SlideShare a Scribd company logo
1 of 32
Chapter 5
Ethical Implications ofEthical Implications of
Information TechnologyInformation Technology
MANAGEMENT INFORMATION SYSTEMS 8/E
Raymond McLeod and George Schell
Copyright 2001 Prentice-Hall, Inc.
5-1
Socially Conscionable CitizensSocially Conscionable Citizens
MoralsMorals
– Traditions of right and wrongTraditions of right and wrong
EthicsEthics
– Suite of guiding beliefs, standards, or ideals thatSuite of guiding beliefs, standards, or ideals that
promote an individual or communitypromote an individual or community
LawsLaws
– Formal rules of conduct that a sovereign authorityFormal rules of conduct that a sovereign authority
imposes on its citizensimposes on its citizens
5-2
Pirated SoftwarePirated Software
Software that is illegally copied and then usedSoftware that is illegally copied and then used
or soldor sold
– 35% in U.S.35% in U.S.
– 92% in Japan92% in Japan
– 99% in Thailand99% in Thailand
Some cultures encourage sharingSome cultures encourage sharing
5-3
Laws Lag BehindLaws Lag Behind
First computer crimeFirst computer crime
– In 1966, a programmer used computer code to keepIn 1966, a programmer used computer code to keep
his checking account from being flagged ashis checking account from being flagged as
overdrawn.overdrawn.
– When the bank discovered the crime theWhen the bank discovered the crime the
programmer could not be charged with a computerprogrammer could not be charged with a computer
crime because no computer crime law existed.crime because no computer crime law existed.
– He was charged with making false bank records.He was charged with making false bank records.
5-4
U.S. Computer LegislationU.S. Computer Legislation
Freedom of Information Act of 1966Freedom of Information Act of 1966
– Gave citizens and organizations the right to accessGave citizens and organizations the right to access
data held by the federal governmentdata held by the federal government
Fair Credit Reporting Act of 1970Fair Credit Reporting Act of 1970
– Dealt with handling of credit dataDealt with handling of credit data
Right to Federal Privacy Act of 1978Right to Federal Privacy Act of 1978
– Limited government’s ability to search bank recordsLimited government’s ability to search bank records
5-5
U.S. Computer Legislation (cont.)U.S. Computer Legislation (cont.)
Small Business Computer Security andSmall Business Computer Security and
Education Act (1984)Education Act (1984)
– Advises Congress on matters relating to computerAdvises Congress on matters relating to computer
crime against small businessescrime against small businesses
Counterfeit Access Device and Computer FraudCounterfeit Access Device and Computer Fraud
and Abuse Actand Abuse Act
– Makes it a crime to gain unauthorized informationMakes it a crime to gain unauthorized information
pertaining to national security or foreign relationspertaining to national security or foreign relations
and provides other protectionand provides other protection
5-6
U.S. Computer Legislation (cont.)U.S. Computer Legislation (cont.)
In 1986, Electronic Communications PrivacyIn 1986, Electronic Communications Privacy
Act was rewritten to cover digital, data, andAct was rewritten to cover digital, data, and
video communicationsvideo communications
– Included special section on emailIncluded special section on email
Computer Matching and Privacy Act of 1988Computer Matching and Privacy Act of 1988
– Restricts government’s right to match computerRestricts government’s right to match computer
files for the purpose of determining eligibility forfiles for the purpose of determining eligibility for
government programs or identifying debtorsgovernment programs or identifying debtors
5-7
Imposing an Ethics CultureImposing an Ethics Culture
Corporate credoCorporate credo
– Succinct statement of values a firm seeks to upholdSuccinct statement of values a firm seeks to uphold
Ethics programsEthics programs
– System of multiple activities designed to provideSystem of multiple activities designed to provide
employees with direction in carrying out corporateemployees with direction in carrying out corporate
credocredo
Tailored corporate codesTailored corporate codes
– Codes of ethics for a particular organization orCodes of ethics for a particular organization or
industryindustry
5-8
2. Establish
ethics
programs
3. Establish
corporate
ethics code
1. Establish
corporate
credo
Top-level Management
Imposes the Ethics Culture
In a Top-down Manner
An Ethics
Culture
5-9
Example of a Corporate CredoExample of a Corporate Credo
Commitment to customer:
The first commitment is to provide our customers with
quality products and services that are innovative and
technologically responsive to their current requirements
at appropriate prices. To perform these tasks with integrity
requires that we maintain confidentiality and protect
customer privacy, promote customer satisfaction, and
serve customer needs. We strive to serve qualified
customers and industries that are socially responsible
according to broadly accepted community and company
standards.
5-10
Ethics AuditEthics Audit
Internal auditor meets with a manager for theInternal auditor meets with a manager for the
purpose of learning how the manager’s unit ispurpose of learning how the manager’s unit is
carrying out the corporate credocarrying out the corporate credo
5-11
Computer EthicsComputer Ethics
Analysis of the nature and social impact ofAnalysis of the nature and social impact of
computer technology as well as correspondingcomputer technology as well as corresponding
formulation and justification of policies for theformulation and justification of policies for the
ethical use of such technologyethical use of such technology
5-12
Responsibility forResponsibility for
Computer EthicsComputer Ethics
CIO holds primary responsibilityCIO holds primary responsibility
CIO Must:CIO Must:
– Be aware of how the computer is affecting societyBe aware of how the computer is affecting society
– Do something about this by formulating policies toDo something about this by formulating policies to
ensure technology is being used in the right wayensure technology is being used in the right way
5-13
Importance of Computer EthicsImportance of Computer Ethics
Logical malleabilityLogical malleability
– Ability to program computer to do anything youAbility to program computer to do anything you
want it to dowant it to do
The transformation factorThe transformation factor
– Computers can change the way things are doneComputers can change the way things are done
The invisibility factorThe invisibility factor
– Invisible programmingInvisible programming
– Invisible complex calculationsInvisible complex calculations
– Invisible abuseInvisible abuse
5-14
Rights to the ComputerRights to the Computer
Right to computer accessRight to computer access
Right to computer skillsRight to computer skills
Right to computer specialistsRight to computer specialists
Right to computer decision makingRight to computer decision making
5-15
Rights to InformationRights to Information
Right to privacyRight to privacy
Right to accuracyRight to accuracy
Right to propertyRight to property
Right to accessRight to access
5-16
Social Contract of ISSocial Contract of IS
• The computer will not be used to unduly invadeThe computer will not be used to unduly invade
a person’s privacya person’s privacy
• Every measure will be taken to ensure theEvery measure will be taken to ensure the
accuracy of computer processingaccuracy of computer processing
• The sanctity of intellectual property will beThe sanctity of intellectual property will be
protectedprotected
• The computer will be made accessible toThe computer will be made accessible to
society so that its members can avoid thesociety so that its members can avoid the
indignities of information illiteracy andindignities of information illiteracy and
deprivationdeprivation 5-17
Ethics and the CIOEthics and the CIO
Perceptions of the CIO’s EthicsPerceptions of the CIO’s Ethics
– Do not take advantage of opportunities to actDo not take advantage of opportunities to act
unethicallyunethically
– Ethics breeds successEthics breeds success
– Firms and managers have social responsibilitiesFirms and managers have social responsibilities
– Managers back up their ethics beliefs with actionManagers back up their ethics beliefs with action
5-18
The CIO is Influenced by aThe CIO is Influenced by a
Hierarchy of FactorsHierarchy of Factors
Office of the
CIO
LawsLaws
CorporateCorporate
ethics cultureethics culture
SocialSocial
pressurepressure
ProfessionalProfessional
codes of ethicscodes of ethics
PersonalPersonal
pressurespressures
5-19
CIOs Usually Do Not Act UnethicallyCIOs Usually Do Not Act Unethically
There are many opportunities for 47.5 37.7
MIS managers in my company to
engage in unethical behavior.
MIS managers in my company 19.7 80.3
engage in behaviors that I
consider to be unethical.
Question Agree Disagree
5-20
Ethics and SuccessEthics and Success
PercentPercent PercentPercent
QuestionQuestion AgreeAgree DisagreeDisagree
Successful MIS managers in my company areSuccessful MIS managers in my company are
generally more ethical than unsuccessfulgenerally more ethical than unsuccessful
managers.managers. 73.8 13.173.8 13.1
In order to succeed in my company it isIn order to succeed in my company it is
often necessary to compromise one's ethics.often necessary to compromise one's ethics. 18.0 75.418.0 75.4
Successful managers in my company withholdSuccessful managers in my company withhold
information that is detrimental to theirinformation that is detrimental to their
self-interest.self-interest. 21.3 50.821.3 50.8
5-21
Ethics (cont.)Ethics (cont.)
PercentPercent PercentPercent
QuestionQuestion AgreeAgree DisagreeDisagree
Successful managers in my company makeSuccessful managers in my company make
rivals look bad in the eyes of importantrivals look bad in the eyes of important
people in my company.people in my company. 23.0 59.023.0 59.0
Successful managers in my company look forSuccessful managers in my company look for
a scapegoat when they feel they may bea scapegoat when they feel they may be
associated with failure.associated with failure. 23.0 67.223.0 67.2
Successful managers in my company takeSuccessful managers in my company take
credit for the ideas and accomplishmentscredit for the ideas and accomplishments
of others.of others. 16.4 75.416.4 75.4
5-22
Corporate Social ResponsibilityCorporate Social Responsibility
PercentPercent PercentPercent
QuestionQuestion AgreeAgree DisagreeDisagree
The socially responsible manager mustThe socially responsible manager must
occasionally place the interests of societyoccasionally place the interests of society
over the interests of the company.over the interests of the company. 68.9 21.368.9 21.3
The fact that corporations have greatThe fact that corporations have great
economic power in our society means that theyeconomic power in our society means that they
have a social responsibility beyond thehave a social responsibility beyond the
interests of the shareholders.interests of the shareholders. 96.7 3.396.7 3.3
As long as corporations generate acceptableAs long as corporations generate acceptable
shareholder returns, managers have a socialshareholder returns, managers have a social
responsibility beyond the interests ofresponsibility beyond the interests of
shareholders.shareholders. 70.5 16.470.5 16.4 5-23
Achieving an EthicalAchieving an Ethical
Computer OperationComputer Operation
1.1. Formulate a code of conduct.Formulate a code of conduct.
2.2. Establish rules of procedure relating to such issues asEstablish rules of procedure relating to such issues as
personal use of computer services and proprietarypersonal use of computer services and proprietary
rights to computer programs and data.rights to computer programs and data.
3.3. Make clear the sanctions that will be taken againstMake clear the sanctions that will be taken against
offenders-such as reprimands, termination, and civiloffenders-such as reprimands, termination, and civil
action.action.
4.4. Recognize ethical behavior.Recognize ethical behavior.
5-24Parker’s 10-Step Action Plan
Achieving an EthicalAchieving an Ethical
Computer Operation (cont.)Computer Operation (cont.)
5.5. Focus attention on ethics by means of such programsFocus attention on ethics by means of such programs
as training sessions and required reading.as training sessions and required reading.
6.6. Promote computer crime laws by keeping employeesPromote computer crime laws by keeping employees
informed.informed.
7.7. Keep a formal record that establishes accountabilityKeep a formal record that establishes accountability
of each information specialist for her or his actions,of each information specialist for her or his actions,
and also minimizes the temptations for violations byand also minimizes the temptations for violations by
means of such programs as ethics audits.means of such programs as ethics audits.
5-25
Parker’s 10-Step Action Plan
Achieving an EthicalAchieving an Ethical
Computer Operation (cont.)Computer Operation (cont.)
8.8. Encourage the use of rehabilitation programs that treatEncourage the use of rehabilitation programs that treat
ethics violators in the same way that corporations showethics violators in the same way that corporations show
concern for the recovery of alcoholics or drug offenders.concern for the recovery of alcoholics or drug offenders.
9.9. Encourage participation in professional societies.Encourage participation in professional societies.
10.10. Set an example.Set an example.
5-26Parker’s 10-Step Action Plan
Ethics PerspectiveEthics Perspective
Severe social problems exist becauseSevere social problems exist because
government and business organizations havegovernment and business organizations have
failed to uphold the highest ethical standards infailed to uphold the highest ethical standards in
computer usecomputer use
– Invasion of privacyInvasion of privacy
– Software piracySoftware piracy
CIOs can make a differenceCIOs can make a difference
5-27
An Information ServicesAn Information Services
Code of ConductCode of Conduct
Conduct all activities in a manner that precludesConduct all activities in a manner that precludes
any form of dishonestyany form of dishonesty
Avoid any act that compromises integrityAvoid any act that compromises integrity
Avoid any act that might create a dangerousAvoid any act that might create a dangerous
situationsituation
Not use alcohol or drugs while at workNot use alcohol or drugs while at work
5-28See Figure 5.4
An Information ServicesAn Information Services
Code of Conduct (cont.)Code of Conduct (cont.)
Maintain courteous and professional relationsMaintain courteous and professional relations
with users, associates, and supervisorswith users, associates, and supervisors
Adhere to the no-solicitation rule and any otherAdhere to the no-solicitation rule and any other
employment policyemployment policy
5-29See Figure 5.4
An Information ServicesAn Information Services
Code of Conduct (cont.)Code of Conduct (cont.)
Protect confidentiality of sensitive informationProtect confidentiality of sensitive information
about the organization’s competitive position,about the organization’s competitive position,
trade secrets, or assetstrade secrets, or assets
Exercise sound business practice in theExercise sound business practice in the
management of such company resources suchmanagement of such company resources such
as personnel, computer use, outside services,as personnel, computer use, outside services,
travel, and entertainmenttravel, and entertainment
5-30See Figure 5.4
SummarySummary
Morals, laws, and ethics govern behaviorMorals, laws, and ethics govern behavior
Early yearsEarly years
– No computer lawsNo computer laws
– Easy to bypass regulationEasy to bypass regulation
Executives impose ethical cultureExecutives impose ethical culture
Computer ethics require executive to put properComputer ethics require executive to put proper
policies in placepolicies in place
5-31
Summary [cont.]Summary [cont.]
Society places importance on computer ethicsSociety places importance on computer ethics
– Logical malleabilityLogical malleability
– Transforming ways of livingTransforming ways of living
– Processes are hidden from viewProcesses are hidden from view
Societal rights in relation to the computerSocietal rights in relation to the computer
5-32

More Related Content

What's hot

Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Habib Noroozi
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IPipspat
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse finalFLUZO
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management CAMT
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit iArthyR3
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingDan Michaluk
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyDan Michaluk
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee PrivacyDan Michaluk
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development Polsinelli PC
 

What's hot (20)

Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse final
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Review questions
Review questionsReview questions
Review questions
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
 
AI and the Law
AI and the LawAI and the Law
AI and the Law
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee Privacy
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development
 

Viewers also liked

Fast start tv b#1 p9_tela_modelo_negocio
Fast start tv b#1 p9_tela_modelo_negocioFast start tv b#1 p9_tela_modelo_negocio
Fast start tv b#1 p9_tela_modelo_negociofabricastartups
 
recruitDC Networking Lunch Feedback
recruitDC Networking Lunch FeedbackrecruitDC Networking Lunch Feedback
recruitDC Networking Lunch FeedbackRecruitDC
 
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Elsevier
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliographyyalston2
 
Wfc 44 vi_08_12.3.08_2
Wfc 44 vi_08_12.3.08_2Wfc 44 vi_08_12.3.08_2
Wfc 44 vi_08_12.3.08_2Dong Pham The
 
SchoolForce Roadshow
SchoolForce RoadshowSchoolForce Roadshow
SchoolForce RoadshowMarty Young
 

Viewers also liked (7)

bbt
bbtbbt
bbt
 
Fast start tv b#1 p9_tela_modelo_negocio
Fast start tv b#1 p9_tela_modelo_negocioFast start tv b#1 p9_tela_modelo_negocio
Fast start tv b#1 p9_tela_modelo_negocio
 
recruitDC Networking Lunch Feedback
recruitDC Networking Lunch FeedbackrecruitDC Networking Lunch Feedback
recruitDC Networking Lunch Feedback
 
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliography
 
Wfc 44 vi_08_12.3.08_2
Wfc 44 vi_08_12.3.08_2Wfc 44 vi_08_12.3.08_2
Wfc 44 vi_08_12.3.08_2
 
SchoolForce Roadshow
SchoolForce RoadshowSchoolForce Roadshow
SchoolForce Roadshow
 

Similar to Ethical Implications of Information Technology

SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10Welly Tjoe
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2MLG College of Learning, Inc
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxJhaiJhai6
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 

Similar to Ethical Implications of Information Technology (20)

Chap05
Chap05Chap05
Chap05
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
MIS chap # 10..
MIS chap # 10..MIS chap # 10..
MIS chap # 10..
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Lesson 2-Identify Theft
Lesson 2-Identify TheftLesson 2-Identify Theft
Lesson 2-Identify Theft
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptx
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Ethical Implications of Information Technology

  • 1. Chapter 5 Ethical Implications ofEthical Implications of Information TechnologyInformation Technology MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell Copyright 2001 Prentice-Hall, Inc. 5-1
  • 2. Socially Conscionable CitizensSocially Conscionable Citizens MoralsMorals – Traditions of right and wrongTraditions of right and wrong EthicsEthics – Suite of guiding beliefs, standards, or ideals thatSuite of guiding beliefs, standards, or ideals that promote an individual or communitypromote an individual or community LawsLaws – Formal rules of conduct that a sovereign authorityFormal rules of conduct that a sovereign authority imposes on its citizensimposes on its citizens 5-2
  • 3. Pirated SoftwarePirated Software Software that is illegally copied and then usedSoftware that is illegally copied and then used or soldor sold – 35% in U.S.35% in U.S. – 92% in Japan92% in Japan – 99% in Thailand99% in Thailand Some cultures encourage sharingSome cultures encourage sharing 5-3
  • 4. Laws Lag BehindLaws Lag Behind First computer crimeFirst computer crime – In 1966, a programmer used computer code to keepIn 1966, a programmer used computer code to keep his checking account from being flagged ashis checking account from being flagged as overdrawn.overdrawn. – When the bank discovered the crime theWhen the bank discovered the crime the programmer could not be charged with a computerprogrammer could not be charged with a computer crime because no computer crime law existed.crime because no computer crime law existed. – He was charged with making false bank records.He was charged with making false bank records. 5-4
  • 5. U.S. Computer LegislationU.S. Computer Legislation Freedom of Information Act of 1966Freedom of Information Act of 1966 – Gave citizens and organizations the right to accessGave citizens and organizations the right to access data held by the federal governmentdata held by the federal government Fair Credit Reporting Act of 1970Fair Credit Reporting Act of 1970 – Dealt with handling of credit dataDealt with handling of credit data Right to Federal Privacy Act of 1978Right to Federal Privacy Act of 1978 – Limited government’s ability to search bank recordsLimited government’s ability to search bank records 5-5
  • 6. U.S. Computer Legislation (cont.)U.S. Computer Legislation (cont.) Small Business Computer Security andSmall Business Computer Security and Education Act (1984)Education Act (1984) – Advises Congress on matters relating to computerAdvises Congress on matters relating to computer crime against small businessescrime against small businesses Counterfeit Access Device and Computer FraudCounterfeit Access Device and Computer Fraud and Abuse Actand Abuse Act – Makes it a crime to gain unauthorized informationMakes it a crime to gain unauthorized information pertaining to national security or foreign relationspertaining to national security or foreign relations and provides other protectionand provides other protection 5-6
  • 7. U.S. Computer Legislation (cont.)U.S. Computer Legislation (cont.) In 1986, Electronic Communications PrivacyIn 1986, Electronic Communications Privacy Act was rewritten to cover digital, data, andAct was rewritten to cover digital, data, and video communicationsvideo communications – Included special section on emailIncluded special section on email Computer Matching and Privacy Act of 1988Computer Matching and Privacy Act of 1988 – Restricts government’s right to match computerRestricts government’s right to match computer files for the purpose of determining eligibility forfiles for the purpose of determining eligibility for government programs or identifying debtorsgovernment programs or identifying debtors 5-7
  • 8. Imposing an Ethics CultureImposing an Ethics Culture Corporate credoCorporate credo – Succinct statement of values a firm seeks to upholdSuccinct statement of values a firm seeks to uphold Ethics programsEthics programs – System of multiple activities designed to provideSystem of multiple activities designed to provide employees with direction in carrying out corporateemployees with direction in carrying out corporate credocredo Tailored corporate codesTailored corporate codes – Codes of ethics for a particular organization orCodes of ethics for a particular organization or industryindustry 5-8
  • 9. 2. Establish ethics programs 3. Establish corporate ethics code 1. Establish corporate credo Top-level Management Imposes the Ethics Culture In a Top-down Manner An Ethics Culture 5-9
  • 10. Example of a Corporate CredoExample of a Corporate Credo Commitment to customer: The first commitment is to provide our customers with quality products and services that are innovative and technologically responsive to their current requirements at appropriate prices. To perform these tasks with integrity requires that we maintain confidentiality and protect customer privacy, promote customer satisfaction, and serve customer needs. We strive to serve qualified customers and industries that are socially responsible according to broadly accepted community and company standards. 5-10
  • 11. Ethics AuditEthics Audit Internal auditor meets with a manager for theInternal auditor meets with a manager for the purpose of learning how the manager’s unit ispurpose of learning how the manager’s unit is carrying out the corporate credocarrying out the corporate credo 5-11
  • 12. Computer EthicsComputer Ethics Analysis of the nature and social impact ofAnalysis of the nature and social impact of computer technology as well as correspondingcomputer technology as well as corresponding formulation and justification of policies for theformulation and justification of policies for the ethical use of such technologyethical use of such technology 5-12
  • 13. Responsibility forResponsibility for Computer EthicsComputer Ethics CIO holds primary responsibilityCIO holds primary responsibility CIO Must:CIO Must: – Be aware of how the computer is affecting societyBe aware of how the computer is affecting society – Do something about this by formulating policies toDo something about this by formulating policies to ensure technology is being used in the right wayensure technology is being used in the right way 5-13
  • 14. Importance of Computer EthicsImportance of Computer Ethics Logical malleabilityLogical malleability – Ability to program computer to do anything youAbility to program computer to do anything you want it to dowant it to do The transformation factorThe transformation factor – Computers can change the way things are doneComputers can change the way things are done The invisibility factorThe invisibility factor – Invisible programmingInvisible programming – Invisible complex calculationsInvisible complex calculations – Invisible abuseInvisible abuse 5-14
  • 15. Rights to the ComputerRights to the Computer Right to computer accessRight to computer access Right to computer skillsRight to computer skills Right to computer specialistsRight to computer specialists Right to computer decision makingRight to computer decision making 5-15
  • 16. Rights to InformationRights to Information Right to privacyRight to privacy Right to accuracyRight to accuracy Right to propertyRight to property Right to accessRight to access 5-16
  • 17. Social Contract of ISSocial Contract of IS • The computer will not be used to unduly invadeThe computer will not be used to unduly invade a person’s privacya person’s privacy • Every measure will be taken to ensure theEvery measure will be taken to ensure the accuracy of computer processingaccuracy of computer processing • The sanctity of intellectual property will beThe sanctity of intellectual property will be protectedprotected • The computer will be made accessible toThe computer will be made accessible to society so that its members can avoid thesociety so that its members can avoid the indignities of information illiteracy andindignities of information illiteracy and deprivationdeprivation 5-17
  • 18. Ethics and the CIOEthics and the CIO Perceptions of the CIO’s EthicsPerceptions of the CIO’s Ethics – Do not take advantage of opportunities to actDo not take advantage of opportunities to act unethicallyunethically – Ethics breeds successEthics breeds success – Firms and managers have social responsibilitiesFirms and managers have social responsibilities – Managers back up their ethics beliefs with actionManagers back up their ethics beliefs with action 5-18
  • 19. The CIO is Influenced by aThe CIO is Influenced by a Hierarchy of FactorsHierarchy of Factors Office of the CIO LawsLaws CorporateCorporate ethics cultureethics culture SocialSocial pressurepressure ProfessionalProfessional codes of ethicscodes of ethics PersonalPersonal pressurespressures 5-19
  • 20. CIOs Usually Do Not Act UnethicallyCIOs Usually Do Not Act Unethically There are many opportunities for 47.5 37.7 MIS managers in my company to engage in unethical behavior. MIS managers in my company 19.7 80.3 engage in behaviors that I consider to be unethical. Question Agree Disagree 5-20
  • 21. Ethics and SuccessEthics and Success PercentPercent PercentPercent QuestionQuestion AgreeAgree DisagreeDisagree Successful MIS managers in my company areSuccessful MIS managers in my company are generally more ethical than unsuccessfulgenerally more ethical than unsuccessful managers.managers. 73.8 13.173.8 13.1 In order to succeed in my company it isIn order to succeed in my company it is often necessary to compromise one's ethics.often necessary to compromise one's ethics. 18.0 75.418.0 75.4 Successful managers in my company withholdSuccessful managers in my company withhold information that is detrimental to theirinformation that is detrimental to their self-interest.self-interest. 21.3 50.821.3 50.8 5-21
  • 22. Ethics (cont.)Ethics (cont.) PercentPercent PercentPercent QuestionQuestion AgreeAgree DisagreeDisagree Successful managers in my company makeSuccessful managers in my company make rivals look bad in the eyes of importantrivals look bad in the eyes of important people in my company.people in my company. 23.0 59.023.0 59.0 Successful managers in my company look forSuccessful managers in my company look for a scapegoat when they feel they may bea scapegoat when they feel they may be associated with failure.associated with failure. 23.0 67.223.0 67.2 Successful managers in my company takeSuccessful managers in my company take credit for the ideas and accomplishmentscredit for the ideas and accomplishments of others.of others. 16.4 75.416.4 75.4 5-22
  • 23. Corporate Social ResponsibilityCorporate Social Responsibility PercentPercent PercentPercent QuestionQuestion AgreeAgree DisagreeDisagree The socially responsible manager mustThe socially responsible manager must occasionally place the interests of societyoccasionally place the interests of society over the interests of the company.over the interests of the company. 68.9 21.368.9 21.3 The fact that corporations have greatThe fact that corporations have great economic power in our society means that theyeconomic power in our society means that they have a social responsibility beyond thehave a social responsibility beyond the interests of the shareholders.interests of the shareholders. 96.7 3.396.7 3.3 As long as corporations generate acceptableAs long as corporations generate acceptable shareholder returns, managers have a socialshareholder returns, managers have a social responsibility beyond the interests ofresponsibility beyond the interests of shareholders.shareholders. 70.5 16.470.5 16.4 5-23
  • 24. Achieving an EthicalAchieving an Ethical Computer OperationComputer Operation 1.1. Formulate a code of conduct.Formulate a code of conduct. 2.2. Establish rules of procedure relating to such issues asEstablish rules of procedure relating to such issues as personal use of computer services and proprietarypersonal use of computer services and proprietary rights to computer programs and data.rights to computer programs and data. 3.3. Make clear the sanctions that will be taken againstMake clear the sanctions that will be taken against offenders-such as reprimands, termination, and civiloffenders-such as reprimands, termination, and civil action.action. 4.4. Recognize ethical behavior.Recognize ethical behavior. 5-24Parker’s 10-Step Action Plan
  • 25. Achieving an EthicalAchieving an Ethical Computer Operation (cont.)Computer Operation (cont.) 5.5. Focus attention on ethics by means of such programsFocus attention on ethics by means of such programs as training sessions and required reading.as training sessions and required reading. 6.6. Promote computer crime laws by keeping employeesPromote computer crime laws by keeping employees informed.informed. 7.7. Keep a formal record that establishes accountabilityKeep a formal record that establishes accountability of each information specialist for her or his actions,of each information specialist for her or his actions, and also minimizes the temptations for violations byand also minimizes the temptations for violations by means of such programs as ethics audits.means of such programs as ethics audits. 5-25 Parker’s 10-Step Action Plan
  • 26. Achieving an EthicalAchieving an Ethical Computer Operation (cont.)Computer Operation (cont.) 8.8. Encourage the use of rehabilitation programs that treatEncourage the use of rehabilitation programs that treat ethics violators in the same way that corporations showethics violators in the same way that corporations show concern for the recovery of alcoholics or drug offenders.concern for the recovery of alcoholics or drug offenders. 9.9. Encourage participation in professional societies.Encourage participation in professional societies. 10.10. Set an example.Set an example. 5-26Parker’s 10-Step Action Plan
  • 27. Ethics PerspectiveEthics Perspective Severe social problems exist becauseSevere social problems exist because government and business organizations havegovernment and business organizations have failed to uphold the highest ethical standards infailed to uphold the highest ethical standards in computer usecomputer use – Invasion of privacyInvasion of privacy – Software piracySoftware piracy CIOs can make a differenceCIOs can make a difference 5-27
  • 28. An Information ServicesAn Information Services Code of ConductCode of Conduct Conduct all activities in a manner that precludesConduct all activities in a manner that precludes any form of dishonestyany form of dishonesty Avoid any act that compromises integrityAvoid any act that compromises integrity Avoid any act that might create a dangerousAvoid any act that might create a dangerous situationsituation Not use alcohol or drugs while at workNot use alcohol or drugs while at work 5-28See Figure 5.4
  • 29. An Information ServicesAn Information Services Code of Conduct (cont.)Code of Conduct (cont.) Maintain courteous and professional relationsMaintain courteous and professional relations with users, associates, and supervisorswith users, associates, and supervisors Adhere to the no-solicitation rule and any otherAdhere to the no-solicitation rule and any other employment policyemployment policy 5-29See Figure 5.4
  • 30. An Information ServicesAn Information Services Code of Conduct (cont.)Code of Conduct (cont.) Protect confidentiality of sensitive informationProtect confidentiality of sensitive information about the organization’s competitive position,about the organization’s competitive position, trade secrets, or assetstrade secrets, or assets Exercise sound business practice in theExercise sound business practice in the management of such company resources suchmanagement of such company resources such as personnel, computer use, outside services,as personnel, computer use, outside services, travel, and entertainmenttravel, and entertainment 5-30See Figure 5.4
  • 31. SummarySummary Morals, laws, and ethics govern behaviorMorals, laws, and ethics govern behavior Early yearsEarly years – No computer lawsNo computer laws – Easy to bypass regulationEasy to bypass regulation Executives impose ethical cultureExecutives impose ethical culture Computer ethics require executive to put properComputer ethics require executive to put proper policies in placepolicies in place 5-31
  • 32. Summary [cont.]Summary [cont.] Society places importance on computer ethicsSociety places importance on computer ethics – Logical malleabilityLogical malleability – Transforming ways of livingTransforming ways of living – Processes are hidden from viewProcesses are hidden from view Societal rights in relation to the computerSocietal rights in relation to the computer 5-32

Editor's Notes

  1. 1
  2. 2
  3. 4
  4. 5
  5. 7
  6. 7
  7. 8
  8. 9
  9. 10
  10. 18
  11. 21
  12. 21
  13. 21
  14. 24
  15. 25
  16. 26