+ All Categories
Home > Documents > CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting...

CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting...

Date post: 19-Dec-2015
Category:
Upload: cory-mitchell
View: 221 times
Download: 1 times
Share this document with a friend
Popular Tags:
35
CHAPTER 3 Ethics and Privacy
Transcript
Page 1: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

CHAPTER 3

Ethics and Privacy

Page 2: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Outline for Today

• Chapter 3: Ethics and Privacy

• Tech Guide: Protecting Information Assets

REMINDER:

Project 1 due tonight before midnight!

Page 3: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

A Reminder on Cheating COPYING OF OTHERS’ FILES JOINTLY WORKING ON THE SAME BASE FILES (meaning

two or more students work on the same assignment on the same machine at the same time)

PROVIDING YOUR FILES TO OTHER STUDENTS Handing in the work of others In addition, hands-on open book assignments permit the use of

books and written notes, but not electronic files or the use of student computers.

Cheating of any kind shall result in a grade of zero (0) on the test, assignment, project or quiz in question with a minimum deduction of ONE LETTER GRADE for the class, and a note to the Office of the Dean of Students. The second instance of cheating will result in the grade of an F for the class.

Page 4: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Chapter Opening Case

http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/

Page 5: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Another Case

Page 6: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Questions about Cases

Is this legal?

Who is acting unethical?

Page 7: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Chapter 3 - Ethics

How do you define ethics?

7

Page 8: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

3.1 Ethical Issues - Standards

Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior

Guidelines/Approaches

Page 9: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

General Framework for Ethics

1. Recognize an ethical issue

2. Get the facts

3. Evaluate alternative actions

4. Make a decision and test it

5. Act and reflect on the outcome of your decision

Page 10: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Ethics in the Corporate Environment

Code of ethics / conduct Microsoft Google

Fundamental tenets of ethics1.

2.

3.

Page 11: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Unethical vs. Illegal

Is everything that is unethical also illegal?

Enron World Com Subprime Mortgages Other Examples

Page 12: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Ethics and Information Technology

Ethical use of information and information technology

Should organizations:

•monitor employees?

•sell customer info?

•audit employee computers? (unauthorized software or content)

Page 13: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Ethics and Information Technology

Do emails last forever?

This can also apply to messaging at companies.

Page 14: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Advice for Organization Use

1. Only use company computer for business related work

2. Don’t send emails you wouldn’t want your parents to see

3. Limit who you give work email to

Page 15: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Ethics and Information Technology

Four categories of ethical issues involving IT applications:

Page 16: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

How much privacy do we have left?

1) We Still Have a high level of privacy

2) We are beginning to have less privacy

3) Privacy? What’s that?

Page 17: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Privacy

Court decisions have followed two rules:

Page 18: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Ex. Google and User Data

http://www.technologyreview.com/view/507441/the-us-governments-growing-appetite-for-google-users-data/

Page 19: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Ex. Mobile Device Location

Page 20: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Threats to Privacy

Data aggregators, digital dossiers, and profiling

Electronic Surveillance

Personal Information in Databases

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

Page 21: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Data Aggregators, Digital Dossiers, and Profiling

© Ilin Sergey/Age Fotostock America, Inc.

Page 22: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Electronic Surveillance

© Ilin Sergey/Age Fotostock America, Inc.

What are employee rights against surveillance?

Page 23: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Electronic Surveillance

A Face in the crowd:Say goodbye to anonymity

Page 24: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Personal Information in Databases

Banks

Utility companies

Government agencies

Credit reporting agencies

© Nicolas Nadjar/Age Fotostock America, Inc.

Page 25: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

© Marina Bordjieva/Age Fotostock America, Inc.

Page 26: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Social Networking Sites Can Cause You Problems

Anyone can post derogatory information about you anonymously.

(See this Washington Post article.)

You can also hurt yourself, as this article shows.

Page 27: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

What Can You Do?

First, be careful what information you post on social networking sites.

Second, a company, ReputationDefender, says it can remove derogatory information from the Web.

Page 28: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Protecting Privacy

Privacy Codes and Policies Ex. Facebook, Apple

Opt-out Model vs. Opt-in Model

Page 29: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Tech Guide 5

Protecting Your Information Assets

Page 30: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Information Assets

What is meant when we say

information assets?

Page 31: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Behavioral Actions

Protect SSN# Secure credit cards

Physical Virtual

Debit Cards vs. Credit Cards Proactive Protection

Page 32: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Identity Theft

Dumpster Diving Skimming Phishing Changing your address Old-Fashioned Stealing Pretexting

Federal Trade Commission

http://www.ftc.gov/bcp/edu/microsites/idtheft2012/

Page 33: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Computer-Based Actions

Know what sites have been visited

Infected Computers

Malware Infections Anti-Virus (http://www.uncw.edu/ITSD/help/antivirus.html)

Security suite (ZoneAlarm) Antispyware (Ad-Aware)

Page 34: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Computer-Based Actions

Information in SNS

Manage Patches

Browser and Operating Systems

Page 35: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.

Portable Devices and Information

Data Encryption Password Protect Locating Devices

Prey Project Find my iPhone Where’s My Droid

http://thisguyhasmymacbook.tumblr.com/


Recommended