SlideShare a Scribd company logo
Overview
• Ethical issues for ICT professionals
• Definitions and basic concepts
• Western moral tradition and evolution
• What is the relevance of ethics to ICTs?
• Cyber-ethics issues and dilemmas
• Practical approaches to applying ethics
The Ethical Issues In E-Commerce
Web Spoofing. Web spoofing is an electronic deception relates to the
Internet. ...
Cyber-Squatting. ...
Privacy Invasion. ...
Online Piracy. ...
Email Spamming.
Patient Privacy and Confidentiality. The protection of private patient
information is one of the most important ethical and legal issues in the field
of healthcare. ...
Transmission of Diseases. ...
Relationships. ...
End-of-Life Issues.
What are ethical issues in ecommerce?
4
Why ‘Cyber-ethics’?
• Computer ethics
– Customised or bespoke software (machines)
• Internet ethics
– Netiquette (www, email) (content)
• Cyber-ethics
– LAN  Internet  Cloud (environment)
Ethical issues for ICT professionals
• Data protection and other legal matters
• Hacktivism
• Business computer ethics
• Surveillance at work
• Ethics in the Cloud
• Online privacy
5
British Computer Society Code of Conduct
• Public interest
– Awareness of legal environment
– Avoid discrimination
• Duty to relevant authority
– Compliance and expert judgement
– Confidentiality and disclosure
– Manage task within time and budget
• Duty to the profession
• Professional competence and integrity
6
7
Systems of ethics:
From ancient Greece to the 21st Century
• Deontology: rules, rights and duties
– Divine command ethics
– Kantian ethics
• Contractualism
– Hobbes
– Social contract
• Consequentialism
– Utilitarianism
• Virtue ethics
8
Virtue ethics
• Aristotle and purpose in life
– Excellence, flourishing as source of happiness
• Augustine, Aquinas
– Specification of virtue in terms of health,
aesthetics, knowledge, authenticity, integrity,
justice, friendship, holiness
9
Computer ethics
• Postwar period:
• the rise of ‘artificial intelligence’ and fears of social domination
by computers
• large-scale computation enabling greater lethality of military
weaponry
• large-scale data manipulation enabling the centralisation of
social control (especially government): privacy and dignity
• Microcomputers, networking and personal computers
• software and IPRs
• hacking
• Internet and bandwidth
• privacy and protection from malicious individuals
• dependency in the age of informational capitalism
• Cloud computing
10
Conceptualising computers and ethics
 Software
 Hacking
 the Internet
 the Cloud
“Computer and information technology creates new
possibilities; it instruments human action in new
ways. The ethical issues that are thereby created are
not out of the realm of human under-standing, but
they have unique features with which we must come
to grips.” (Johnson)
11
Business computer ethics
• Ethical behaviour as essential to maintaining trust that is
the basis for doing business:
– clients, customers and suppliers
– competitors, especially when collaborating
– employees, shareholders and stakeholders
empirical observation: “ethical behaviour works” (Langford)
• Computers pervasive in all aspects of business, and
businesses of all sizes are highly dependent upon them
• Computers allow very complex processes to take place
which are not transparent to consumers or regulators
12
What does secrecy mean in a
virtual social environment?
• Privacy
• Anonymity
• Identity
• Security
• Confidentiality
13
Privacy
Theories of privacy:
– Non-intrusion privacy: being free from
interruption and interference
– Seclusion privacy: personal privacy and
being alone
– Control/access privacy: having control over
information about oneself
– Limitation privacy: context-dependent
limits to access to one’s personal
information
14
Internet privacy
• Datagathering and cyberstalking
• Dataveillance
• Merging electronic records
• Personal data mining
• Search engines
• Social networking online
What is properly personal and private, and
what is in the public domain?
15
Identity in the virtual world
• Personal, social and legal identity
• Aliases
• Constructed identities
• Digital effigies
Krishna kumar singh

More Related Content

What's hot

Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
Laguna State Polytechnic University
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
Ethical issues in smart home application in smart
Ethical issues in smart home application in smartEthical issues in smart home application in smart
Ethical issues in smart home application in smart
AboubacarAhamadaRouf
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
Kashif Sohail
 
Professionalism and Ethics
Professionalism and EthicsProfessionalism and Ethics
Professionalism and Ethics
Shaun Wilson
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship groot83
 
Iot ppt
Iot pptIot ppt
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issuesNickardo Salmon
 
IoT Adoption
IoT AdoptionIoT Adoption
IoT Adoption
Parakum Pathirana
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
Mindaugas Kiskis
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
Willislwhite12
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
Kashif Sohail
 
Looking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahLooking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahState of Utah, Salt Lake City
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
Tawny Brown
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 

What's hot (20)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Ethical issues in smart home application in smart
Ethical issues in smart home application in smartEthical issues in smart home application in smart
Ethical issues in smart home application in smart
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Professionalism and Ethics
Professionalism and EthicsProfessionalism and Ethics
Professionalism and Ethics
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
 
IoT Adoption
IoT AdoptionIoT Adoption
IoT Adoption
 
Com 300 dl
Com 300 dlCom 300 dl
Com 300 dl
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
Looking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahLooking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in Utah
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
Iot
IotIot
Iot
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 

Similar to Krishna kumar singh

Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
MEDEA Awards
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
RogerPrimo2
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Web of Things
Web of ThingsWeb of Things
Web of Things
Jayesh Pai
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
balewayalew
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
AvilaTherese1
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Adam Thierer
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
Prof. Jacques Folon (Ph.D)
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
Salman Baset
 
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
David Terrar
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
Saqib Raza
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
Raja Manzar
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
Amey Naik
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
MuhammadAbdullah311866
 

Similar to Krishna kumar singh (20)

Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
 
Sfit1
Sfit1Sfit1
Sfit1
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Web of Things
Web of ThingsWeb of Things
Web of Things
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 

Recently uploaded

April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 

Recently uploaded (20)

April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 

Krishna kumar singh

  • 1.
  • 2. Overview • Ethical issues for ICT professionals • Definitions and basic concepts • Western moral tradition and evolution • What is the relevance of ethics to ICTs? • Cyber-ethics issues and dilemmas • Practical approaches to applying ethics
  • 3. The Ethical Issues In E-Commerce Web Spoofing. Web spoofing is an electronic deception relates to the Internet. ... Cyber-Squatting. ... Privacy Invasion. ... Online Piracy. ... Email Spamming. Patient Privacy and Confidentiality. The protection of private patient information is one of the most important ethical and legal issues in the field of healthcare. ... Transmission of Diseases. ... Relationships. ... End-of-Life Issues. What are ethical issues in ecommerce?
  • 4. 4 Why ‘Cyber-ethics’? • Computer ethics – Customised or bespoke software (machines) • Internet ethics – Netiquette (www, email) (content) • Cyber-ethics – LAN  Internet  Cloud (environment)
  • 5. Ethical issues for ICT professionals • Data protection and other legal matters • Hacktivism • Business computer ethics • Surveillance at work • Ethics in the Cloud • Online privacy 5
  • 6. British Computer Society Code of Conduct • Public interest – Awareness of legal environment – Avoid discrimination • Duty to relevant authority – Compliance and expert judgement – Confidentiality and disclosure – Manage task within time and budget • Duty to the profession • Professional competence and integrity 6
  • 7. 7 Systems of ethics: From ancient Greece to the 21st Century • Deontology: rules, rights and duties – Divine command ethics – Kantian ethics • Contractualism – Hobbes – Social contract • Consequentialism – Utilitarianism • Virtue ethics
  • 8. 8 Virtue ethics • Aristotle and purpose in life – Excellence, flourishing as source of happiness • Augustine, Aquinas – Specification of virtue in terms of health, aesthetics, knowledge, authenticity, integrity, justice, friendship, holiness
  • 9. 9 Computer ethics • Postwar period: • the rise of ‘artificial intelligence’ and fears of social domination by computers • large-scale computation enabling greater lethality of military weaponry • large-scale data manipulation enabling the centralisation of social control (especially government): privacy and dignity • Microcomputers, networking and personal computers • software and IPRs • hacking • Internet and bandwidth • privacy and protection from malicious individuals • dependency in the age of informational capitalism • Cloud computing
  • 10. 10 Conceptualising computers and ethics  Software  Hacking  the Internet  the Cloud “Computer and information technology creates new possibilities; it instruments human action in new ways. The ethical issues that are thereby created are not out of the realm of human under-standing, but they have unique features with which we must come to grips.” (Johnson)
  • 11. 11 Business computer ethics • Ethical behaviour as essential to maintaining trust that is the basis for doing business: – clients, customers and suppliers – competitors, especially when collaborating – employees, shareholders and stakeholders empirical observation: “ethical behaviour works” (Langford) • Computers pervasive in all aspects of business, and businesses of all sizes are highly dependent upon them • Computers allow very complex processes to take place which are not transparent to consumers or regulators
  • 12. 12 What does secrecy mean in a virtual social environment? • Privacy • Anonymity • Identity • Security • Confidentiality
  • 13. 13 Privacy Theories of privacy: – Non-intrusion privacy: being free from interruption and interference – Seclusion privacy: personal privacy and being alone – Control/access privacy: having control over information about oneself – Limitation privacy: context-dependent limits to access to one’s personal information
  • 14. 14 Internet privacy • Datagathering and cyberstalking • Dataveillance • Merging electronic records • Personal data mining • Search engines • Social networking online What is properly personal and private, and what is in the public domain?
  • 15. 15 Identity in the virtual world • Personal, social and legal identity • Aliases • Constructed identities • Digital effigies