SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Ethical Implications of IT
Group # 03
Shahnawaz Salamat 04, Waqar Anwar 05, Waleed Imtiaz 10
M. Irfan Shahid 12, Hafiz M. Mustghas, Sajid Ali 27
BBA-8th Morning
University of Education, Okara Campus
University of Education, Okara Campus
Learning Objectives:
 Understand the distinction among morals, ethics, and laws.
 Be familiar with the most important computer legislation that has
been passed in the U. S., and know how legislation in one
country can influence computer use in others as well.
 Know how a firm creates an ethics culture by first establishing a
corporate credo, then establishing ethics programs, and lastly
establishing a corporate ethics code.
 Know why society demands that computers be used ethically.
 Know the four basic rights that society has concerning the
computer.
 Be aware of computer industry codes of ethics, and the wide
variety of educational programs that can help firms and
employees use computers ethically
2
University of Education, Okara Campus
Introduction:
 Firms have an obligation to establish an ethical culture for
their employees to follow that is supported by a corporate
credo and ethics programs
 Computer ethics are important because society has
certain perceptions, and fears, related to computer use
 The CIO can follow a proactive program to ensure that IT
systems provide:
 What the executives and managers need to support the
firm's ethics efforts
 That stockholders and owners understand that the firm
uses its computers ethically
 That funds spent on IT are not wasted
3
University of Education, Okara Campus
MORALS, ETHICS, AND LAWS:
 Morals are traditions of belief about right and
wrong conduct and “doing what is morally right”
is the bedrock of our social behavior
 Ethics is a suite of guiding beliefs, standards, or
ideals that pervades an individual or a group or
community of people
 Laws are formal rules of conduct that a sovereign
authority, such as a government, imposes on its
subjects or citizens
4
University of Education, Okara Campus
PUTTING MORALS, ETHICS, AND
LAWS IN PERSPECTIVE:
 Because they are written down, laws are
the easiest to interpret
 Ethics, on the other hand, are not clearly
defined and not even agreed on by all
members of society
5
University of Education, Okara Campus
NEED FOR AN ETHICS CULTURE:
 Top-level managers lead by example: if the firm
is to be ethical, then top management must be
ethical in everything that it does and says
 This is known as an ethics culture
 The task of top-level management is to see that
its concept of ethics permeates the
organization, filtering down through the ranks to
touch every employee
 This can be achieved through a corporate
credo, ethics programs, and tailored corporate
codes
6
University of Education, Okara Campus
Top Level Management Imposes the Ethics
Culture in a Top Down Manner:
Establish Corporate
Credo
Establish Ethics Program
Establish Corporate
Ethics Code
7
University of Education, Okara Campus
Ethics Programs and Tailored
Corporate Codes:
 An ethics program consists of multiple activities to
provide employees with direction in carrying out
the corporate credo
 In an ethics audit, an internal auditor meets with
a manager in a several-hour session for the
purpose of learning how the manager’s unit is
carrying out the corporate credo
 Many firms have devised their own corporate
code of ethics that may be adaptations of codes
for a particular industry or profession
8
University of Education, Okara Campus
REASONS FOR A COMPUTER ETHIC:
 Computer ethics consists of two main activities:
 the analysis of the nature and social impact of computer
technology; and
 formulation and justification of policies for the ethical use of
such technology
 The CIO must:
 be alert to the effects that the computer is having on
society; and
 formulate policies to ensure that the technology is used
throughout the firm in the right way
9
University of Education, Okara Campus
Reasons for the Importance of
Computer Ethics:
 James Moor believes there are 3 main reasons for the high
level of interest in computer ethics:
 Logical Malleability: The computer performs exactly as
instructed, so if it’s used for an unethical activity the computer
is not the culprit
 The Transformation Factor: computers can drastically change
the way we do things
 The Invisibility Factor: of internal operations provides the
opportunity for invisible programming values, invisible complex
calculations, and invisible abuse
10
University of Education, Okara Campus
Social Rights and the Computer:
 Mason coined the acronym PAPA (privacy,
accuracy, property, and accessibility) to represent
society’s four basic rights in terms of information
 Mason felt that “the right to be left alone” is being
threatened by two forces:
1. the increasing ability of the computer to be used
for surveillance
2. the increasing value of information in decision
making
 For example, decision makers place such a high
value on information that they will often be willing to
invade someone’s privacy to get it
11
University of Education, Okara Campus
Other Rights:
 Right to Accuracy: the potential for a level of
accuracy that is unachievable in non
computer systems; some computer-based
systems contain more errors than would be
tolerated in manual systems
 Right to Property: copyright and patent laws
provide some degree of protection
 Right to Access: much information has been
converted to commercial databases, making it
less accessible to the public
12
University of Education, Okara Campus
INFORMATION AUDITING:
 Firms of all sizes rely on external auditors to
audit their accounting records to verify their
accuracy
 Larger firms have their own internal auditors,
who perform the same analyses as external
auditors but have a broader range of
responsibilities
 The Securities and Exchange Commission
has placed restrictions on the amount of
internal auditing that external auditors can
perform
13
University of Education, Okara Campus
ACHIEVING ETHICS IN
INFORMATION TECHNOLOGY:
 Companies can get assistance in the form of
ethics codes and ethics educational programs to
provide the foundation for their culture
 The ethics codes can be used as is or tailored to
the firm
 • Educational programs can assist in developing
a corporate credo and in putting ethics programs
in place
14
University of Education, Okara Campus
References:
 http://deden08m.files.wordpress.com/2011/03/ch10-
ethical-implications-of-information-technology.pdf
 http://www.igi-global.com/book/social-ethical-policy-
implications-information/922
 http://www.ask.com/question/ethical-issues-in-information-
technology
 http://www.netcaucus.org/books/egov2001/pdf/Ethicsin.p
df
 http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
 http://www.techrepublic.com/article/10-ethical-issues-
confronting-it-managers/
15

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 

Was ist angesagt? (20)

Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Digital divide
Digital divideDigital divide
Digital divide
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
ICT in Business
ICT in BusinessICT in Business
ICT in Business
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Information society
Information societyInformation society
Information society
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Navegar por internet de forma segura.pptx
Navegar por internet de forma segura.pptxNavegar por internet de forma segura.pptx
Navegar por internet de forma segura.pptx
 
Importance of Information Technology in Today’s World!
Importance of Information Technology in Today’s World! Importance of Information Technology in Today’s World!
Importance of Information Technology in Today’s World!
 

Ähnlich wie Ethical Implications of IT

Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)
JUNAIDJUANID
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
Noriha Nori
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
university of education,Lahore
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
Shehanperamuna
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
normanibarber20063
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
jndatirwa
 

Ähnlich wie Ethical Implications of IT (20)

Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Chap05
Chap05Chap05
Chap05
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
Review questions
Review questionsReview questions
Review questions
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 

Mehr von university of education,Lahore

Mehr von university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Kürzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Ethical Implications of IT

  • 1. Ethical Implications of IT Group # 03 Shahnawaz Salamat 04, Waqar Anwar 05, Waleed Imtiaz 10 M. Irfan Shahid 12, Hafiz M. Mustghas, Sajid Ali 27 BBA-8th Morning University of Education, Okara Campus
  • 2. University of Education, Okara Campus Learning Objectives:  Understand the distinction among morals, ethics, and laws.  Be familiar with the most important computer legislation that has been passed in the U. S., and know how legislation in one country can influence computer use in others as well.  Know how a firm creates an ethics culture by first establishing a corporate credo, then establishing ethics programs, and lastly establishing a corporate ethics code.  Know why society demands that computers be used ethically.  Know the four basic rights that society has concerning the computer.  Be aware of computer industry codes of ethics, and the wide variety of educational programs that can help firms and employees use computers ethically 2
  • 3. University of Education, Okara Campus Introduction:  Firms have an obligation to establish an ethical culture for their employees to follow that is supported by a corporate credo and ethics programs  Computer ethics are important because society has certain perceptions, and fears, related to computer use  The CIO can follow a proactive program to ensure that IT systems provide:  What the executives and managers need to support the firm's ethics efforts  That stockholders and owners understand that the firm uses its computers ethically  That funds spent on IT are not wasted 3
  • 4. University of Education, Okara Campus MORALS, ETHICS, AND LAWS:  Morals are traditions of belief about right and wrong conduct and “doing what is morally right” is the bedrock of our social behavior  Ethics is a suite of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people  Laws are formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens 4
  • 5. University of Education, Okara Campus PUTTING MORALS, ETHICS, AND LAWS IN PERSPECTIVE:  Because they are written down, laws are the easiest to interpret  Ethics, on the other hand, are not clearly defined and not even agreed on by all members of society 5
  • 6. University of Education, Okara Campus NEED FOR AN ETHICS CULTURE:  Top-level managers lead by example: if the firm is to be ethical, then top management must be ethical in everything that it does and says  This is known as an ethics culture  The task of top-level management is to see that its concept of ethics permeates the organization, filtering down through the ranks to touch every employee  This can be achieved through a corporate credo, ethics programs, and tailored corporate codes 6
  • 7. University of Education, Okara Campus Top Level Management Imposes the Ethics Culture in a Top Down Manner: Establish Corporate Credo Establish Ethics Program Establish Corporate Ethics Code 7
  • 8. University of Education, Okara Campus Ethics Programs and Tailored Corporate Codes:  An ethics program consists of multiple activities to provide employees with direction in carrying out the corporate credo  In an ethics audit, an internal auditor meets with a manager in a several-hour session for the purpose of learning how the manager’s unit is carrying out the corporate credo  Many firms have devised their own corporate code of ethics that may be adaptations of codes for a particular industry or profession 8
  • 9. University of Education, Okara Campus REASONS FOR A COMPUTER ETHIC:  Computer ethics consists of two main activities:  the analysis of the nature and social impact of computer technology; and  formulation and justification of policies for the ethical use of such technology  The CIO must:  be alert to the effects that the computer is having on society; and  formulate policies to ensure that the technology is used throughout the firm in the right way 9
  • 10. University of Education, Okara Campus Reasons for the Importance of Computer Ethics:  James Moor believes there are 3 main reasons for the high level of interest in computer ethics:  Logical Malleability: The computer performs exactly as instructed, so if it’s used for an unethical activity the computer is not the culprit  The Transformation Factor: computers can drastically change the way we do things  The Invisibility Factor: of internal operations provides the opportunity for invisible programming values, invisible complex calculations, and invisible abuse 10
  • 11. University of Education, Okara Campus Social Rights and the Computer:  Mason coined the acronym PAPA (privacy, accuracy, property, and accessibility) to represent society’s four basic rights in terms of information  Mason felt that “the right to be left alone” is being threatened by two forces: 1. the increasing ability of the computer to be used for surveillance 2. the increasing value of information in decision making  For example, decision makers place such a high value on information that they will often be willing to invade someone’s privacy to get it 11
  • 12. University of Education, Okara Campus Other Rights:  Right to Accuracy: the potential for a level of accuracy that is unachievable in non computer systems; some computer-based systems contain more errors than would be tolerated in manual systems  Right to Property: copyright and patent laws provide some degree of protection  Right to Access: much information has been converted to commercial databases, making it less accessible to the public 12
  • 13. University of Education, Okara Campus INFORMATION AUDITING:  Firms of all sizes rely on external auditors to audit their accounting records to verify their accuracy  Larger firms have their own internal auditors, who perform the same analyses as external auditors but have a broader range of responsibilities  The Securities and Exchange Commission has placed restrictions on the amount of internal auditing that external auditors can perform 13
  • 14. University of Education, Okara Campus ACHIEVING ETHICS IN INFORMATION TECHNOLOGY:  Companies can get assistance in the form of ethics codes and ethics educational programs to provide the foundation for their culture  The ethics codes can be used as is or tailored to the firm  • Educational programs can assist in developing a corporate credo and in putting ethics programs in place 14
  • 15. University of Education, Okara Campus References:  http://deden08m.files.wordpress.com/2011/03/ch10- ethical-implications-of-information-technology.pdf  http://www.igi-global.com/book/social-ethical-policy- implications-information/922  http://www.ask.com/question/ethical-issues-in-information- technology  http://www.netcaucus.org/books/egov2001/pdf/Ethicsin.p df  http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html  http://www.techrepublic.com/article/10-ethical-issues- confronting-it-managers/ 15