Ethics in InformationTechnology,
Second Edition
1
Ethics in Information
Technology,
Ethics for IT Professionals and IT
Users
2.
Ethics in InformationTechnology,
Second Edition
2
Objectives
โข What key characteristics distinguish a professional
from other kinds of workers, and what is the role of
an IT professional?
โข What relationships must an IT professional manage,
and what key ethical issues can arise in each?
Book page 34
โข How do codes of ethics, professional
organizations, certification, and licensing affect
the ethical behavior of IT professionals?
3.
Ethics in InformationTechnology,
Second Edition
3
Objectives (continued)
โข What are the key principles of four different codes of
ethics that provide guidance for IT professionals?
โข What are the common ethical issues that face IT
users?
โข What approaches can support the ethical practices
of IT users?
Book page 34
4.
Ethics in InformationTechnology,
Second Edition
4
IT Professionals
โข Profession is a calling that requires
โ Specialized knowledge
โ Long and intensive academic preparation
Book page 35
5.
Ethics in InformationTechnology,
Second Edition
5
Are IT Workers Professionals?
โข Partial list of IT specialists
โ Programmers
โ Systems analysts
โ Software engineers
โ Database administrators
โ Local area network (LAN) administrators
โ Chief information officers (CIOs)
Book page 35
6.
Ethics in InformationTechnology,
Second Edition
6
Professional Relationships That Must
Be Managed
โข IT professionals have many different relationships
with:
โ Employers
โ Clients
โ Suppliers
โ Other professionals
โ IT users
โ Society at large
Book page 34
7.
Ethics in InformationTechnology,
Second Edition
7
Relationships Between IT
Professionals and Employers
โข IT professionals must set an example and enforce
policies regarding the ethical use of IT
โข Software piracy is the act of illegally making copies of
software or enabling others to access software to which
they are not entitled
โข Software piracy is an area in which IT professionals can
be tempted to violate laws and policies
โข The Business Software Alliance (BSA) is a trade group
that represents the worldโs largest software and
hardware manufacturers
โ Its mission is to stop the unauthorized copying of software
produced by its members
Book page 36
8.
Ethics in InformationTechnology,
Second Edition
8
Relationships Between IT
Professionals and Employers
(continued)
โข Trade secret
โ Information used in business
โ Generally unknown to the public
โ Company has taken strong measures to keep
confidential
โข Whistle-blowing
โ Attracts attention to a negligent, illegal, unethical,
abusive, or dangerous act that threatens the public
interest
Book page 38
9.
Ethics in InformationTechnology,
Second Edition
9
Relationships Between IT
Professionals and Clients
โข IT professional provides
โ Hardware, software, or services at a certain cost and
within a given time frame
โข Client provides
โ $$ Compensation
โ Access to key contacts
โ Work space
โข Relationship is usually documented in contractual
terms
Book page 39
10.
Ethics in InformationTechnology,
Second Edition
10
Legal Overview:
Fraud, Misrepresentation,
and Breach of Contract
โข Fraud
โ Crime of obtaining goods, services, or property
through deception or trickery
โ Fraud is proven in court
โข Breach of contract
โ One party fails to meet the terms of a contract
Book page 40
11.
Ethics in InformationTechnology,
Second Edition
11
Legal Overview:
Fraud, Misrepresentation, and
Breach of Contract (continued)
โข IT projects are joint efforts in which vendors and
customers work together
โ Difficult to assign blame
Book page 40
12.
Ethics in InformationTechnology,
Second Edition
12
Relationships Between IT
Professionals and Suppliers
โข Develop good relationships with suppliers
โ Deal fairly with them
โ Do not make unreasonable demands
โข Bribery
โ Providing money, property, or favors to someone in
business or government to obtain a business
advantage
โ U.S. Foreign Corrupt Practices Act (FCPA) makes it a
crime to bribe a foreign official, a foreign political party
official, or a candidate for foreign political office
Book page 41
13.
Ethics in InformationTechnology,
Second Edition
13
Relationships Between IT
Professionals and Suppliers
(continued)
โข Bribery
โ At what point does a gift become a bribe?
โ No gift should be hidden
โ Perceptions of donor and recipient can differ
โ Eaton Example: Flowers, lunch @ IBM, Jack Davis,
Graphical OOP tools
Book page 41
14.
Ethics in InformationTechnology,
Second Edition
14
Distinguishing Between a Bribe and a
Gift
Book page 42
15.
Ethics in InformationTechnology,
Second Edition
15
Relationships Between IT
Professionals and Other Professionals
โข Professionals owe each other adherence to a
professionโs code of conduct
โข Ethical problems between members of the IT
profession
โ Rรฉsumรฉ inflation
Eaton example: 2 instructor applications Fall 08
โ Inappropriate sharing of corporate information
Book page 42-43
16.
Ethics in InformationTechnology,
Second Edition
16
Relationships Between IT
Professionals and IT Users
โข IT user is a person for whom a hardware or software
product is designed
โข IT professionalsโ duty
โ Understand usersโ needs and capabilities
โ Deliver products and services that best meet those
needs
โ Establish an environment that supports ethical
behavior by users
Book page 43
17.
Ethics in InformationTechnology,
Second Edition
17
Relationships Between IT
Professionals and Society
โข Actions of an IT professional can affect society
Book page 43
18.
Ethics in InformationTechnology,
Second Edition
18
The Ethical Behavior of IT
Professionals
โข Corporations are taking actions to ensure good
business ethics among employees
Book page 44
19.
Ethics in InformationTechnology,
Second Edition
19
Professional Codes of Ethics
โข A professional code of ethics states the principles
and core values that are essential to the work of a
particular occupational group
โข Main parts:
โ Outlines what the professional organization aspires to
become
โ Lists rules and principles by which members of the
organization are expected to abide
Book page 44
20.
Ethics in InformationTechnology,
Second Edition
20
Professional Codes of Ethics
(continued)
โข Benefits for individual, profession, and society
โ Improves ethical decision making
โ Promotes high standards of practice and ethical
behavior
โ Enhances trust and respect from the general public
โ Provides an evaluation benchmark
Book page 44
21.
Ethics in InformationTechnology,
Second Edition
21
Professional Organizations
โข No universal code of ethics for IT professionals
โข No single, formal organization of IT professionals
has emerged as preeminent
โข Most prominent organizations include:
โ ACM - Association for Computing Machinery (
www.acm.org)
โ AITP - Association of Information Technology
Professionals (aitp.org)
โ IEEE-CS - Computer Society of the Institute of
Electrical and Electronics Engineers (ieee.org,
ieee job site)
โ PMI - Project Management Institute (www.pmi.org)
Book page 45-46
22.
Ethics in InformationTechnology,
Second Edition
22
Certification
โข Indicates a professional possesses a particular set
of skills, knowledge, or abilities in the opinion of a
certifying organization
โข Can also apply to products
โข Generally voluntary
โข Carries no requirement to adhere to a code of ethics
Book page 46
23.
Ethics in InformationTechnology,
Second Edition
23
Certification (continued)
โข Vendor certifications
โ Some certifications substantially improve IT workersโ
salaries and career prospects
โ Relevant for narrowly defined roles
โข Or certain aspects of broader roles
โ Require passing a written exam
โ Workers are commonly recertified as newer
technologies become available
Book page 47
24.
Ethics in InformationTechnology,
Second Edition
24
Certification (continued)
โข Industry association certifications
โ Require a certain level of experience and a broader
perspective than vendor certifications
โ Lag in developing tests that cover new technologies
โข Eaton examples:
IC3 in CSC 110
CIW Associate in ITD 110, ITN 100 and ITN 101
A+ in ITN 106 + ITN 107
Adobe Associate Photoshop in ITD 112
Dreamweaver in ITD 210
Flash in ITD 212
Book page 47-48
25.
Ethics in InformationTechnology,
Second Edition
25
IT Professional Malpractice
โข Negligence has been defined as not doing
something that a reasonable man would do, or doing
something that a reasonable man would not do
โข Duty of care refers to the obligation to protect people
against any unreasonable harm or risk
Book page 50
26.
Ethics in InformationTechnology,
Second Edition
26
IT Users
โข Employeesโ ethical use of IT is an area of growing
concern
Book page 91
27.
Ethics in InformationTechnology,
Second Edition
27
Common Ethical Issues for IT Users
โข Software piracy
โข Inappropriate use of computing resources
โข Inappropriate sharing of information
โ Private data
โ Confidential information
Book page 51
28.
Ethics in InformationTechnology,
Second Edition
28
Supporting the Ethical Practices of IT
Users
โข Policies that protect against abuses:
โ Establish boundaries of acceptable and unacceptable
behavior
โ Enable management to punish violators
โข Policy components include:
โ Defining and limiting the appropriate use of IT
resources
โ Establishing guidelines for use of company software
โ Structuring information systems to protect data and
information
โ Installing and maintaining a corporate firewall
Book page 52
29.
Ethics in InformationTechnology,
Second Edition
29
Summary
โข A professional from a legal standpoint
โ Has passed the state licensing requirements
โ Has earned the right to practice there
โข IT professionals have many different relationships
โ Each with its own set of ethical issues and potential
problems
โข Professional code of ethics
โ States the principles and core values essential to the
work of an occupational group
Book page 54-55