chapter 3 ethics and privacy. outline for today chapter 3: ethics and privacy tech guide: protecting...

35
CHAPTER 3 Ethics and Privacy

Upload: cory-mitchell

Post on 19-Dec-2015

224 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

CHAPTER 3

Ethics and Privacy

Page 2: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Outline for Today

• Chapter 3: Ethics and Privacy

• Tech Guide: Protecting Information Assets

REMINDER:

Project 1 due tonight before midnight!

Page 3: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

A Reminder on Cheating COPYING OF OTHERS’ FILES JOINTLY WORKING ON THE SAME BASE FILES (meaning

two or more students work on the same assignment on the same machine at the same time)

PROVIDING YOUR FILES TO OTHER STUDENTS Handing in the work of others In addition, hands-on open book assignments permit the use of

books and written notes, but not electronic files or the use of student computers.

Cheating of any kind shall result in a grade of zero (0) on the test, assignment, project or quiz in question with a minimum deduction of ONE LETTER GRADE for the class, and a note to the Office of the Dean of Students. The second instance of cheating will result in the grade of an F for the class.

Page 4: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Chapter Opening Case

http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/

Page 5: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Another Case

Page 6: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Questions about Cases

Is this legal?

Who is acting unethical?

Page 7: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Chapter 3 - Ethics

How do you define ethics?

7

Page 8: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

3.1 Ethical Issues - Standards

Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior

Guidelines/Approaches

Page 9: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

General Framework for Ethics

1. Recognize an ethical issue

2. Get the facts

3. Evaluate alternative actions

4. Make a decision and test it

5. Act and reflect on the outcome of your decision

Page 10: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Ethics in the Corporate Environment

Code of ethics / conduct Microsoft Google

Fundamental tenets of ethics1.

2.

3.

Page 11: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Unethical vs. Illegal

Is everything that is unethical also illegal?

Enron World Com Subprime Mortgages Other Examples

Page 12: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Ethics and Information Technology

Ethical use of information and information technology

Should organizations:

•monitor employees?

•sell customer info?

•audit employee computers? (unauthorized software or content)

Page 13: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Ethics and Information Technology

Do emails last forever?

This can also apply to messaging at companies.

Page 14: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Advice for Organization Use

1. Only use company computer for business related work

2. Don’t send emails you wouldn’t want your parents to see

3. Limit who you give work email to

Page 15: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Ethics and Information Technology

Four categories of ethical issues involving IT applications:

Page 16: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

How much privacy do we have left?

1) We Still Have a high level of privacy

2) We are beginning to have less privacy

3) Privacy? What’s that?

Page 17: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Privacy

Court decisions have followed two rules:

Page 18: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Ex. Google and User Data

http://www.technologyreview.com/view/507441/the-us-governments-growing-appetite-for-google-users-data/

Page 19: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Ex. Mobile Device Location

Page 20: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Threats to Privacy

Data aggregators, digital dossiers, and profiling

Electronic Surveillance

Personal Information in Databases

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

Page 21: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Data Aggregators, Digital Dossiers, and Profiling

© Ilin Sergey/Age Fotostock America, Inc.

Page 22: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Electronic Surveillance

© Ilin Sergey/Age Fotostock America, Inc.

What are employee rights against surveillance?

Page 23: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Electronic Surveillance

A Face in the crowd:Say goodbye to anonymity

Page 24: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Personal Information in Databases

Banks

Utility companies

Government agencies

Credit reporting agencies

© Nicolas Nadjar/Age Fotostock America, Inc.

Page 25: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

© Marina Bordjieva/Age Fotostock America, Inc.

Page 26: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Social Networking Sites Can Cause You Problems

Anyone can post derogatory information about you anonymously.

(See this Washington Post article.)

You can also hurt yourself, as this article shows.

Page 27: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

What Can You Do?

First, be careful what information you post on social networking sites.

Second, a company, ReputationDefender, says it can remove derogatory information from the Web.

Page 28: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Protecting Privacy

Privacy Codes and Policies Ex. Facebook, Apple

Opt-out Model vs. Opt-in Model

Page 29: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Tech Guide 5

Protecting Your Information Assets

Page 30: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Information Assets

What is meant when we say

information assets?

Page 31: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Behavioral Actions

Protect SSN# Secure credit cards

Physical Virtual

Debit Cards vs. Credit Cards Proactive Protection

Page 32: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Identity Theft

Dumpster Diving Skimming Phishing Changing your address Old-Fashioned Stealing Pretexting

Federal Trade Commission

http://www.ftc.gov/bcp/edu/microsites/idtheft2012/

Page 33: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Computer-Based Actions

Know what sites have been visited

Infected Computers

Malware Infections Anti-Virus (http://www.uncw.edu/ITSD/help/antivirus.html)

Security suite (ZoneAlarm) Antispyware (Ad-Aware)

Page 34: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Computer-Based Actions

Information in SNS

Manage Patches

Browser and Operating Systems

Page 35: CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight

Portable Devices and Information

Data Encryption Password Protect Locating Devices

Prey Project Find my iPhone Where’s My Droid

http://thisguyhasmymacbook.tumblr.com/