SlideShare uma empresa Scribd logo
1 de 19
CHAPTER 3
Ethics and Privacy
CHAPTER OUTLINE
3.1 Ethical Issues
3.2 Privacy
LEARNING OBJECTIVES
1. Define ethics, list and describe the three
fundamental tenets of ethics, and describe the
four categories of ethical issues related to
information technology.
2. Identify three places that store personal
data, and for each one discuss at least one
potential threat to the privacy of the data stored
there.
3.1 Ethical Issues
Ethical Frameworks
Utilitarian approach
Rights approach
Fairness approach
Common good approach
General Framework for Ethics
1. Recognize an ethical issue
2. Get the facts
3. Evaluate alternative actions
4. Make a decision and test it
5. Act and reflect on the outcome of your
decision
Ethics in the Corporate Environment
Code of ethics
Fundamental tenets of ethics
Responsibility
Accountability
Liability
Unethical vs. Illegal
What is unethical is not necessarily illegal.
Ethics scenarios
Ethics and Information Technology
Four categories of ethical issues
involving IT applications:
Privacy Issues
Accuracy Issues
Property Issues
Accessibility Issues
3.2 Privacy
Court decisions have followed two rules:
(1) The right of privacy is not absolute.
Your privacy must be balanced against
the needs of society.
(2) The public’s right to know is superior to
the individual’s right of privacy.
Threats to Privacy
 Data aggregators, digital dossiers, and
profiling
 Electronic Surveillance
 Personal Information in Databases
 Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
Data Aggregators, Digital Dossiers,
and Profiling
© Ilin Sergey/Age Fotostock America, Inc.
Electronic Surveillance
© Ilin Sergey/Age Fotostock America, Inc.
Electronic Surveillance
See "The State of Surveillance" article in
BusinessWeek
See the surveillance slideshow
See additional surveillance slides
And you think you have privacy? (video)
Personal Information in Databases
Banks
Utility companies
Government agencies
Credit reporting agencies
© Nicolas Nadjar/Age Fotostock America, Inc.
Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
© Marina Bordjieva/Age Fotostock America, Inc.
Social Networking Sites Can
Cause You Problems
Anyone can post derogatory information about
you anonymously.
(See this Washington Post article.)
You can also hurt yourself, as this article
shows.
What Can You Do?
First, be careful what information you post on
social networking sites.
Second, a company, ReputationDefender, says
it can remove derogatory information from the
Web.
Protecting Privacy
Privacy Codes and Policies
Opt-out Model Opt-in Model
© Gunnar/Age Fotostock America, Inc.
Chapter Closing Case
• The Problem
• The Solution
• The Results

Mais conteúdo relacionado

Mais procurados

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Seguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de RiesgosSeguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de Riesgosdaylisyfran
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Data Governance and the Internet of Things
Data Governance and the Internet of ThingsData Governance and the Internet of Things
Data Governance and the Internet of ThingsDATAVERSITY
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital AgeJane Prusakova
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 

Mais procurados (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Seguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de RiesgosSeguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de Riesgos
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Data protection
Data protectionData protection
Data protection
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Data Governance and the Internet of Things
Data Governance and the Internet of ThingsData Governance and the Internet of Things
Data Governance and the Internet of Things
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Destaque

Intellectual Property/Copyright/ Ethics
Intellectual Property/Copyright/EthicsIntellectual Property/Copyright/Ethics
Intellectual Property/Copyright/ EthicsNatalia1818
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethicscharwendel
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertynamarias
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethicsakia38321
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Destaque (20)

Ch04
Ch04Ch04
Ch04
 
Intellectual Property/Copyright/ Ethics
Intellectual Property/Copyright/EthicsIntellectual Property/Copyright/Ethics
Intellectual Property/Copyright/ Ethics
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethics
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethics
 
Ethic02
Ethic02Ethic02
Ethic02
 
Review questions
Review questionsReview questions
Review questions
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Semelhante a Chapter 3 ethics and privacy

COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxchristalgrieg
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxshanaeacklam
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework lauricesatu
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 

Semelhante a Chapter 3 ethics and privacy (20)

COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docx
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
E commerce
E commerce E commerce
E commerce
 
Ethical
EthicalEthical
Ethical
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 

Último

VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 

Último (20)

Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 

Chapter 3 ethics and privacy

  • 2. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy
  • 3. LEARNING OBJECTIVES 1. Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 2. Identify three places that store personal data, and for each one discuss at least one potential threat to the privacy of the data stored there.
  • 4. 3.1 Ethical Issues Ethical Frameworks Utilitarian approach Rights approach Fairness approach Common good approach
  • 5. General Framework for Ethics 1. Recognize an ethical issue 2. Get the facts 3. Evaluate alternative actions 4. Make a decision and test it 5. Act and reflect on the outcome of your decision
  • 6. Ethics in the Corporate Environment Code of ethics Fundamental tenets of ethics Responsibility Accountability Liability
  • 7. Unethical vs. Illegal What is unethical is not necessarily illegal. Ethics scenarios
  • 8. Ethics and Information Technology Four categories of ethical issues involving IT applications: Privacy Issues Accuracy Issues Property Issues Accessibility Issues
  • 9. 3.2 Privacy Court decisions have followed two rules: (1) The right of privacy is not absolute. Your privacy must be balanced against the needs of society. (2) The public’s right to know is superior to the individual’s right of privacy.
  • 10. Threats to Privacy  Data aggregators, digital dossiers, and profiling  Electronic Surveillance  Personal Information in Databases  Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
  • 11. Data Aggregators, Digital Dossiers, and Profiling © Ilin Sergey/Age Fotostock America, Inc.
  • 12. Electronic Surveillance © Ilin Sergey/Age Fotostock America, Inc.
  • 13. Electronic Surveillance See "The State of Surveillance" article in BusinessWeek See the surveillance slideshow See additional surveillance slides And you think you have privacy? (video)
  • 14. Personal Information in Databases Banks Utility companies Government agencies Credit reporting agencies © Nicolas Nadjar/Age Fotostock America, Inc.
  • 15. Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites © Marina Bordjieva/Age Fotostock America, Inc.
  • 16. Social Networking Sites Can Cause You Problems Anyone can post derogatory information about you anonymously. (See this Washington Post article.) You can also hurt yourself, as this article shows.
  • 17. What Can You Do? First, be careful what information you post on social networking sites. Second, a company, ReputationDefender, says it can remove derogatory information from the Web.
  • 18. Protecting Privacy Privacy Codes and Policies Opt-out Model Opt-in Model © Gunnar/Age Fotostock America, Inc.
  • 19. Chapter Closing Case • The Problem • The Solution • The Results

Notas do Editor

  1. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness approach: ethical actions treat all humans equally, or if unequally, then fairly, based on some defensible standard. Common good approach: highlights the interlocking relationships that underlie all societies.
  2. A Code of Ethics is a collection of principles that are intended to guide decision making by members of an organization. Responsibility means that you accept the consequences of your decisions and actions. Accountability means a determination of who is responsible for actions that were taken. Liability is a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
  3. The link will take you to online Appendix W3.1 for 14 ethics scenarios. Each of these scenarios elicits interesting class discussions, because none are particularly “clear cut” as to what the “right thing to do” is.
  4. Privacy Issues involve collecting, storing and disseminating information about individuals. Accuracy Issues involve the authenticity, fidelity and accuracy of information that is collected and processed. Property Issues involve the ownership and value of information. Accessibility Issues revolve around who should have access to information and whether they should have to pay for this access.
  5. Privacy is the right to be left alone and to be free of unreasonable personal intrusions.
  6. Data aggregators are companies that collect public data (e.g., real estate records, telephone numbers) and nonpublic data (e.g., social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers. Digital dossier is an electronic description of you and your habits. Profiling is the process of creating a digital dossier.
  7. Electronic Surveillance. The tracking of people‘s activities, online or offline, with the aid of computers. The image demonstrates that many people are blissfully unaware that they can be under electronic surveillance while they are using their computers.
  8. The BusinessWeek article is an interesting look at the state of surveillance today. The surveillance slideshow accompanies the BusinessWeek article. The additional surveillance slides show modern surveillance equipment. The video is a tongue-in-cheek look at how little privacy all of us have left. The video is a great example of the impacts that data aggregators, digital dossiers, and profiling might have in the very near future.
  9. Personal Information in Databases. Information about individuals is being kept in many databases: banks, utilities co., govt. agencies, …etc.; the most visible locations are credit-reporting agencies. Equifax, TransUnion, and Experian are the three best known credit reporting agencies. Clicking on the logo of each company will take you to its homepage.
  10. Social Networking Sites often include electronic discussions such as chat rooms. These sites appear on the Internet, within corporate intranets, and on blogs. A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. The logos represent popular social networking sites. Clicking on the logo will take you to the respective home pages.
  11. The second article shows students how information they (or others) post to social networking sites can impact their lives, in particular, their job search. This information may take the form of text, images, etc.
  12. Clicking on the ReputationDefender logo will take you to its homepage.
  13. Privacy Codes and Policies. An organization’s guidelines with respect to protecting the privacy of customers, clients, and employees. Opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. Opt-in model of informed consent means that organizations are prohibited from collecting any personal information unless the customer specifically authorizes it. (Preferred by privacy advocates.) International Aspects of Privacy. Privacy issues that international organizations and governments face when information spans countries and jurisdictions.