SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Ethics in Information
Technology, Fourth Edition


           Chapter 2
Ethics for IT Workers and IT Users

                                     1
Objectives

• As you read this chapter, consider the following
  questions:
     – What key characteristics distinguish a professional
       from other kinds of workers, and is an IT worker
       considered a professional?
     – What factors are transforming the professional
       services industry?
     – What relationships must an IT worker manage, and
       what key ethical issues can arise in each?




Ethics in Information Technology, Fourth Edition             2
Objectives (cont’d.)
     – How do codes of ethics, professional organizations,
       certification, and licensing affect the ethical behavior
       of IT professionals?
     – What is meant by compliance, and how does it help
       promote the right behaviors and discourage
       undesirable ones?




Ethics in Information Technology, Fourth Edition                  3
IT Professionals

• Profession is a calling that requires:
     – Specialized knowledge
     – Long and intensive academic preparation
• Professionals:
     – Require advanced training and experience
     – Must exercise discretion and judgment in their work
     – Their work cannot be standardized
     – Contribute to society, participate in lifelong training,
       assist other professionals
     – Carry special rights and responsibilities

Ethics in Information Technology, Fourth Edition                  4
Are IT Workers Professionals?

• Partial list of IT specialists
     –   Programmers
     –   Systems analysts
     –   Software engineers
     –   Database administrators
     –   Local area network (LAN) administrators
     –   Chief information officers (CIOs)




Ethics in Information Technology, Fourth Edition   5
Are IT Workers Professionals?
                     (cont’d.)
• Legal perspective
     – IT workers do not meet legal definition of professional
        • Not licensed by state or federal government
        • Not liable for malpractice




Ethics in Information Technology, Fourth Edition             6
The Changing Professional Services
                Industry
• IT workers are considered part of the professional
  services industry
• Seven forces are changing professional services
     –   Client sophistication (able to drive hard bargains)
     –   Governance (due to major scandals)
     –   Connectivity (instant communications)
     –   Transparency (view work-in-progress in real-time)
     –   Modularization (able to outsource modules)
     –   Globalization (worldwide sourcing)
     –   Commoditization (for low-end services)

Ethics in Information Technology, Fourth Edition               7
Professional Relationships That Must
               Be Managed
• IT workers involved in relationships with:
     –   Employers
     –   Clients
     –   Suppliers
     –   Other professionals
     –   IT users
     –   Society at large




Ethics in Information Technology, Fourth Edition   8
Relationships Between
                IT Workers and Employers
• IT workers agree on many aspects of work
  relationship before workers accept job offer
• Other aspects of work relationship defined in
  company’s policy and procedure manual or code of
  conduct
• Some aspects develop over time
• As steward of organization’s IT resources, IT
  workers must set an example and enforce policies
  regarding the ethical use of IT in:



Ethics in Information Technology, Fourth Edition     9
Relationships Between
                IT Workers and Employers
• Software piracy
– Act of illegally making copies of software or enabling
  access to software to which they are not entitled
– Area in which IT workers can be tempted to violate laws
  and policies
– The Business Software Alliance (BSA) is a trade group
  representing the world’s largest software and hardware
  manufacturers; mission is to stop the unauthorized
  copying of software
– Thousands of cases prosecuted each year


Ethics in Information Technology, Fourth Edition        10
Relationships Between
     IT Workers and Employers (cont’d.)




Ethics in Information Technology, Fourth Edition   11
Relationships Between
     IT Workers and Employers (cont’d.)
• IT workers must set an example and enforce
  policies regarding the ethical use of IT in: (cont’d.)
     – Trade secrets
        • Business information generally unknown to public
        • Company takes actions to keep confidential
        • Require cost or effort to develop
        • Have some degree of uniqueness or novelty
     – Whistle-blowing
        • Employee attracts attention to a negligent, illegal,
          unethical, abusive, or dangerous act that threatens
          the public interest

Ethics in Information Technology, Fourth Edition            12
Relationships Between
                    IT Workers and Clients
• IT worker provides:
     – Hardware, software, or services at a certain cost and
       within a given time frame
• Client provides:
     – Compensation
     – Access to key contacts
     – Work space
• Relationship is usually documented in contractual
  terms


Ethics in Information Technology, Fourth Edition           13
Relationships Between
          IT Workers and Clients (cont’d.)
• Client makes decisions about a project based on
  information, alternatives, and recommendations
  provided by the IT worker
• Client trusts IT worker to act in client’s best interests
• IT worker trusts that client will provide relevant
  information, listen to and understand what the IT
  worker says, ask questions to understand impact of
  key decisions, and use the information to make wise
  choices



Ethics in Information Technology, Fourth Edition         14
Relationships Between
          IT Workers and Clients (cont’d.)
• Ethical problems arise if a company recommends its
  own products and services to remedy problems they
  have detected
     – Creates a conflict of interest
• Problems arise during a project if IT workers are
  unable to provide full and accurate reporting of a
  project’s status
     – Finger pointing and heated discussions can ensue




Ethics in Information Technology, Fourth Edition          15
Relationships Between
          IT Workers and Clients (cont’d.)
• Fraud
     – Crime of obtaining goods, services, or property
       through deception or trickery
• Misrepresentation
     – Misstatement or incomplete statement of material fact
     – If misrepresentation causes a party to enter into a
       contract, that party may have the right to cancel
       contract or seek reimbursement for damages




Ethics in Information Technology, Fourth Edition           16
Relationships Between
          IT Workers and Clients (cont’d.)
• Breach of contract
     – One party fails to meet the terms of a contract
     – When there is material breach of contract:
        • The non-breaching party may rescind the contract,
          seek restitution of any compensation paid to the
          breaching party, and be discharged from any
          further performance under the contract
• IT projects are joint efforts in which vendors and
  customers work together
     – When there are problems, it is difficult to assign who
       is at fault

Ethics in Information Technology, Fourth Edition                17
Relationships Between
                  IT Workers and Suppliers
• Develop good working relationships with suppliers:
     – To encourage flow of useful information and ideas to
       develop innovative and cost-effective ways of using
       the supplier in ways that the IT worker may not have
       considered
     – By dealing fairly with them
     – By not making unreasonable demands




Ethics in Information Technology, Fourth Edition              18
Relationships Between
       IT Workers and Suppliers (cont’d.)
• Bribery
     – Providing money, property, or favors to obtain a
       business advantage
     – U.S. Foreign Corrupt Practices Act (FCPA): crime to
       bribe a foreign official, a foreign political party official,
       or a candidate for foreign political office
     – At what point does a gift become a bribe?
     – No gift should be hidden
     – Perceptions of donor and recipient can differ
     – United Nations Convention Against Corruption is a
       global treaty to fight bribery and corruption

Ethics in Information Technology, Fourth Edition                   19
Relationships Between
       IT Workers and Suppliers (cont’d.)




Ethics in Information Technology, Fourth Edition   20
Relationships Between
     IT Workers and Other Professionals
• Professionals feel a degree of loyalty to other
  members of their profession
• Professionals owe each other adherence to their
  profession’s code of conduct
• Ethical problems among the IT profession
     – Résumé inflation on 30% of U.S. job applications
     – Inappropriate sharing of corporate information
         • Information might be sold intentionally or shared
           informally with those who have no need to know



Ethics in Information Technology, Fourth Edition               21
Relationships Between
                   IT Workers and IT Users
• IT user: person using a hardware or software
  product
• IT workers’ duties
     – Understand users’ needs and capabilities
     – Deliver products and services that meet those needs
     – Establish environment that supports ethical behavior:
        • To discourages software piracy
        • To minimize inappropriate use of corporate
          computing resources
        • To avoid inappropriate sharing of information

Ethics in Information Technology, Fourth Edition           22
Relationships Between
                    IT Workers and Society
• Society expects members of a profession:
     – To provide significant benefits
     – To not cause harm through their actions
• Actions of an IT worker can affect society
• Professional organizations provide codes of ethics
  to guide IT workers’ actions




Ethics in Information Technology, Fourth Edition       23
Professional Codes of Ethics

• State the principles and core values that are
  essential to the work of an occupational group
• Most codes of ethics include:
     – What the organization aspires to become
     – Rules and principles by which members of the
       organization are expected to abide
• Many codes also include commitment to continuing
  education for those who practice the profession




Ethics in Information Technology, Fourth Edition      24
Professional Codes of Ethics
                       (cont’d.)
• Following a professional code of ethics can produce
  benefits for the individual, the profession, and
  society as a whole
     –   Ethical decision making
     –   High standards of practice and ethical behavior
     –   Trust and respect from general public
     –   Evaluation benchmark for self-assessment




Ethics in Information Technology, Fourth Edition           25
Professional Organizations

• No universal code of ethics for IT professionals
• No single, formal organization of IT professionals
  has emerged as preeminent
• Five of the most prominent organizations include:
     – Association for Computing Machinery (ACM)
     – Institute of Electrical and Electronics Engineers
       Computer Society (IEEE-CS)
     – Association of IT Professionals (AITP)
     – SysAdmin, Audit, Network, Security (SANS) Institute



Ethics in Information Technology, Fourth Edition             26
Certification

• Indicates that a professional possesses a particular
  set of skills, knowledge, or abilities in the opinion of
  the certifying organization
• Can also apply to products
• Generally voluntary
• May or may not require adherence to a code of
  ethics
• Employers view as benchmark of knowledge
• Opinions are divided on value of certification


Ethics in Information Technology, Fourth Edition         27
Certification (cont’d.)

• Vendor certifications
     – Some certifications substantially improve IT workers’
       salaries and career prospects
     – Relevant for narrowly defined roles or certain aspects
       of broader roles
     – Require passing a written exam, or in some cases, a
       hands-on lab to demonstrate skills and knowledge
     – Can take years to obtain necessary experience
     – Training can be expensive



Ethics in Information Technology, Fourth Edition            28
Certification (cont’d.)

• Industry association certifications
     – Require a higher level of experience and a broader
       perspective than vendor certifications
     – Must sit for and pass written exam
     – May need to pay annual renewal fee, earn continuing
       education credits, and/or pass renewal test
     – Lag in developing tests that cover new technologies
     – Are moving from purely technical content to a broader
       mix of technical, business, and behavioral
       competencies


Ethics in Information Technology, Fourth Edition          29
Government Licensing

• License is a government-issued permission to
  engage in an activity or operate a business
• Generally administered at the state level in the
  United States
• Often requires that recipient pass a test
• Some professionals must be licensed – doctors,
  lawyers, CPAs, medical and day care providers,
  engineers
• One goal: protect public safety


Ethics in Information Technology, Fourth Edition     30
Government Licensing (cont’d.)

• Case for licensing IT workers
     – Encourages following highest standards of profession
     – Encourages practicing a code of ethics
     – Violators would be punished
• Without licensing, there are no requirements for
  heightened care and no concept of professional
  malpractice




Ethics in Information Technology, Fourth Edition          31
Government Licensing (cont’d.)

• Issues associated with government licensing of IT
  workers
     – There are few licensing programs for IT professionals
        • No universally accepted core body of knowledge
        • Unclear who should manage content and
          administration of licensing exams
        • No administrative body to accredit professional
          education programs
        • No administrative body to assess and ensure
          competence of individual workers


Ethics in Information Technology, Fourth Edition           32
IT Professional Malpractice

• Negligence: not doing something that a reasonable
  person would do, or doing something that a
  reasonable person would not do
• Duty of care: obligation to protect people against
  any unreasonable harm or risk
     – Reasonable person standard
     – Reasonable professional standard
• Professional malpractice: professionals who breach
  the duty of care are liable for injuries that their
  negligence causes

Ethics in Information Technology, Fourth Edition       33
IT Users

• Employees’ ethical use of IT is an area of growing
  concern because of increased access to:
     – Personal computers
     – Corporate information systems and data
     – The Internet




Ethics in Information Technology, Fourth Edition       34
Common Ethical Issues for IT Users

• Software piracy
• Inappropriate use of computing resources
     – Erodes productivity and wastes time
     – Could lead to lawsuits
• Inappropriate sharing of information, including:
     – Every organization stores vast amounts of private or
       confidential data
        • Private data (employees and customers)
        • Confidential information (company and operations)


Ethics in Information Technology, Fourth Edition          35
Supporting the Ethical Practices of
                  IT Users
• Policies that protect against abuses:
     – Set forth general rights and responsibilities of users
     – Create boundaries of acceptable behavior
     – Enable management to punish violators
• Policy components include:
     – Establishing guidelines for use of company software
     – Defining appropriate use of IT resources
     – Structuring information systems to protect data and
       information
     – Installing and maintaining a corporate firewall

Ethics in Information Technology, Fourth Edition                36
Supporting the Ethical Practices of
             IT Users (cont’d.)




Ethics in Information Technology, Fourth Edition   37
Ethics in Information Technology, Fourth Edition   38
Compliance

• To be in accordance with established policies,
  guidelines, specifications, and legislation
     – Sarbanes-Oxley – established requirements for
       internal controls
     – HIPAA – ensures security and privacy of employee
       healthcare data
     – Failure to be in conformance can lead to criminal or
       civil penalties and also lawsuits




Ethics in Information Technology, Fourth Edition              39
Compliance (cont’d.)

• Major challenge to comply with multiple government
  and industry regulations that are sometimes in
  conflict
• To meet this challenge:
     – Implement software to track and record compliance
       actions
     – Hire management consultants for advice and training
     – Create Chief Compliance Officer position




Ethics in Information Technology, Fourth Edition         40
Compliance (cont’d.)

• Audit committee is subset of the board of directors,
  with oversight for the following activities:
     – Quality and integrity of accounting and reporting
       practices and controls
     – Compliance with legal and regulatory requirements
     – Qualifications, independence, and performance of
       organization’s independent auditor
     – Performance of company’s internal audit team




Ethics in Information Technology, Fourth Edition           41
Compliance (cont’d.)

• Internal audit committee responsibilities:
     – Determine that internal systems and controls are
       adequate and effective
     – Verify existence of company assets and maintain
       proper safeguards over their protection
     – Measure the organization’s compliance with its own
       policies and procedures
     – Insure that institutional policies and procedures,
       appropriate laws, and good practices are followed
     – Evaluate adequacy and reliability of information
       available for management decision making

Ethics in Information Technology, Fourth Edition            42
Summary

• Professionals
     – Require advanced training and experience
     – Must exercise discretion and judgment in their work
     – Their work cannot be standardized
• From a legal standpoint, a professional:
     – Has passed the state licensing requirements
     – Has earned the right to practice in a state(s)
• IT professionals have many different relationships
     – Each with its own ethical issues and potential
       problems

Ethics in Information Technology, Fourth Edition             43
Summary (cont’d.)

• Professional code of ethics
     – States the principles and core values essential to the
       work of an occupational group
     – Serves as a guideline for ethical decision making
     – Promotes high standards of practice and behavior
     – Enhances trust and respect from the general public
     – Provides an evaluation benchmark
• Licensing and certification of IT professionals
     – Would increase the reliability and effectiveness of
       information systems
     – Raises many issues
Ethics in Information Technology, Fourth Edition             44
Summary (cont’d.)

• IT-related professional organizations have
  developed their code of ethics that:
     – Outlines what the organization aspires to become
     – Lists rules and principles for members
     – Includes a commitment to continuing education for
       those who practice the profession
• Audit committee and internal audit team have a
  major role in ensuring that both the IT organization
  and IT users are in compliance with guidelines and
  various legal and regulatory practices


Ethics in Information Technology, Fourth Edition           45

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT UsersMark Jhon Oxillo
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1MLG College of Learning, Inc
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptRogerPrimo2
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01stanbridge
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptxMarvenParay
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 

Was ist angesagt? (20)

Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Ethic02
Ethic02Ethic02
Ethic02
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Chapter 2_dp-pertemuan 2&3
 Chapter 2_dp-pertemuan 2&3 Chapter 2_dp-pertemuan 2&3
Chapter 2_dp-pertemuan 2&3
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Software liability
Software liabilitySoftware liability
Software liability
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Software development
Software developmentSoftware development
Software development
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Digital law
Digital lawDigital law
Digital law
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 

Andere mochten auch

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11stanbridge
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeShibbir Shimanto
 
Business Ethics-Corruption & Bribery MMS
Business Ethics-Corruption & Bribery MMSBusiness Ethics-Corruption & Bribery MMS
Business Ethics-Corruption & Bribery MMSajesh619raj
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Classroom Training and Orientation
Classroom Training and OrientationClassroom Training and Orientation
Classroom Training and Orientationstanbridge
 
Cloud Types Presentation
Cloud Types PresentationCloud Types Presentation
Cloud Types PresentationMaribeth Yoder
 

Andere mochten auch (19)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11
 
Quality of life with IT
Quality of life with ITQuality of life with IT
Quality of life with IT
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of Life
 
Pmp quality chapter 8
Pmp quality chapter 8Pmp quality chapter 8
Pmp quality chapter 8
 
04 privacy
04 privacy04 privacy
04 privacy
 
Business Ethics-Corruption & Bribery MMS
Business Ethics-Corruption & Bribery MMSBusiness Ethics-Corruption & Bribery MMS
Business Ethics-Corruption & Bribery MMS
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Classroom Training and Orientation
Classroom Training and OrientationClassroom Training and Orientation
Classroom Training and Orientation
 
Cloud Types Presentation
Cloud Types PresentationCloud Types Presentation
Cloud Types Presentation
 

Ähnlich wie 9781111534127 ppt ch02

1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...Business Development Institute
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbooktmvivek
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in anMelanietcastillo
 
Chp 04 ethics and proffesions (shared) ----
Chp 04   ethics and proffesions (shared) ----Chp 04   ethics and proffesions (shared) ----
Chp 04 ethics and proffesions (shared) ----YUSRA FERNANDO
 
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY  ANALYSIS.pptxHAPPIEST MIND TECHNOLOGY  ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptxkishore530256
 
Chap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxChap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxDEVKOTA Devi Bhakta
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 

Ähnlich wie 9781111534127 ppt ch02 (20)

ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
 
Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
ethcpp10.ppt
ethcpp10.pptethcpp10.ppt
ethcpp10.ppt
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
ethic01.ppt
ethic01.pptethic01.ppt
ethic01.ppt
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
01.ppt
01.ppt01.ppt
01.ppt
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.ppt
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbook
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in an
 
Chp 04 ethics and proffesions (shared) ----
Chp 04   ethics and proffesions (shared) ----Chp 04   ethics and proffesions (shared) ----
Chp 04 ethics and proffesions (shared) ----
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY  ANALYSIS.pptxHAPPIEST MIND TECHNOLOGY  ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
 
Mis
MisMis
Mis
 
Chap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxChap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptx
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 

Mehr von stanbridge

Micro Lab 3 Lecture
Micro Lab 3 LectureMicro Lab 3 Lecture
Micro Lab 3 Lecturestanbridge
 
Creating a poster v2
Creating a poster v2Creating a poster v2
Creating a poster v2stanbridge
 
Creating a poster
Creating a posterCreating a poster
Creating a posterstanbridge
 
OT 5018 Thesis Dissemination
OT 5018 Thesis DisseminationOT 5018 Thesis Dissemination
OT 5018 Thesis Disseminationstanbridge
 
Ot5101 005 week 5
Ot5101 005 week 5Ot5101 005 week 5
Ot5101 005 week 5stanbridge
 
Ot5101 005 week4
Ot5101 005 week4Ot5101 005 week4
Ot5101 005 week4stanbridge
 
Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors stanbridge
 
Ch 5 developmental stages of the learner
Ch 5   developmental stages of the learnerCh 5   developmental stages of the learner
Ch 5 developmental stages of the learnerstanbridge
 
OT 5101 week2 theory policy
OT 5101 week2 theory policyOT 5101 week2 theory policy
OT 5101 week2 theory policystanbridge
 
OT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessmentOT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessmentstanbridge
 
NUR 304 Chapter005
NUR 304 Chapter005NUR 304 Chapter005
NUR 304 Chapter005stanbridge
 
NUR 3043 Chapter007
NUR 3043 Chapter007NUR 3043 Chapter007
NUR 3043 Chapter007stanbridge
 
NUR 3043 Chapter006
NUR 3043 Chapter006NUR 3043 Chapter006
NUR 3043 Chapter006stanbridge
 
NUR 3043 Chapter004
NUR 3043 Chapter004NUR 3043 Chapter004
NUR 3043 Chapter004stanbridge
 
3043 Chapter009
3043 Chapter0093043 Chapter009
3043 Chapter009stanbridge
 
3043 Chapter008
 3043 Chapter008 3043 Chapter008
3043 Chapter008stanbridge
 
Melnyk ppt chapter_21
Melnyk ppt chapter_21Melnyk ppt chapter_21
Melnyk ppt chapter_21stanbridge
 
Melnyk ppt chapter_22
Melnyk ppt chapter_22Melnyk ppt chapter_22
Melnyk ppt chapter_22stanbridge
 

Mehr von stanbridge (20)

Micro Lab 3 Lecture
Micro Lab 3 LectureMicro Lab 3 Lecture
Micro Lab 3 Lecture
 
Creating a poster v2
Creating a poster v2Creating a poster v2
Creating a poster v2
 
Creating a poster
Creating a posterCreating a poster
Creating a poster
 
Sample poster
Sample posterSample poster
Sample poster
 
OT 5018 Thesis Dissemination
OT 5018 Thesis DisseminationOT 5018 Thesis Dissemination
OT 5018 Thesis Dissemination
 
Ot5101 005 week 5
Ot5101 005 week 5Ot5101 005 week 5
Ot5101 005 week 5
 
Ot5101 005 week4
Ot5101 005 week4Ot5101 005 week4
Ot5101 005 week4
 
Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors
 
Ch 5 developmental stages of the learner
Ch 5   developmental stages of the learnerCh 5   developmental stages of the learner
Ch 5 developmental stages of the learner
 
OT 5101 week2 theory policy
OT 5101 week2 theory policyOT 5101 week2 theory policy
OT 5101 week2 theory policy
 
OT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessmentOT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessment
 
Ot5101 week1
Ot5101 week1Ot5101 week1
Ot5101 week1
 
NUR 304 Chapter005
NUR 304 Chapter005NUR 304 Chapter005
NUR 304 Chapter005
 
NUR 3043 Chapter007
NUR 3043 Chapter007NUR 3043 Chapter007
NUR 3043 Chapter007
 
NUR 3043 Chapter006
NUR 3043 Chapter006NUR 3043 Chapter006
NUR 3043 Chapter006
 
NUR 3043 Chapter004
NUR 3043 Chapter004NUR 3043 Chapter004
NUR 3043 Chapter004
 
3043 Chapter009
3043 Chapter0093043 Chapter009
3043 Chapter009
 
3043 Chapter008
 3043 Chapter008 3043 Chapter008
3043 Chapter008
 
Melnyk ppt chapter_21
Melnyk ppt chapter_21Melnyk ppt chapter_21
Melnyk ppt chapter_21
 
Melnyk ppt chapter_22
Melnyk ppt chapter_22Melnyk ppt chapter_22
Melnyk ppt chapter_22
 

Kürzlich hochgeladen

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

9781111534127 ppt ch02

  • 1. Ethics in Information Technology, Fourth Edition Chapter 2 Ethics for IT Workers and IT Users 1
  • 2. Objectives • As you read this chapter, consider the following questions: – What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional? – What factors are transforming the professional services industry? – What relationships must an IT worker manage, and what key ethical issues can arise in each? Ethics in Information Technology, Fourth Edition 2
  • 3. Objectives (cont’d.) – How do codes of ethics, professional organizations, certification, and licensing affect the ethical behavior of IT professionals? – What is meant by compliance, and how does it help promote the right behaviors and discourage undesirable ones? Ethics in Information Technology, Fourth Edition 3
  • 4. IT Professionals • Profession is a calling that requires: – Specialized knowledge – Long and intensive academic preparation • Professionals: – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized – Contribute to society, participate in lifelong training, assist other professionals – Carry special rights and responsibilities Ethics in Information Technology, Fourth Edition 4
  • 5. Are IT Workers Professionals? • Partial list of IT specialists – Programmers – Systems analysts – Software engineers – Database administrators – Local area network (LAN) administrators – Chief information officers (CIOs) Ethics in Information Technology, Fourth Edition 5
  • 6. Are IT Workers Professionals? (cont’d.) • Legal perspective – IT workers do not meet legal definition of professional • Not licensed by state or federal government • Not liable for malpractice Ethics in Information Technology, Fourth Edition 6
  • 7. The Changing Professional Services Industry • IT workers are considered part of the professional services industry • Seven forces are changing professional services – Client sophistication (able to drive hard bargains) – Governance (due to major scandals) – Connectivity (instant communications) – Transparency (view work-in-progress in real-time) – Modularization (able to outsource modules) – Globalization (worldwide sourcing) – Commoditization (for low-end services) Ethics in Information Technology, Fourth Edition 7
  • 8. Professional Relationships That Must Be Managed • IT workers involved in relationships with: – Employers – Clients – Suppliers – Other professionals – IT users – Society at large Ethics in Information Technology, Fourth Edition 8
  • 9. Relationships Between IT Workers and Employers • IT workers agree on many aspects of work relationship before workers accept job offer • Other aspects of work relationship defined in company’s policy and procedure manual or code of conduct • Some aspects develop over time • As steward of organization’s IT resources, IT workers must set an example and enforce policies regarding the ethical use of IT in: Ethics in Information Technology, Fourth Edition 9
  • 10. Relationships Between IT Workers and Employers • Software piracy – Act of illegally making copies of software or enabling access to software to which they are not entitled – Area in which IT workers can be tempted to violate laws and policies – The Business Software Alliance (BSA) is a trade group representing the world’s largest software and hardware manufacturers; mission is to stop the unauthorized copying of software – Thousands of cases prosecuted each year Ethics in Information Technology, Fourth Edition 10
  • 11. Relationships Between IT Workers and Employers (cont’d.) Ethics in Information Technology, Fourth Edition 11
  • 12. Relationships Between IT Workers and Employers (cont’d.) • IT workers must set an example and enforce policies regarding the ethical use of IT in: (cont’d.) – Trade secrets • Business information generally unknown to public • Company takes actions to keep confidential • Require cost or effort to develop • Have some degree of uniqueness or novelty – Whistle-blowing • Employee attracts attention to a negligent, illegal, unethical, abusive, or dangerous act that threatens the public interest Ethics in Information Technology, Fourth Edition 12
  • 13. Relationships Between IT Workers and Clients • IT worker provides: – Hardware, software, or services at a certain cost and within a given time frame • Client provides: – Compensation – Access to key contacts – Work space • Relationship is usually documented in contractual terms Ethics in Information Technology, Fourth Edition 13
  • 14. Relationships Between IT Workers and Clients (cont’d.) • Client makes decisions about a project based on information, alternatives, and recommendations provided by the IT worker • Client trusts IT worker to act in client’s best interests • IT worker trusts that client will provide relevant information, listen to and understand what the IT worker says, ask questions to understand impact of key decisions, and use the information to make wise choices Ethics in Information Technology, Fourth Edition 14
  • 15. Relationships Between IT Workers and Clients (cont’d.) • Ethical problems arise if a company recommends its own products and services to remedy problems they have detected – Creates a conflict of interest • Problems arise during a project if IT workers are unable to provide full and accurate reporting of a project’s status – Finger pointing and heated discussions can ensue Ethics in Information Technology, Fourth Edition 15
  • 16. Relationships Between IT Workers and Clients (cont’d.) • Fraud – Crime of obtaining goods, services, or property through deception or trickery • Misrepresentation – Misstatement or incomplete statement of material fact – If misrepresentation causes a party to enter into a contract, that party may have the right to cancel contract or seek reimbursement for damages Ethics in Information Technology, Fourth Edition 16
  • 17. Relationships Between IT Workers and Clients (cont’d.) • Breach of contract – One party fails to meet the terms of a contract – When there is material breach of contract: • The non-breaching party may rescind the contract, seek restitution of any compensation paid to the breaching party, and be discharged from any further performance under the contract • IT projects are joint efforts in which vendors and customers work together – When there are problems, it is difficult to assign who is at fault Ethics in Information Technology, Fourth Edition 17
  • 18. Relationships Between IT Workers and Suppliers • Develop good working relationships with suppliers: – To encourage flow of useful information and ideas to develop innovative and cost-effective ways of using the supplier in ways that the IT worker may not have considered – By dealing fairly with them – By not making unreasonable demands Ethics in Information Technology, Fourth Edition 18
  • 19. Relationships Between IT Workers and Suppliers (cont’d.) • Bribery – Providing money, property, or favors to obtain a business advantage – U.S. Foreign Corrupt Practices Act (FCPA): crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office – At what point does a gift become a bribe? – No gift should be hidden – Perceptions of donor and recipient can differ – United Nations Convention Against Corruption is a global treaty to fight bribery and corruption Ethics in Information Technology, Fourth Edition 19
  • 20. Relationships Between IT Workers and Suppliers (cont’d.) Ethics in Information Technology, Fourth Edition 20
  • 21. Relationships Between IT Workers and Other Professionals • Professionals feel a degree of loyalty to other members of their profession • Professionals owe each other adherence to their profession’s code of conduct • Ethical problems among the IT profession – Résumé inflation on 30% of U.S. job applications – Inappropriate sharing of corporate information • Information might be sold intentionally or shared informally with those who have no need to know Ethics in Information Technology, Fourth Edition 21
  • 22. Relationships Between IT Workers and IT Users • IT user: person using a hardware or software product • IT workers’ duties – Understand users’ needs and capabilities – Deliver products and services that meet those needs – Establish environment that supports ethical behavior: • To discourages software piracy • To minimize inappropriate use of corporate computing resources • To avoid inappropriate sharing of information Ethics in Information Technology, Fourth Edition 22
  • 23. Relationships Between IT Workers and Society • Society expects members of a profession: – To provide significant benefits – To not cause harm through their actions • Actions of an IT worker can affect society • Professional organizations provide codes of ethics to guide IT workers’ actions Ethics in Information Technology, Fourth Edition 23
  • 24. Professional Codes of Ethics • State the principles and core values that are essential to the work of an occupational group • Most codes of ethics include: – What the organization aspires to become – Rules and principles by which members of the organization are expected to abide • Many codes also include commitment to continuing education for those who practice the profession Ethics in Information Technology, Fourth Edition 24
  • 25. Professional Codes of Ethics (cont’d.) • Following a professional code of ethics can produce benefits for the individual, the profession, and society as a whole – Ethical decision making – High standards of practice and ethical behavior – Trust and respect from general public – Evaluation benchmark for self-assessment Ethics in Information Technology, Fourth Edition 25
  • 26. Professional Organizations • No universal code of ethics for IT professionals • No single, formal organization of IT professionals has emerged as preeminent • Five of the most prominent organizations include: – Association for Computing Machinery (ACM) – Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS) – Association of IT Professionals (AITP) – SysAdmin, Audit, Network, Security (SANS) Institute Ethics in Information Technology, Fourth Edition 26
  • 27. Certification • Indicates that a professional possesses a particular set of skills, knowledge, or abilities in the opinion of the certifying organization • Can also apply to products • Generally voluntary • May or may not require adherence to a code of ethics • Employers view as benchmark of knowledge • Opinions are divided on value of certification Ethics in Information Technology, Fourth Edition 27
  • 28. Certification (cont’d.) • Vendor certifications – Some certifications substantially improve IT workers’ salaries and career prospects – Relevant for narrowly defined roles or certain aspects of broader roles – Require passing a written exam, or in some cases, a hands-on lab to demonstrate skills and knowledge – Can take years to obtain necessary experience – Training can be expensive Ethics in Information Technology, Fourth Edition 28
  • 29. Certification (cont’d.) • Industry association certifications – Require a higher level of experience and a broader perspective than vendor certifications – Must sit for and pass written exam – May need to pay annual renewal fee, earn continuing education credits, and/or pass renewal test – Lag in developing tests that cover new technologies – Are moving from purely technical content to a broader mix of technical, business, and behavioral competencies Ethics in Information Technology, Fourth Edition 29
  • 30. Government Licensing • License is a government-issued permission to engage in an activity or operate a business • Generally administered at the state level in the United States • Often requires that recipient pass a test • Some professionals must be licensed – doctors, lawyers, CPAs, medical and day care providers, engineers • One goal: protect public safety Ethics in Information Technology, Fourth Edition 30
  • 31. Government Licensing (cont’d.) • Case for licensing IT workers – Encourages following highest standards of profession – Encourages practicing a code of ethics – Violators would be punished • Without licensing, there are no requirements for heightened care and no concept of professional malpractice Ethics in Information Technology, Fourth Edition 31
  • 32. Government Licensing (cont’d.) • Issues associated with government licensing of IT workers – There are few licensing programs for IT professionals • No universally accepted core body of knowledge • Unclear who should manage content and administration of licensing exams • No administrative body to accredit professional education programs • No administrative body to assess and ensure competence of individual workers Ethics in Information Technology, Fourth Edition 32
  • 33. IT Professional Malpractice • Negligence: not doing something that a reasonable person would do, or doing something that a reasonable person would not do • Duty of care: obligation to protect people against any unreasonable harm or risk – Reasonable person standard – Reasonable professional standard • Professional malpractice: professionals who breach the duty of care are liable for injuries that their negligence causes Ethics in Information Technology, Fourth Edition 33
  • 34. IT Users • Employees’ ethical use of IT is an area of growing concern because of increased access to: – Personal computers – Corporate information systems and data – The Internet Ethics in Information Technology, Fourth Edition 34
  • 35. Common Ethical Issues for IT Users • Software piracy • Inappropriate use of computing resources – Erodes productivity and wastes time – Could lead to lawsuits • Inappropriate sharing of information, including: – Every organization stores vast amounts of private or confidential data • Private data (employees and customers) • Confidential information (company and operations) Ethics in Information Technology, Fourth Edition 35
  • 36. Supporting the Ethical Practices of IT Users • Policies that protect against abuses: – Set forth general rights and responsibilities of users – Create boundaries of acceptable behavior – Enable management to punish violators • Policy components include: – Establishing guidelines for use of company software – Defining appropriate use of IT resources – Structuring information systems to protect data and information – Installing and maintaining a corporate firewall Ethics in Information Technology, Fourth Edition 36
  • 37. Supporting the Ethical Practices of IT Users (cont’d.) Ethics in Information Technology, Fourth Edition 37
  • 38. Ethics in Information Technology, Fourth Edition 38
  • 39. Compliance • To be in accordance with established policies, guidelines, specifications, and legislation – Sarbanes-Oxley – established requirements for internal controls – HIPAA – ensures security and privacy of employee healthcare data – Failure to be in conformance can lead to criminal or civil penalties and also lawsuits Ethics in Information Technology, Fourth Edition 39
  • 40. Compliance (cont’d.) • Major challenge to comply with multiple government and industry regulations that are sometimes in conflict • To meet this challenge: – Implement software to track and record compliance actions – Hire management consultants for advice and training – Create Chief Compliance Officer position Ethics in Information Technology, Fourth Edition 40
  • 41. Compliance (cont’d.) • Audit committee is subset of the board of directors, with oversight for the following activities: – Quality and integrity of accounting and reporting practices and controls – Compliance with legal and regulatory requirements – Qualifications, independence, and performance of organization’s independent auditor – Performance of company’s internal audit team Ethics in Information Technology, Fourth Edition 41
  • 42. Compliance (cont’d.) • Internal audit committee responsibilities: – Determine that internal systems and controls are adequate and effective – Verify existence of company assets and maintain proper safeguards over their protection – Measure the organization’s compliance with its own policies and procedures – Insure that institutional policies and procedures, appropriate laws, and good practices are followed – Evaluate adequacy and reliability of information available for management decision making Ethics in Information Technology, Fourth Edition 42
  • 43. Summary • Professionals – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized • From a legal standpoint, a professional: – Has passed the state licensing requirements – Has earned the right to practice in a state(s) • IT professionals have many different relationships – Each with its own ethical issues and potential problems Ethics in Information Technology, Fourth Edition 43
  • 44. Summary (cont’d.) • Professional code of ethics – States the principles and core values essential to the work of an occupational group – Serves as a guideline for ethical decision making – Promotes high standards of practice and behavior – Enhances trust and respect from the general public – Provides an evaluation benchmark • Licensing and certification of IT professionals – Would increase the reliability and effectiveness of information systems – Raises many issues Ethics in Information Technology, Fourth Edition 44
  • 45. Summary (cont’d.) • IT-related professional organizations have developed their code of ethics that: – Outlines what the organization aspires to become – Lists rules and principles for members – Includes a commitment to continuing education for those who practice the profession • Audit committee and internal audit team have a major role in ensuring that both the IT organization and IT users are in compliance with guidelines and various legal and regulatory practices Ethics in Information Technology, Fourth Edition 45