Lecture 25 - Ethics and Privacy in IT Flashcards
Ethics
Ethics are a set of common beliefs about appropriate conduct within a community (a business, country, etc.)
Business ethics
Business ethics concerns issues that confront business professionals.
Practical Circumstances Influence Ethical Decisions (6)
- Consequences (harm or benefit from the decision)
- Society’s opinion (what others think)
- Likelihood of effect (probability of harm or benefit)
- Time to consequences
- Relatedness (how much you identify with the person or persons who will be affected)
- Reach of result (how many people will be affected)
What is utilitarianism?
Greatest good for the greatest number – measure good
What is Kant’s categorical imperative?
o Would things work if everyone behaved this way?
o Must uphold promises to individuals
What is the ethic of justice?
What if the roles were reversed? Still fair?
What is the ethic of virtue?
Would you be proud to display this behavior to the public?
Dimensions of Ethical Computer Use (5)
- Ownership and Intellectual Property
Who owns data/process? Who has right to modify/destroy them? - Responsibility
Who is responsible for quality of data/process? - Personal privacy
Who has the right to see (a copy of) “private” data? - Access
Who has the right to access official data/processes? - Unethical handling of information within business is a problem
Relevant for designing any IT system
Intellectual property
Intellectual property is intangible creative work that is embodied in physical form e.g. software, music, sketches of a company’s product.
Copyright
Copyright is legal protection for an expression of an idea.
Why is the security of email an important issue?
Email is completely insecure…
o Each e-mail you send results in at least 3 or 4 copies being stored on different computers.
o You can take measures to protect your e-mail, such as encrypting your messages.
What are technologies to help monitor employees? (5)
• Key logger software: records each stroke and mouse click performed
• Screen capture programs periodically record what is displayed on the computer screen.
• Any CD your computer burns can be traced back to your CD drive.
• An Event Data Recorders (EDR) in a car collects data if a collision occurs. It will even keep information if a second impact follows the collision.
• Computer servers (Web, Email) keep a record of:
o Each email received and sent
o Each website visited and duration
What are technologies to track customers? (6)
- Cookie
- Adware
- Spyware
- Trojan-horse software
- Web log
- Anonymous Web browsing (AWB)
Cookie
Cookie - a small record deposited on your hard disk by a Web site containing information about you and your Web activities.
Adware
Adware is software that generates ads. It installs itself when you download another (usually free) program from the Web.