover new technologies
โ€ข Eaton examples:
IC3 in CSC 110
CIW Associate in ITD 110, ITN 100 and ITN 101
A+ in ITN 106 + ITN 107
Adobe Associate Photoshop in ITD 112
Dreamweaver in ITD 210
Flash in ITD 212
Book page 47-48
Ethics in Information Technology,
Second Edition
25
IT Professional Malpractice
โ€ข Negligence has been defined as not doing
something that a reasonable man would do, or doing
something that a reasonable man would not do
โ€ข Duty of care refers to the obligation to protect people
against any unreasonable harm or risk
Book page 50
Ethics in Information Technology,
Second Edition
26
IT Users
โ€ข Employeesโ€™ ethical use of IT is an area of growing
concern
Book page 91
Ethics in Information Technology,
Second Edition
27
Common Ethical Issues for IT Users
โ€ข Software piracy
โ€ข Inappropriate use of computing resources
โ€ข Inappropriate sharing of information
โ€“ Private data
โ€“ Confidential information
Book page 51
Ethics in Information Technology,
Second Edition
28
Supporting the Ethical Practices of IT
Users
โ€ข Policies that protect against abuses:
โ€“ Establish boundaries of acceptable and unacceptable
behavior
โ€“ Enable management to punish violators
โ€ข Policy components include:
โ€“ Defining and limiting the appropriate use of IT
resources
โ€“ Establishing guidelines for use of company software
โ€“ Structuring information systems to protect data and
information
โ€“ Installing and maintaining a corporate firewall
Book page 52
Ethics in Information Technology,
Second Edition
29
Summary
โ€ข A professional from a legal standpoint
โ€“ Has passed the state licensing requirements
โ€“ Has earned the right to practice there
โ€ข IT professionals have many different relationships
โ€“ Each with its own set of ethical issues and potential
problems
โ€ข Professional code of ethics
โ€“ States the principles and core values essential to the
work of an occupational group
Book page 54-55

IT Professional Ethics, Moral and Cu.ppt

  • 1.
    Ethics in InformationTechnology, Second Edition 1 Ethics in Information Technology, Ethics for IT Professionals and IT Users
  • 2.
    Ethics in InformationTechnology, Second Edition 2 Objectives โ€ข What key characteristics distinguish a professional from other kinds of workers, and what is the role of an IT professional? โ€ข What relationships must an IT professional manage, and what key ethical issues can arise in each? Book page 34 โ€ข How do codes of ethics, professional organizations, certification, and licensing affect the ethical behavior of IT professionals?
  • 3.
    Ethics in InformationTechnology, Second Edition 3 Objectives (continued) โ€ข What are the key principles of four different codes of ethics that provide guidance for IT professionals? โ€ข What are the common ethical issues that face IT users? โ€ข What approaches can support the ethical practices of IT users? Book page 34
  • 4.
    Ethics in InformationTechnology, Second Edition 4 IT Professionals โ€ข Profession is a calling that requires โ€“ Specialized knowledge โ€“ Long and intensive academic preparation Book page 35
  • 5.
    Ethics in InformationTechnology, Second Edition 5 Are IT Workers Professionals? โ€ข Partial list of IT specialists โ€“ Programmers โ€“ Systems analysts โ€“ Software engineers โ€“ Database administrators โ€“ Local area network (LAN) administrators โ€“ Chief information officers (CIOs) Book page 35
  • 6.
    Ethics in InformationTechnology, Second Edition 6 Professional Relationships That Must Be Managed โ€ข IT professionals have many different relationships with: โ€“ Employers โ€“ Clients โ€“ Suppliers โ€“ Other professionals โ€“ IT users โ€“ Society at large Book page 34
  • 7.
    Ethics in InformationTechnology, Second Edition 7 Relationships Between IT Professionals and Employers โ€ข IT professionals must set an example and enforce policies regarding the ethical use of IT โ€ข Software piracy is the act of illegally making copies of software or enabling others to access software to which they are not entitled โ€ข Software piracy is an area in which IT professionals can be tempted to violate laws and policies โ€ข The Business Software Alliance (BSA) is a trade group that represents the worldโ€™s largest software and hardware manufacturers โ€“ Its mission is to stop the unauthorized copying of software produced by its members Book page 36
  • 8.
    Ethics in InformationTechnology, Second Edition 8 Relationships Between IT Professionals and Employers (continued) โ€ข Trade secret โ€“ Information used in business โ€“ Generally unknown to the public โ€“ Company has taken strong measures to keep confidential โ€ข Whistle-blowing โ€“ Attracts attention to a negligent, illegal, unethical, abusive, or dangerous act that threatens the public interest Book page 38
  • 9.
    Ethics in InformationTechnology, Second Edition 9 Relationships Between IT Professionals and Clients โ€ข IT professional provides โ€“ Hardware, software, or services at a certain cost and within a given time frame โ€ข Client provides โ€“ $$ Compensation โ€“ Access to key contacts โ€“ Work space โ€ข Relationship is usually documented in contractual terms Book page 39
  • 10.
    Ethics in InformationTechnology, Second Edition 10 Legal Overview: Fraud, Misrepresentation, and Breach of Contract โ€ข Fraud โ€“ Crime of obtaining goods, services, or property through deception or trickery โ€“ Fraud is proven in court โ€ข Breach of contract โ€“ One party fails to meet the terms of a contract Book page 40
  • 11.
    Ethics in InformationTechnology, Second Edition 11 Legal Overview: Fraud, Misrepresentation, and Breach of Contract (continued) โ€ข IT projects are joint efforts in which vendors and customers work together โ€“ Difficult to assign blame Book page 40
  • 12.
    Ethics in InformationTechnology, Second Edition 12 Relationships Between IT Professionals and Suppliers โ€ข Develop good relationships with suppliers โ€“ Deal fairly with them โ€“ Do not make unreasonable demands โ€ข Bribery โ€“ Providing money, property, or favors to someone in business or government to obtain a business advantage โ€“ U.S. Foreign Corrupt Practices Act (FCPA) makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office Book page 41
  • 13.
    Ethics in InformationTechnology, Second Edition 13 Relationships Between IT Professionals and Suppliers (continued) โ€ข Bribery โ€“ At what point does a gift become a bribe? โ€“ No gift should be hidden โ€“ Perceptions of donor and recipient can differ โ€“ Eaton Example: Flowers, lunch @ IBM, Jack Davis, Graphical OOP tools Book page 41
  • 14.
    Ethics in InformationTechnology, Second Edition 14 Distinguishing Between a Bribe and a Gift Book page 42
  • 15.
    Ethics in InformationTechnology, Second Edition 15 Relationships Between IT Professionals and Other Professionals โ€ข Professionals owe each other adherence to a professionโ€™s code of conduct โ€ข Ethical problems between members of the IT profession โ€“ Rรฉsumรฉ inflation Eaton example: 2 instructor applications Fall 08 โ€“ Inappropriate sharing of corporate information Book page 42-43
  • 16.
    Ethics in InformationTechnology, Second Edition 16 Relationships Between IT Professionals and IT Users โ€ข IT user is a person for whom a hardware or software product is designed โ€ข IT professionalsโ€™ duty โ€“ Understand usersโ€™ needs and capabilities โ€“ Deliver products and services that best meet those needs โ€“ Establish an environment that supports ethical behavior by users Book page 43
  • 17.
    Ethics in InformationTechnology, Second Edition 17 Relationships Between IT Professionals and Society โ€ข Actions of an IT professional can affect society Book page 43
  • 18.
    Ethics in InformationTechnology, Second Edition 18 The Ethical Behavior of IT Professionals โ€ข Corporations are taking actions to ensure good business ethics among employees Book page 44
  • 19.
    Ethics in InformationTechnology, Second Edition 19 Professional Codes of Ethics โ€ข A professional code of ethics states the principles and core values that are essential to the work of a particular occupational group โ€ข Main parts: โ€“ Outlines what the professional organization aspires to become โ€“ Lists rules and principles by which members of the organization are expected to abide Book page 44
  • 20.
    Ethics in InformationTechnology, Second Edition 20 Professional Codes of Ethics (continued) โ€ข Benefits for individual, profession, and society โ€“ Improves ethical decision making โ€“ Promotes high standards of practice and ethical behavior โ€“ Enhances trust and respect from the general public โ€“ Provides an evaluation benchmark Book page 44
  • 21.
    Ethics in InformationTechnology, Second Edition 21 Professional Organizations โ€ข No universal code of ethics for IT professionals โ€ข No single, formal organization of IT professionals has emerged as preeminent โ€ข Most prominent organizations include: โ€“ ACM - Association for Computing Machinery ( www.acm.org) โ€“ AITP - Association of Information Technology Professionals (aitp.org) โ€“ IEEE-CS - Computer Society of the Institute of Electrical and Electronics Engineers (ieee.org, ieee job site) โ€“ PMI - Project Management Institute (www.pmi.org) Book page 45-46
  • 22.
    Ethics in InformationTechnology, Second Edition 22 Certification โ€ข Indicates a professional possesses a particular set of skills, knowledge, or abilities in the opinion of a certifying organization โ€ข Can also apply to products โ€ข Generally voluntary โ€ข Carries no requirement to adhere to a code of ethics Book page 46
  • 23.
    Ethics in InformationTechnology, Second Edition 23 Certification (continued) โ€ข Vendor certifications โ€“ Some certifications substantially improve IT workersโ€™ salaries and career prospects โ€“ Relevant for narrowly defined roles โ€ข Or certain aspects of broader roles โ€“ Require passing a written exam โ€“ Workers are commonly recertified as newer technologies become available Book page 47
  • 24.
    Ethics in InformationTechnology, Second Edition 24 Certification (continued) โ€ข Industry association certifications โ€“ Require a certain level of experience and a broader perspective than vendor certifications โ€“ Lag in developing tests that cover new technologies โ€ข Eaton examples: IC3 in CSC 110 CIW Associate in ITD 110, ITN 100 and ITN 101 A+ in ITN 106 + ITN 107 Adobe Associate Photoshop in ITD 112 Dreamweaver in ITD 210 Flash in ITD 212 Book page 47-48
  • 25.
    Ethics in InformationTechnology, Second Edition 25 IT Professional Malpractice โ€ข Negligence has been defined as not doing something that a reasonable man would do, or doing something that a reasonable man would not do โ€ข Duty of care refers to the obligation to protect people against any unreasonable harm or risk Book page 50
  • 26.
    Ethics in InformationTechnology, Second Edition 26 IT Users โ€ข Employeesโ€™ ethical use of IT is an area of growing concern Book page 91
  • 27.
    Ethics in InformationTechnology, Second Edition 27 Common Ethical Issues for IT Users โ€ข Software piracy โ€ข Inappropriate use of computing resources โ€ข Inappropriate sharing of information โ€“ Private data โ€“ Confidential information Book page 51
  • 28.
    Ethics in InformationTechnology, Second Edition 28 Supporting the Ethical Practices of IT Users โ€ข Policies that protect against abuses: โ€“ Establish boundaries of acceptable and unacceptable behavior โ€“ Enable management to punish violators โ€ข Policy components include: โ€“ Defining and limiting the appropriate use of IT resources โ€“ Establishing guidelines for use of company software โ€“ Structuring information systems to protect data and information โ€“ Installing and maintaining a corporate firewall Book page 52
  • 29.
    Ethics in InformationTechnology, Second Edition 29 Summary โ€ข A professional from a legal standpoint โ€“ Has passed the state licensing requirements โ€“ Has earned the right to practice there โ€ข IT professionals have many different relationships โ€“ Each with its own set of ethical issues and potential problems โ€ข Professional code of ethics โ€“ States the principles and core values essential to the work of an occupational group Book page 54-55