+ All Categories
Home > Documents > Ethics in It Industry

Ethics in It Industry

Date post: 10-Apr-2018
Category:
Upload: syam
View: 217 times
Download: 0 times
Share this document with a friend

of 34

Transcript
  • 8/8/2019 Ethics in It Industry

    1/34

    ETHICS IN IT INDUSTRYBY

    SYAM MOHAN

  • 8/8/2019 Ethics in It Industry

    2/34

    ETHICS

    Derived from the Greek word ethos, which

    means custom, habit, and way of living

    Definition: "the discipline and practice of

    applying value to human behavior, resulting

    in meaningful conduct.

  • 8/8/2019 Ethics in It Industry

    3/34

    Cont..

    Professional Ethics: concerns one's conduct ofbehavior and practice when carrying out professional

    work, e.g., consulting, researching, teaching andwriting.

    Acomputing professional must understand

    Cultural, social, legal, and ethical issues in computing.

    Responsibility and possible consequences of failure.

  • 8/8/2019 Ethics in It Industry

    4/34

    Computer ethics

    Computer ethics definedas the application ofclassical ethical principles to the use of computer

    technology.

  • 8/8/2019 Ethics in It Industry

    5/34

    TheTen Commandments of computer ethics have

    been defined by the Computer Ethics Institute. 1)Thou shalt not use a computer to harm other

    people.

    2)Thou shalt not interfere with other people'scomputer work.

    3)Thou shalt not snoop around in other people's files.

    4)Thou shalt not use a computer to steal. 5)Thou shalt not use a computer to bear false

    witness.

  • 8/8/2019 Ethics in It Industry

    6/34

  • 8/8/2019 Ethics in It Industry

    7/34

    What is Computer Virus?

    Computer viruses are small software programs that

    are designed to spread from one computer to another

    and to interfere with computer operation. the term "computer virus" is sometimes used as a

    catch-all phrase to include all types of malware

    Eg : computer worms , trojan horses etc

  • 8/8/2019 Ethics in It Industry

    8/34

    Steps to help avoid Viruses

    e-mail attachment from someone you don't

    know Use an Internet firewall,

    Subscribe to industry standard antivirussoftware,

    Scan each and every attachment

  • 8/8/2019 Ethics in It Industry

    9/34

    Reselling Media

    Downloading from a website

    Taping songs

    Buying a used book or CD

    Watching broadcast television but skippingcommercials

    What is PIRACY???????

  • 8/8/2019 Ethics in It Industry

    10/34

    Types of software PIRACY

    End User Piracy

    Client Server Piracy

    Internet Piracy

    Hard-Disk Piracy

    Software Counterfeiting

  • 8/8/2019 Ethics in It Industry

    11/34

  • 8/8/2019 Ethics in It Industry

    12/34

    Client-Server Piracy

    This type of piracy occurs when too many employees

    on a network are using a central copy of a program at

    the same time.

  • 8/8/2019 Ethics in It Industry

    13/34

    Internet piracy

    This occurs when software is downloaded from the

    InternetThe same purchasing rules should apply to

    online software purchase as for those bought intraditional ways.

    Pirate website

    Unauthorized transfer of copyrighted program

  • 8/8/2019 Ethics in It Industry

    14/34

    Hard-Disk Loading

    This occurs when a business who sells new computers

    loads illegal copies of software onto the hard disks to

    make the purchase of the machines more attractive.

  • 8/8/2019 Ethics in It Industry

    15/34

    Software Counterfeiting

    This type of piracy is the illegal duplication and sale

    of copyrighted material with the intent of directly

    imitating the copyrighted product

  • 8/8/2019 Ethics in It Industry

    16/34

    HACKER

    Some one who bypasses the systems access controlsby taking advantage of security weaknesses left in

    the system by developers .

  • 8/8/2019 Ethics in It Industry

    17/34

    What HACKER do???????

    SYSTEM

    Access confidential information

    Threaten someone from YOUR computerBroadcast your confidential letters or materials .

    Store illegal material

  • 8/8/2019 Ethics in It Industry

    18/34

    Advantage of Hacking

    To determine problem and weakness for program

    Creation of firewall

    Useful for military purpose and spying Better computer security

  • 8/8/2019 Ethics in It Industry

    19/34

    ETHICAL PERSPECTIVE OF IT-ITES

    INDUSTRYUnethical practices can be categorized on the basis of

    1.privacy

    2. Information handling

    3. Dealing with intellectual property rights

    4. Working culture and environment in theorganization

  • 8/8/2019 Ethics in It Industry

    20/34

    The unethical practices categorized above can be carried out

    by

    1. IT/ITESorganizations towards their clients/customers2. IT/ITESorganizations towards their employees

    3. Employees of IT/ITESorganization towards their

    organizations

    4. Employees of IT/ITESorganization towards their clients

    5. IT/ITESOrganizations/employees together with their

    clients/customers harming other stake holders

  • 8/8/2019 Ethics in It Industry

    21/34

    Privacy- four states

    Solitude - an individuals desire to be left alone.

    away from outside interference.

    Intimacy - the state of privacy one wants to enjoyfrom the outside world.

    Anonymity - a person's wish to be free from

    external surveillance. Reserve - an individuals' desire to control

    information about himself.

  • 8/8/2019 Ethics in It Industry

    22/34

    Some practices affecting the privacy

    cookies :An HTTP cookie is data stored on a user'scomputer that assists in automated access to websites orweb features, or other state information required in

    complex web sites. It may also be used for user-trackingby storing special usage history data in a cookie

    Some web-oriented marketing-research organizations mayuse this practice legitimately, for example: in order toconstruct profiles of 'typical Internet users'. Suchprofiles, which describe average trends of large groups ofInternet users rather than of actual individuals, can thenprove useful for market analysis

  • 8/8/2019 Ethics in It Industry

    23/34

    CONTD

    Photographs on internet

    Today many people have digital cameras and post theirphotos online. The people depicted in these photos

    might not want to have them appear on the Internet.

  • 8/8/2019 Ethics in It Industry

    24/34

    Cont.

    Internet service providers

    Internet users obtain Internet access through an

    Internet service provider (ISP).All data transmittedto and from users must pass through the ISP. Thus,

    an ISP has the potential to observe users' activities

    on the Internet.

  • 8/8/2019 Ethics in It Industry

    25/34

    Contd

    Data logging

    Many programs and operating systems are set up to

    perform data logging of usage. This may includerecording times when the computer is in use, or which

    web sites are visited. If a third party has sufficient

    access to the computer, legitimately or not, the user's

    privacy may be compromised. This could be avoidedby disabling logging, or by clearing logs regularly.

  • 8/8/2019 Ethics in It Industry

    26/34

    Information security

    1) employees at the lower level showing scant respect tothe information security process.

    Eg: employees sharing passwords with their colleagueseven though they are not allowed to do that

    2)At call centres operators force the customers to part

    their personal information even if it is not necessary.

    3)sharing of confidential information about clients andcustomers with unauthorized persons

  • 8/8/2019 Ethics in It Industry

    27/34

  • 8/8/2019 Ethics in It Industry

    28/34

    INTELLECTUAL PROPERTY RIGHTS

    Software piracy is one of the major issues causing hugelosses to the ITindustry.

    Some of the ITcompanies itself use pirated software.

    Small companies buy only 1 license and install in manycomputers. some single license agreement allowsinstallation of a particular software in 2 computersprovided it is used by a single user. It is for helpingpeople working from different locations.

    illegal use of intellectual properties like algorithms,source code.some times these valuable information can bepassed to the competitors by the employees.

  • 8/8/2019 Ethics in It Industry

    29/34

    Work culture and environment

    Employees wasting companies resources and time by browsingthe internet for non business purposes ,sending frivolousmails , gaming etc. This can lead to claiming overtimecompensation, which is not required to complete the task.

    Another issue is employee attrition.Young people with focuson making money or growing in designations at a high pace,resort to job hopping.

    The young employees in the ITcompany claim allowances likehouse rent and medical bills with fraudulent bills to getincome tax exemption.

  • 8/8/2019 Ethics in It Industry

    30/34

    ITcompanies compete among themselves for employees. Poachingemployees from the competitors is quite common in ITindustry. Eventhough this is not illegal it has set an unprofessional culture in theindustry and employees do not have any remorse in leaving in middle

    of their commitments. Companies resort to various means for retaining the employees and

    some of the methods are unethical. Some of them are

    1. Full salary offered during recruitment is not paid. Instead aportion is withheld within the company and will be paid once theemployee completes a stipulated period of time.

    2. Signing of bond from the employees for a stipulated period of time,which takes away a persons right to choose a better career.

  • 8/8/2019 Ethics in It Industry

    31/34

    3. Long hours of work are common in ITindustries.Aggressive biddingof completion time by the companies to their customers that result inunrealistic estimations and plans.

    4. Monitoring the employees without informing them. In the name ofinformation security, some companies scan the e-mails of theemployees or plant spying programs. This amounts to a breach ofprivacy of the employees.

    5. ITcompanies have brought in world class infrastructure to Indiabut still the working conditions are not ergonomic.Video operatorsdistress syndrome, cumulative trauma disorder and carpal tunnelsyndrome due to repetitive stress on hands/wrists are some of thecommon work related disorders in ITsector.

  • 8/8/2019 Ethics in It Industry

    32/34

    Cyber crimes

    HACKING

    SPAM

    VIRUSDISSEMINATION

    SOFTWARE PIRACY PORNOGRAPHY

    IRC Crime

    NETEXTORTION

    PHISHING

    SPOOFING CYBERSTALKING

    CYBER DEFAMATION

    SALAMIATTACK

    CREDITCARD FRAUD

  • 8/8/2019 Ethics in It Industry

    33/34

  • 8/8/2019 Ethics in It Industry

    34/34

    THANK YOU


Recommended