SlideShare uma empresa Scribd logo
1 de 14
The meaning of ‘Ethics’
Ethics is a theory or the branch of knowledge that deals with
moral principles. It is an area of study that deals with ideas
about what is right and what is wrong.
ITGS
By Nurul Hanim Hussein Shah
Nurul Hanim Binti Hussein Shah
Main types of ethics:
ITGS
Nurul Hanim Binti Hussein Shah
Reliability and Integrity
ITGS
Reliability refers to how well a computer system
works: if it functions as intended, or fails and
crashes. Integrity refers to the correctness of
data. For example, airports require back up
systems if system fails as it would cause a
catastrophe. Hospitals require integrity data to be
inputted to a patients record as human error
could occur. Potential hacking which can alter
data to be something it is not.
Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘Reliability and Integrity’ is:
From the articles about medical mistakes, it tells us that we know
that the stakeholders for this issue is the doctors and staffs in the
hospital who is controlling the technology allowing to make medical
errors which affects the patients health in that particular hospitals.
Advantages:
http://freakngenius.com/v/c2gXV
Disadvantage:
http://freakngenius.com/v/n2hns
A way to solve this issue from appearing again, the stakeholders
must propose a way to develop a more reliable and efficient
technology for their product, which is their database to avoid
medical errors.
Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘Reliability and Integrity’ is:
From the articles about apple product jailbreaks, it tells us that we
know that the stakeholders for this issue is the evad3rs team in the
planetbeing profile. According to some of the laws that has applied
to this scenario is that jailbreaks are illegal and that it is considered
a crime in some countries such as Canada the Canadian Copyright
Act. A way to solve this issue from appearing again is that the
stakeholders, the apple company, should propose a way to develop
a more reliable IT system for their products, which is efficient for
the users from all over the world to use it. Unfortunately, there can
be consequences to these decisions which is having difficulties and
problems with their IT system so they have
to do it step by step to assure that their IT
system works properly.
Nurul Hanim Binti Hussein Shah
ITGS
Authenticity
Authenticity involves a user providing their
identity to gain access to a computer
system. For example, username and
Password, Biometric authentications and
finger prints.
Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘Authenticity’ is:
From the articles about security token and smart card
authentication, it tells us that we know that the stakeholders for
this issue is the users of the token/smart card which are the
employees of the company so they have the right identities to the
right people.
Advantages:
http://iyak.it/v/M2hp6
Disadvantage:
http://iyak.it/v/B2hp7
A way to solve this issue is that the records should be kept of
employees who received a token, and a verification
process should be implemented to ensure that each
specific token is being given to the proper employee.
Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘Authenticity’ is:
From the articles about, ethical issues of data reporting and the
quest for authenticity is that the people who are responsible are the
Society for Academic Emergency Medicine Code of Conduct and
American College of Emergency Physicians Code of Ethics because
of how they need to do an accurate scientific research on how to
improve the authentication of the people all over the world more
efficiently. According to the policies, Authenticity is important in our
life so our datas are kept safe and secure. Unfortunately, some
people these days can hack into your profile by stealing your
identity. A way to solve this, the government needs to provide a
high secure IT system, so that it is hard for people to get into
account. Therefore, the consequences of this solution is that it
might cause people’s life by causing them to be threatened for their
identities.
Nurul Hanim Binti Hussein Shah
ITGS
People and Machines
People and Machines concerns the way
that humans interact with IT. For example,
Many people trust computers intrinsically,
and this has consequences when they fail.
Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘People and Machines’ is:
From the documentary about Medical robot, the stakeholders for
this impact is the builders because of how they are involved in
building this technologies and making sure that they are being used
properly and correctly.
Advantages:
The advantage of this that the IT system works more efficiently and
prevents from human-errors to a appear.
Disadvantage:
The disadvantage is that it needs to work in a safer and suitable
environment so it doesn’t get distracted to other environments such
as a busy and crowded environment.
A way to solve this issue is that they just have to keep the IT
system in a well-secured and safe environment.
Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘People and Machines’ is:
From the articles about ergonomics is that it tells us that the people
who are responsible for this issue are the builders and the people
who might be affected by this issue are the users of the IT system.
There are laws to this issue which is that people needs to know how
the system works. Therefore to prevent the issue of the way of how
people connect with the machine is that they need to have full
knowledge on how they have to use the IT system correctly.
The consequence of this decision that some people might have a
hard time catching up to
things.
Nurul Hanim Binti Hussein Shah
ITGS
Digital Citizenship
Digital citizenship involves being a good
citizen in a digital world. For example,
using websites and social networking sites
correctly and safely according to the given
policies.
Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘Digital Citizenship’ is:
In the article about ‘Being a good digital citizen includes both rights
and responsibilities’ tells us that the stakeholders of this article are
the users of the social networking websites since they need to know
how to communicate with people correctly.
Advantages:
The advantage of this is that people who are using the website and
social networking can communicate easily and safely with other
users when they are following the rules.
Disadvantage:
The disadvantage is that some people might ignore these rules and
causing cyber bullying to occur and this may affect the victim of
cyber-bullying’s health.
A way to solve this problem is that government should take
advantage to prevent this issue from occurring in a daily basis.
Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘Digital Citizenship’ is:
From this article, it tells us that the people who are responsible in
this issue are the creator of social networking sites and the one who
is affected by it are the social networkers and users of this IT
system. The law for this issue is that it needs to be used correctly.
Unfortunately, Twitter have played a role in the organization of the
protests, it (along with Facebook) was widely used as a
communication tool by the opposition. Although the Islamic
republic’s government also tried to enforce a ban against foreign
media coverage of the uprising, dissident supporters and journalists
kicked its censorship decree in the proverbial nards. Digital citizens
everywhere took to the virtual streets, protecting the anonymity of
Iran’s in-country news sources while spreading real-time
information across every channel possible. To avoid this from
occurring, social networkers need to be aware of the way that
socialize in public.

Mais conteúdo relacionado

Destaque

Ebook 5 cles pour repenser son plan d action commercial avec le digital
Ebook 5 cles pour repenser son plan d action commercial avec le digitalEbook 5 cles pour repenser son plan d action commercial avec le digital
Ebook 5 cles pour repenser son plan d action commercial avec le digitalSextant Business Development
 
Metodologia del tast de vins
Metodologia del tast de vinsMetodologia del tast de vins
Metodologia del tast de vinsPepdeBot
 
рівняння 6кл
рівняння 6клрівняння 6кл
рівняння 6клlanapoluhovich
 
Design and Analysis of Fin-X Technology
Design and Analysis of Fin-X Technology Design and Analysis of Fin-X Technology
Design and Analysis of Fin-X Technology Nitish Sharma
 
Media Institutions
Media InstitutionsMedia Institutions
Media InstitutionsUmbreen97
 
Ladap moral
Ladap moralLadap moral
Ladap moralWar Head
 
Report on Business Plan Of Handyperson services (Solution King).
Report on Business Plan Of Handyperson services (Solution King).Report on Business Plan Of Handyperson services (Solution King).
Report on Business Plan Of Handyperson services (Solution King).Somil Shah
 
Sio architech - conservazione sostitutiva - Cep Solutions SIOGERE
Sio architech - conservazione sostitutiva - Cep Solutions SIOGERESio architech - conservazione sostitutiva - Cep Solutions SIOGERE
Sio architech - conservazione sostitutiva - Cep Solutions SIOGERECEP Solutions
 
Presentazione Istituzionale Cep solutions - SIOGERE
Presentazione Istituzionale Cep solutions - SIOGEREPresentazione Istituzionale Cep solutions - SIOGERE
Presentazione Istituzionale Cep solutions - SIOGERECEP Solutions
 
Articulo unefa agresividad y rendimiento
Articulo unefa agresividad y rendimientoArticulo unefa agresividad y rendimiento
Articulo unefa agresividad y rendimientoLisbeth Villalobos
 
1264828 634582289833352500
1264828 6345822898333525001264828 634582289833352500
1264828 634582289833352500Rhea Ghosh
 
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...closegap
 
Pasos para descargar archivos marcela
Pasos para descargar archivos marcelaPasos para descargar archivos marcela
Pasos para descargar archivos marcelaLerin Ochoa
 
Media evaluation question 1
Media evaluation question 1Media evaluation question 1
Media evaluation question 1LydiaJJJ
 
Port city inc professional presenttation
Port city inc professional presenttationPort city inc professional presenttation
Port city inc professional presenttationJack Arnold
 
6 keys to qualifying your target audience and sending them relevant messages
6 keys to qualifying your target audience and sending them relevant messages6 keys to qualifying your target audience and sending them relevant messages
6 keys to qualifying your target audience and sending them relevant messagesSextant Business Development
 

Destaque (20)

Ebook 5 cles pour repenser son plan d action commercial avec le digital
Ebook 5 cles pour repenser son plan d action commercial avec le digitalEbook 5 cles pour repenser son plan d action commercial avec le digital
Ebook 5 cles pour repenser son plan d action commercial avec le digital
 
Baocaothuctapketoan
Baocaothuctapketoan Baocaothuctapketoan
Baocaothuctapketoan
 
Metodologia del tast de vins
Metodologia del tast de vinsMetodologia del tast de vins
Metodologia del tast de vins
 
Islamproject
IslamprojectIslamproject
Islamproject
 
рівняння 6кл
рівняння 6клрівняння 6кл
рівняння 6кл
 
Design and Analysis of Fin-X Technology
Design and Analysis of Fin-X Technology Design and Analysis of Fin-X Technology
Design and Analysis of Fin-X Technology
 
Media Institutions
Media InstitutionsMedia Institutions
Media Institutions
 
Ladap moral
Ladap moralLadap moral
Ladap moral
 
Sukses belajar
Sukses belajarSukses belajar
Sukses belajar
 
Report on Business Plan Of Handyperson services (Solution King).
Report on Business Plan Of Handyperson services (Solution King).Report on Business Plan Of Handyperson services (Solution King).
Report on Business Plan Of Handyperson services (Solution King).
 
Sio architech - conservazione sostitutiva - Cep Solutions SIOGERE
Sio architech - conservazione sostitutiva - Cep Solutions SIOGERESio architech - conservazione sostitutiva - Cep Solutions SIOGERE
Sio architech - conservazione sostitutiva - Cep Solutions SIOGERE
 
Analysis
AnalysisAnalysis
Analysis
 
Presentazione Istituzionale Cep solutions - SIOGERE
Presentazione Istituzionale Cep solutions - SIOGEREPresentazione Istituzionale Cep solutions - SIOGERE
Presentazione Istituzionale Cep solutions - SIOGERE
 
Articulo unefa agresividad y rendimiento
Articulo unefa agresividad y rendimientoArticulo unefa agresividad y rendimiento
Articulo unefa agresividad y rendimiento
 
1264828 634582289833352500
1264828 6345822898333525001264828 634582289833352500
1264828 634582289833352500
 
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...
 
Pasos para descargar archivos marcela
Pasos para descargar archivos marcelaPasos para descargar archivos marcela
Pasos para descargar archivos marcela
 
Media evaluation question 1
Media evaluation question 1Media evaluation question 1
Media evaluation question 1
 
Port city inc professional presenttation
Port city inc professional presenttationPort city inc professional presenttation
Port city inc professional presenttation
 
6 keys to qualifying your target audience and sending them relevant messages
6 keys to qualifying your target audience and sending them relevant messages6 keys to qualifying your target audience and sending them relevant messages
6 keys to qualifying your target audience and sending them relevant messages
 

Semelhante a Understanding the meaning and types of ethics in IT systems

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Why Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdfWhy Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdfAnshulsharma874284
 
Exploring AI Ethics_ Challenges, Solutions, and Significance
Exploring AI Ethics_ Challenges, Solutions, and SignificanceExploring AI Ethics_ Challenges, Solutions, and Significance
Exploring AI Ethics_ Challenges, Solutions, and SignificanceBluebash LLC
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toAli Zeinoddini Meymand
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptisaacmendoza76
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 

Semelhante a Understanding the meaning and types of ethics in IT systems (9)

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Nine Elements
Nine ElementsNine Elements
Nine Elements
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Why Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdfWhy Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdf
 
Exploring AI Ethics_ Challenges, Solutions, and Significance
Exploring AI Ethics_ Challenges, Solutions, and SignificanceExploring AI Ethics_ Challenges, Solutions, and Significance
Exploring AI Ethics_ Challenges, Solutions, and Significance
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related to
 
Artificial Intelligence (AI) and Human Rights.pptx
Artificial Intelligence (AI) and Human Rights.pptxArtificial Intelligence (AI) and Human Rights.pptx
Artificial Intelligence (AI) and Human Rights.pptx
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Understanding the meaning and types of ethics in IT systems

  • 1. The meaning of ‘Ethics’ Ethics is a theory or the branch of knowledge that deals with moral principles. It is an area of study that deals with ideas about what is right and what is wrong. ITGS By Nurul Hanim Hussein Shah
  • 2. Nurul Hanim Binti Hussein Shah Main types of ethics: ITGS
  • 3. Nurul Hanim Binti Hussein Shah Reliability and Integrity ITGS Reliability refers to how well a computer system works: if it functions as intended, or fails and crashes. Integrity refers to the correctness of data. For example, airports require back up systems if system fails as it would cause a catastrophe. Hospitals require integrity data to be inputted to a patients record as human error could occur. Potential hacking which can alter data to be something it is not.
  • 4. Nurul Hanim Binti Hussein Shah Social Impacts: ITGS An example of social impacts in ‘Reliability and Integrity’ is: From the articles about medical mistakes, it tells us that we know that the stakeholders for this issue is the doctors and staffs in the hospital who is controlling the technology allowing to make medical errors which affects the patients health in that particular hospitals. Advantages: http://freakngenius.com/v/c2gXV Disadvantage: http://freakngenius.com/v/n2hns A way to solve this issue from appearing again, the stakeholders must propose a way to develop a more reliable and efficient technology for their product, which is their database to avoid medical errors.
  • 5. Nurul Hanim Binti Hussein Shah ITGS Ethical Issues: An example of ethical issues in ‘Reliability and Integrity’ is: From the articles about apple product jailbreaks, it tells us that we know that the stakeholders for this issue is the evad3rs team in the planetbeing profile. According to some of the laws that has applied to this scenario is that jailbreaks are illegal and that it is considered a crime in some countries such as Canada the Canadian Copyright Act. A way to solve this issue from appearing again is that the stakeholders, the apple company, should propose a way to develop a more reliable IT system for their products, which is efficient for the users from all over the world to use it. Unfortunately, there can be consequences to these decisions which is having difficulties and problems with their IT system so they have to do it step by step to assure that their IT system works properly.
  • 6. Nurul Hanim Binti Hussein Shah ITGS Authenticity Authenticity involves a user providing their identity to gain access to a computer system. For example, username and Password, Biometric authentications and finger prints.
  • 7. Nurul Hanim Binti Hussein Shah Social Impacts: ITGS An example of social impacts in ‘Authenticity’ is: From the articles about security token and smart card authentication, it tells us that we know that the stakeholders for this issue is the users of the token/smart card which are the employees of the company so they have the right identities to the right people. Advantages: http://iyak.it/v/M2hp6 Disadvantage: http://iyak.it/v/B2hp7 A way to solve this issue is that the records should be kept of employees who received a token, and a verification process should be implemented to ensure that each specific token is being given to the proper employee.
  • 8. Nurul Hanim Binti Hussein Shah ITGS Ethical Issues: An example of ethical issues in ‘Authenticity’ is: From the articles about, ethical issues of data reporting and the quest for authenticity is that the people who are responsible are the Society for Academic Emergency Medicine Code of Conduct and American College of Emergency Physicians Code of Ethics because of how they need to do an accurate scientific research on how to improve the authentication of the people all over the world more efficiently. According to the policies, Authenticity is important in our life so our datas are kept safe and secure. Unfortunately, some people these days can hack into your profile by stealing your identity. A way to solve this, the government needs to provide a high secure IT system, so that it is hard for people to get into account. Therefore, the consequences of this solution is that it might cause people’s life by causing them to be threatened for their identities.
  • 9. Nurul Hanim Binti Hussein Shah ITGS People and Machines People and Machines concerns the way that humans interact with IT. For example, Many people trust computers intrinsically, and this has consequences when they fail.
  • 10. Nurul Hanim Binti Hussein Shah Social Impacts: ITGS An example of social impacts in ‘People and Machines’ is: From the documentary about Medical robot, the stakeholders for this impact is the builders because of how they are involved in building this technologies and making sure that they are being used properly and correctly. Advantages: The advantage of this that the IT system works more efficiently and prevents from human-errors to a appear. Disadvantage: The disadvantage is that it needs to work in a safer and suitable environment so it doesn’t get distracted to other environments such as a busy and crowded environment. A way to solve this issue is that they just have to keep the IT system in a well-secured and safe environment.
  • 11. Nurul Hanim Binti Hussein Shah ITGS Ethical Issues: An example of ethical issues in ‘People and Machines’ is: From the articles about ergonomics is that it tells us that the people who are responsible for this issue are the builders and the people who might be affected by this issue are the users of the IT system. There are laws to this issue which is that people needs to know how the system works. Therefore to prevent the issue of the way of how people connect with the machine is that they need to have full knowledge on how they have to use the IT system correctly. The consequence of this decision that some people might have a hard time catching up to things.
  • 12. Nurul Hanim Binti Hussein Shah ITGS Digital Citizenship Digital citizenship involves being a good citizen in a digital world. For example, using websites and social networking sites correctly and safely according to the given policies.
  • 13. Nurul Hanim Binti Hussein Shah Social Impacts: ITGS An example of social impacts in ‘Digital Citizenship’ is: In the article about ‘Being a good digital citizen includes both rights and responsibilities’ tells us that the stakeholders of this article are the users of the social networking websites since they need to know how to communicate with people correctly. Advantages: The advantage of this is that people who are using the website and social networking can communicate easily and safely with other users when they are following the rules. Disadvantage: The disadvantage is that some people might ignore these rules and causing cyber bullying to occur and this may affect the victim of cyber-bullying’s health. A way to solve this problem is that government should take advantage to prevent this issue from occurring in a daily basis.
  • 14. Nurul Hanim Binti Hussein Shah ITGS Ethical Issues: An example of ethical issues in ‘Digital Citizenship’ is: From this article, it tells us that the people who are responsible in this issue are the creator of social networking sites and the one who is affected by it are the social networkers and users of this IT system. The law for this issue is that it needs to be used correctly. Unfortunately, Twitter have played a role in the organization of the protests, it (along with Facebook) was widely used as a communication tool by the opposition. Although the Islamic republic’s government also tried to enforce a ban against foreign media coverage of the uprising, dissident supporters and journalists kicked its censorship decree in the proverbial nards. Digital citizens everywhere took to the virtual streets, protecting the anonymity of Iran’s in-country news sources while spreading real-time information across every channel possible. To avoid this from occurring, social networkers need to be aware of the way that socialize in public.