SlideShare une entreprise Scribd logo
1  sur  45
Ethics in Information
Technology, Fourth Edition


           Chapter 2
Ethics for IT Workers and IT Users

                                     1
Objectives

• As you read this chapter, consider the following
  questions:
     – What key characteristics distinguish a professional
       from other kinds of workers, and is an IT worker
       considered a professional?
     – What factors are transforming the professional
       services industry?
     – What relationships must an IT worker manage, and
       what key ethical issues can arise in each?




Ethics in Information Technology, Fourth Edition             2
Objectives (cont’d.)
     – How do codes of ethics, professional organizations,
       certification, and licensing affect the ethical behavior
       of IT professionals?
     – What is meant by compliance, and how does it help
       promote the right behaviors and discourage
       undesirable ones?




Ethics in Information Technology, Fourth Edition                  3
IT Professionals

• Profession is a calling that requires:
     – Specialized knowledge
     – Long and intensive academic preparation
• Professionals:
     – Require advanced training and experience
     – Must exercise discretion and judgment in their work
     – Their work cannot be standardized
     – Contribute to society, participate in lifelong training,
       assist other professionals
     – Carry special rights and responsibilities

Ethics in Information Technology, Fourth Edition                  4
Are IT Workers Professionals?

• Partial list of IT specialists
     –   Programmers
     –   Systems analysts
     –   Software engineers
     –   Database administrators
     –   Local area network (LAN) administrators
     –   Chief information officers (CIOs)




Ethics in Information Technology, Fourth Edition   5
Are IT Workers Professionals?
                     (cont’d.)
• Legal perspective
     – IT workers do not meet legal definition of professional
        • Not licensed by state or federal government
        • Not liable for malpractice




Ethics in Information Technology, Fourth Edition             6
The Changing Professional Services
                Industry
• IT workers are considered part of the professional
  services industry
• Seven forces are changing professional services
     –   Client sophistication (able to drive hard bargains)
     –   Governance (due to major scandals)
     –   Connectivity (instant communications)
     –   Transparency (view work-in-progress in real-time)
     –   Modularization (able to outsource modules)
     –   Globalization (worldwide sourcing)
     –   Commoditization (for low-end services)

Ethics in Information Technology, Fourth Edition               7
Professional Relationships That Must
               Be Managed
• IT workers involved in relationships with:
     –   Employers
     –   Clients
     –   Suppliers
     –   Other professionals
     –   IT users
     –   Society at large




Ethics in Information Technology, Fourth Edition   8
Relationships Between
                IT Workers and Employers
• IT workers agree on many aspects of work
  relationship before workers accept job offer
• Other aspects of work relationship defined in
  company’s policy and procedure manual or code of
  conduct
• Some aspects develop over time
• As steward of organization’s IT resources, IT
  workers must set an example and enforce policies
  regarding the ethical use of IT in:



Ethics in Information Technology, Fourth Edition     9
Relationships Between
                IT Workers and Employers
• Software piracy
– Act of illegally making copies of software or enabling
  access to software to which they are not entitled
– Area in which IT workers can be tempted to violate laws
  and policies
– The Business Software Alliance (BSA) is a trade group
  representing the world’s largest software and hardware
  manufacturers; mission is to stop the unauthorized
  copying of software
– Thousands of cases prosecuted each year


Ethics in Information Technology, Fourth Edition        10
Relationships Between
     IT Workers and Employers (cont’d.)




Ethics in Information Technology, Fourth Edition   11
Relationships Between
     IT Workers and Employers (cont’d.)
• IT workers must set an example and enforce
  policies regarding the ethical use of IT in: (cont’d.)
     – Trade secrets
        • Business information generally unknown to public
        • Company takes actions to keep confidential
        • Require cost or effort to develop
        • Have some degree of uniqueness or novelty
     – Whistle-blowing
        • Employee attracts attention to a negligent, illegal,
          unethical, abusive, or dangerous act that threatens
          the public interest

Ethics in Information Technology, Fourth Edition            12
Relationships Between
                    IT Workers and Clients
• IT worker provides:
     – Hardware, software, or services at a certain cost and
       within a given time frame
• Client provides:
     – Compensation
     – Access to key contacts
     – Work space
• Relationship is usually documented in contractual
  terms


Ethics in Information Technology, Fourth Edition           13
Relationships Between
          IT Workers and Clients (cont’d.)
• Client makes decisions about a project based on
  information, alternatives, and recommendations
  provided by the IT worker
• Client trusts IT worker to act in client’s best interests
• IT worker trusts that client will provide relevant
  information, listen to and understand what the IT
  worker says, ask questions to understand impact of
  key decisions, and use the information to make wise
  choices



Ethics in Information Technology, Fourth Edition         14
Relationships Between
          IT Workers and Clients (cont’d.)
• Ethical problems arise if a company recommends its
  own products and services to remedy problems they
  have detected
     – Creates a conflict of interest
• Problems arise during a project if IT workers are
  unable to provide full and accurate reporting of a
  project’s status
     – Finger pointing and heated discussions can ensue




Ethics in Information Technology, Fourth Edition          15
Relationships Between
          IT Workers and Clients (cont’d.)
• Fraud
     – Crime of obtaining goods, services, or property
       through deception or trickery
• Misrepresentation
     – Misstatement or incomplete statement of material fact
     – If misrepresentation causes a party to enter into a
       contract, that party may have the right to cancel
       contract or seek reimbursement for damages




Ethics in Information Technology, Fourth Edition           16
Relationships Between
          IT Workers and Clients (cont’d.)
• Breach of contract
     – One party fails to meet the terms of a contract
     – When there is material breach of contract:
        • The non-breaching party may rescind the contract,
          seek restitution of any compensation paid to the
          breaching party, and be discharged from any
          further performance under the contract
• IT projects are joint efforts in which vendors and
  customers work together
     – When there are problems, it is difficult to assign who
       is at fault

Ethics in Information Technology, Fourth Edition                17
Relationships Between
                  IT Workers and Suppliers
• Develop good working relationships with suppliers:
     – To encourage flow of useful information and ideas to
       develop innovative and cost-effective ways of using
       the supplier in ways that the IT worker may not have
       considered
     – By dealing fairly with them
     – By not making unreasonable demands




Ethics in Information Technology, Fourth Edition              18
Relationships Between
       IT Workers and Suppliers (cont’d.)
• Bribery
     – Providing money, property, or favors to obtain a
       business advantage
     – U.S. Foreign Corrupt Practices Act (FCPA): crime to
       bribe a foreign official, a foreign political party official,
       or a candidate for foreign political office
     – At what point does a gift become a bribe?
     – No gift should be hidden
     – Perceptions of donor and recipient can differ
     – United Nations Convention Against Corruption is a
       global treaty to fight bribery and corruption

Ethics in Information Technology, Fourth Edition                   19
Relationships Between
       IT Workers and Suppliers (cont’d.)




Ethics in Information Technology, Fourth Edition   20
Relationships Between
     IT Workers and Other Professionals
• Professionals feel a degree of loyalty to other
  members of their profession
• Professionals owe each other adherence to their
  profession’s code of conduct
• Ethical problems among the IT profession
     – Résumé inflation on 30% of U.S. job applications
     – Inappropriate sharing of corporate information
         • Information might be sold intentionally or shared
           informally with those who have no need to know



Ethics in Information Technology, Fourth Edition               21
Relationships Between
                   IT Workers and IT Users
• IT user: person using a hardware or software
  product
• IT workers’ duties
     – Understand users’ needs and capabilities
     – Deliver products and services that meet those needs
     – Establish environment that supports ethical behavior:
        • To discourages software piracy
        • To minimize inappropriate use of corporate
          computing resources
        • To avoid inappropriate sharing of information

Ethics in Information Technology, Fourth Edition           22
Relationships Between
                    IT Workers and Society
• Society expects members of a profession:
     – To provide significant benefits
     – To not cause harm through their actions
• Actions of an IT worker can affect society
• Professional organizations provide codes of ethics
  to guide IT workers’ actions




Ethics in Information Technology, Fourth Edition       23
Professional Codes of Ethics

• State the principles and core values that are
  essential to the work of an occupational group
• Most codes of ethics include:
     – What the organization aspires to become
     – Rules and principles by which members of the
       organization are expected to abide
• Many codes also include commitment to continuing
  education for those who practice the profession




Ethics in Information Technology, Fourth Edition      24
Professional Codes of Ethics
                       (cont’d.)
• Following a professional code of ethics can produce
  benefits for the individual, the profession, and
  society as a whole
     –   Ethical decision making
     –   High standards of practice and ethical behavior
     –   Trust and respect from general public
     –   Evaluation benchmark for self-assessment




Ethics in Information Technology, Fourth Edition           25
Professional Organizations

• No universal code of ethics for IT professionals
• No single, formal organization of IT professionals
  has emerged as preeminent
• Five of the most prominent organizations include:
     – Association for Computing Machinery (ACM)
     – Institute of Electrical and Electronics Engineers
       Computer Society (IEEE-CS)
     – Association of IT Professionals (AITP)
     – SysAdmin, Audit, Network, Security (SANS) Institute



Ethics in Information Technology, Fourth Edition             26
Certification

• Indicates that a professional possesses a particular
  set of skills, knowledge, or abilities in the opinion of
  the certifying organization
• Can also apply to products
• Generally voluntary
• May or may not require adherence to a code of
  ethics
• Employers view as benchmark of knowledge
• Opinions are divided on value of certification


Ethics in Information Technology, Fourth Edition         27
Certification (cont’d.)

• Vendor certifications
     – Some certifications substantially improve IT workers’
       salaries and career prospects
     – Relevant for narrowly defined roles or certain aspects
       of broader roles
     – Require passing a written exam, or in some cases, a
       hands-on lab to demonstrate skills and knowledge
     – Can take years to obtain necessary experience
     – Training can be expensive



Ethics in Information Technology, Fourth Edition            28
Certification (cont’d.)

• Industry association certifications
     – Require a higher level of experience and a broader
       perspective than vendor certifications
     – Must sit for and pass written exam
     – May need to pay annual renewal fee, earn continuing
       education credits, and/or pass renewal test
     – Lag in developing tests that cover new technologies
     – Are moving from purely technical content to a broader
       mix of technical, business, and behavioral
       competencies


Ethics in Information Technology, Fourth Edition          29
Government Licensing

• License is a government-issued permission to
  engage in an activity or operate a business
• Generally administered at the state level in the
  United States
• Often requires that recipient pass a test
• Some professionals must be licensed – doctors,
  lawyers, CPAs, medical and day care providers,
  engineers
• One goal: protect public safety


Ethics in Information Technology, Fourth Edition     30
Government Licensing (cont’d.)

• Case for licensing IT workers
     – Encourages following highest standards of profession
     – Encourages practicing a code of ethics
     – Violators would be punished
• Without licensing, there are no requirements for
  heightened care and no concept of professional
  malpractice




Ethics in Information Technology, Fourth Edition          31
Government Licensing (cont’d.)

• Issues associated with government licensing of IT
  workers
     – There are few licensing programs for IT professionals
        • No universally accepted core body of knowledge
        • Unclear who should manage content and
          administration of licensing exams
        • No administrative body to accredit professional
          education programs
        • No administrative body to assess and ensure
          competence of individual workers


Ethics in Information Technology, Fourth Edition           32
IT Professional Malpractice

• Negligence: not doing something that a reasonable
  person would do, or doing something that a
  reasonable person would not do
• Duty of care: obligation to protect people against
  any unreasonable harm or risk
     – Reasonable person standard
     – Reasonable professional standard
• Professional malpractice: professionals who breach
  the duty of care are liable for injuries that their
  negligence causes

Ethics in Information Technology, Fourth Edition       33
IT Users

• Employees’ ethical use of IT is an area of growing
  concern because of increased access to:
     – Personal computers
     – Corporate information systems and data
     – The Internet




Ethics in Information Technology, Fourth Edition       34
Common Ethical Issues for IT Users

• Software piracy
• Inappropriate use of computing resources
     – Erodes productivity and wastes time
     – Could lead to lawsuits
• Inappropriate sharing of information, including:
     – Every organization stores vast amounts of private or
       confidential data
        • Private data (employees and customers)
        • Confidential information (company and operations)


Ethics in Information Technology, Fourth Edition          35
Supporting the Ethical Practices of
                  IT Users
• Policies that protect against abuses:
     – Set forth general rights and responsibilities of users
     – Create boundaries of acceptable behavior
     – Enable management to punish violators
• Policy components include:
     – Establishing guidelines for use of company software
     – Defining appropriate use of IT resources
     – Structuring information systems to protect data and
       information
     – Installing and maintaining a corporate firewall

Ethics in Information Technology, Fourth Edition                36
Supporting the Ethical Practices of
             IT Users (cont’d.)




Ethics in Information Technology, Fourth Edition   37
Ethics in Information Technology, Fourth Edition   38
Compliance

• To be in accordance with established policies,
  guidelines, specifications, and legislation
     – Sarbanes-Oxley – established requirements for
       internal controls
     – HIPAA – ensures security and privacy of employee
       healthcare data
     – Failure to be in conformance can lead to criminal or
       civil penalties and also lawsuits




Ethics in Information Technology, Fourth Edition              39
Compliance (cont’d.)

• Major challenge to comply with multiple government
  and industry regulations that are sometimes in
  conflict
• To meet this challenge:
     – Implement software to track and record compliance
       actions
     – Hire management consultants for advice and training
     – Create Chief Compliance Officer position




Ethics in Information Technology, Fourth Edition         40
Compliance (cont’d.)

• Audit committee is subset of the board of directors,
  with oversight for the following activities:
     – Quality and integrity of accounting and reporting
       practices and controls
     – Compliance with legal and regulatory requirements
     – Qualifications, independence, and performance of
       organization’s independent auditor
     – Performance of company’s internal audit team




Ethics in Information Technology, Fourth Edition           41
Compliance (cont’d.)

• Internal audit committee responsibilities:
     – Determine that internal systems and controls are
       adequate and effective
     – Verify existence of company assets and maintain
       proper safeguards over their protection
     – Measure the organization’s compliance with its own
       policies and procedures
     – Insure that institutional policies and procedures,
       appropriate laws, and good practices are followed
     – Evaluate adequacy and reliability of information
       available for management decision making

Ethics in Information Technology, Fourth Edition            42
Summary

• Professionals
     – Require advanced training and experience
     – Must exercise discretion and judgment in their work
     – Their work cannot be standardized
• From a legal standpoint, a professional:
     – Has passed the state licensing requirements
     – Has earned the right to practice in a state(s)
• IT professionals have many different relationships
     – Each with its own ethical issues and potential
       problems

Ethics in Information Technology, Fourth Edition             43
Summary (cont’d.)

• Professional code of ethics
     – States the principles and core values essential to the
       work of an occupational group
     – Serves as a guideline for ethical decision making
     – Promotes high standards of practice and behavior
     – Enhances trust and respect from the general public
     – Provides an evaluation benchmark
• Licensing and certification of IT professionals
     – Would increase the reliability and effectiveness of
       information systems
     – Raises many issues
Ethics in Information Technology, Fourth Edition             44
Summary (cont’d.)

• IT-related professional organizations have
  developed their code of ethics that:
     – Outlines what the organization aspires to become
     – Lists rules and principles for members
     – Includes a commitment to continuing education for
       those who practice the profession
• Audit committee and internal audit team have a
  major role in ensuring that both the IT organization
  and IT users are in compliance with guidelines and
  various legal and regulatory practices


Ethics in Information Technology, Fourth Edition           45

Contenu connexe

Tendances

Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of EthicsSuji Priya J
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptxMarvenParay
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rightsHamza Cheema
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 

Tendances (20)

Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of Ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 

Similaire à 9781111534127 ppt ch02

1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01stanbridge
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...Business Development Institute
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbooktmvivek
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in anMelanietcastillo
 
Chp 04 ethics and proffesions (shared) ----
Chp 04   ethics and proffesions (shared) ----Chp 04   ethics and proffesions (shared) ----
Chp 04 ethics and proffesions (shared) ----YUSRA FERNANDO
 
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY  ANALYSIS.pptxHAPPIEST MIND TECHNOLOGY  ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptxkishore530256
 

Similaire à 9781111534127 ppt ch02 (20)

ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
Chapter 2_dp-pertemuan 2&3
 Chapter 2_dp-pertemuan 2&3 Chapter 2_dp-pertemuan 2&3
Chapter 2_dp-pertemuan 2&3
 
2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
 
Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
ethcpp10.ppt
ethcpp10.pptethcpp10.ppt
ethcpp10.ppt
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
9781111534127 ppt ch01
9781111534127 ppt ch019781111534127 ppt ch01
9781111534127 ppt ch01
 
Ethic02
Ethic02Ethic02
Ethic02
 
ethic01.ppt
ethic01.pptethic01.ppt
ethic01.ppt
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
01.ppt
01.ppt01.ppt
01.ppt
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.ppt
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbook
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in an
 
Chp 04 ethics and proffesions (shared) ----
Chp 04   ethics and proffesions (shared) ----Chp 04   ethics and proffesions (shared) ----
Chp 04 ethics and proffesions (shared) ----
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY  ANALYSIS.pptxHAPPIEST MIND TECHNOLOGY  ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
 

Plus de stanbridge

Micro Lab 3 Lecture
Micro Lab 3 LectureMicro Lab 3 Lecture
Micro Lab 3 Lecturestanbridge
 
Creating a poster v2
Creating a poster v2Creating a poster v2
Creating a poster v2stanbridge
 
Creating a poster
Creating a posterCreating a poster
Creating a posterstanbridge
 
OT 5018 Thesis Dissemination
OT 5018 Thesis DisseminationOT 5018 Thesis Dissemination
OT 5018 Thesis Disseminationstanbridge
 
Ot5101 005 week 5
Ot5101 005 week 5Ot5101 005 week 5
Ot5101 005 week 5stanbridge
 
Ot5101 005 week4
Ot5101 005 week4Ot5101 005 week4
Ot5101 005 week4stanbridge
 
Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors stanbridge
 
Ch 5 developmental stages of the learner
Ch 5   developmental stages of the learnerCh 5   developmental stages of the learner
Ch 5 developmental stages of the learnerstanbridge
 
OT 5101 week2 theory policy
OT 5101 week2 theory policyOT 5101 week2 theory policy
OT 5101 week2 theory policystanbridge
 
OT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessmentOT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessmentstanbridge
 
NUR 304 Chapter005
NUR 304 Chapter005NUR 304 Chapter005
NUR 304 Chapter005stanbridge
 
NUR 3043 Chapter007
NUR 3043 Chapter007NUR 3043 Chapter007
NUR 3043 Chapter007stanbridge
 
NUR 3043 Chapter006
NUR 3043 Chapter006NUR 3043 Chapter006
NUR 3043 Chapter006stanbridge
 
NUR 3043 Chapter004
NUR 3043 Chapter004NUR 3043 Chapter004
NUR 3043 Chapter004stanbridge
 
3043 Chapter009
3043 Chapter0093043 Chapter009
3043 Chapter009stanbridge
 
3043 Chapter008
 3043 Chapter008 3043 Chapter008
3043 Chapter008stanbridge
 
Melnyk ppt chapter_21
Melnyk ppt chapter_21Melnyk ppt chapter_21
Melnyk ppt chapter_21stanbridge
 
Melnyk ppt chapter_22
Melnyk ppt chapter_22Melnyk ppt chapter_22
Melnyk ppt chapter_22stanbridge
 

Plus de stanbridge (20)

Micro Lab 3 Lecture
Micro Lab 3 LectureMicro Lab 3 Lecture
Micro Lab 3 Lecture
 
Creating a poster v2
Creating a poster v2Creating a poster v2
Creating a poster v2
 
Creating a poster
Creating a posterCreating a poster
Creating a poster
 
Sample poster
Sample posterSample poster
Sample poster
 
OT 5018 Thesis Dissemination
OT 5018 Thesis DisseminationOT 5018 Thesis Dissemination
OT 5018 Thesis Dissemination
 
Ot5101 005 week 5
Ot5101 005 week 5Ot5101 005 week 5
Ot5101 005 week 5
 
Ot5101 005 week4
Ot5101 005 week4Ot5101 005 week4
Ot5101 005 week4
 
Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors Compliance, motivation, and health behaviors
Compliance, motivation, and health behaviors
 
Ch 5 developmental stages of the learner
Ch 5   developmental stages of the learnerCh 5   developmental stages of the learner
Ch 5 developmental stages of the learner
 
OT 5101 week2 theory policy
OT 5101 week2 theory policyOT 5101 week2 theory policy
OT 5101 week2 theory policy
 
OT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessmentOT 5101 week3 planning needs assessment
OT 5101 week3 planning needs assessment
 
Ot5101 week1
Ot5101 week1Ot5101 week1
Ot5101 week1
 
NUR 304 Chapter005
NUR 304 Chapter005NUR 304 Chapter005
NUR 304 Chapter005
 
NUR 3043 Chapter007
NUR 3043 Chapter007NUR 3043 Chapter007
NUR 3043 Chapter007
 
NUR 3043 Chapter006
NUR 3043 Chapter006NUR 3043 Chapter006
NUR 3043 Chapter006
 
NUR 3043 Chapter004
NUR 3043 Chapter004NUR 3043 Chapter004
NUR 3043 Chapter004
 
3043 Chapter009
3043 Chapter0093043 Chapter009
3043 Chapter009
 
3043 Chapter008
 3043 Chapter008 3043 Chapter008
3043 Chapter008
 
Melnyk ppt chapter_21
Melnyk ppt chapter_21Melnyk ppt chapter_21
Melnyk ppt chapter_21
 
Melnyk ppt chapter_22
Melnyk ppt chapter_22Melnyk ppt chapter_22
Melnyk ppt chapter_22
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

9781111534127 ppt ch02

  • 1. Ethics in Information Technology, Fourth Edition Chapter 2 Ethics for IT Workers and IT Users 1
  • 2. Objectives • As you read this chapter, consider the following questions: – What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional? – What factors are transforming the professional services industry? – What relationships must an IT worker manage, and what key ethical issues can arise in each? Ethics in Information Technology, Fourth Edition 2
  • 3. Objectives (cont’d.) – How do codes of ethics, professional organizations, certification, and licensing affect the ethical behavior of IT professionals? – What is meant by compliance, and how does it help promote the right behaviors and discourage undesirable ones? Ethics in Information Technology, Fourth Edition 3
  • 4. IT Professionals • Profession is a calling that requires: – Specialized knowledge – Long and intensive academic preparation • Professionals: – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized – Contribute to society, participate in lifelong training, assist other professionals – Carry special rights and responsibilities Ethics in Information Technology, Fourth Edition 4
  • 5. Are IT Workers Professionals? • Partial list of IT specialists – Programmers – Systems analysts – Software engineers – Database administrators – Local area network (LAN) administrators – Chief information officers (CIOs) Ethics in Information Technology, Fourth Edition 5
  • 6. Are IT Workers Professionals? (cont’d.) • Legal perspective – IT workers do not meet legal definition of professional • Not licensed by state or federal government • Not liable for malpractice Ethics in Information Technology, Fourth Edition 6
  • 7. The Changing Professional Services Industry • IT workers are considered part of the professional services industry • Seven forces are changing professional services – Client sophistication (able to drive hard bargains) – Governance (due to major scandals) – Connectivity (instant communications) – Transparency (view work-in-progress in real-time) – Modularization (able to outsource modules) – Globalization (worldwide sourcing) – Commoditization (for low-end services) Ethics in Information Technology, Fourth Edition 7
  • 8. Professional Relationships That Must Be Managed • IT workers involved in relationships with: – Employers – Clients – Suppliers – Other professionals – IT users – Society at large Ethics in Information Technology, Fourth Edition 8
  • 9. Relationships Between IT Workers and Employers • IT workers agree on many aspects of work relationship before workers accept job offer • Other aspects of work relationship defined in company’s policy and procedure manual or code of conduct • Some aspects develop over time • As steward of organization’s IT resources, IT workers must set an example and enforce policies regarding the ethical use of IT in: Ethics in Information Technology, Fourth Edition 9
  • 10. Relationships Between IT Workers and Employers • Software piracy – Act of illegally making copies of software or enabling access to software to which they are not entitled – Area in which IT workers can be tempted to violate laws and policies – The Business Software Alliance (BSA) is a trade group representing the world’s largest software and hardware manufacturers; mission is to stop the unauthorized copying of software – Thousands of cases prosecuted each year Ethics in Information Technology, Fourth Edition 10
  • 11. Relationships Between IT Workers and Employers (cont’d.) Ethics in Information Technology, Fourth Edition 11
  • 12. Relationships Between IT Workers and Employers (cont’d.) • IT workers must set an example and enforce policies regarding the ethical use of IT in: (cont’d.) – Trade secrets • Business information generally unknown to public • Company takes actions to keep confidential • Require cost or effort to develop • Have some degree of uniqueness or novelty – Whistle-blowing • Employee attracts attention to a negligent, illegal, unethical, abusive, or dangerous act that threatens the public interest Ethics in Information Technology, Fourth Edition 12
  • 13. Relationships Between IT Workers and Clients • IT worker provides: – Hardware, software, or services at a certain cost and within a given time frame • Client provides: – Compensation – Access to key contacts – Work space • Relationship is usually documented in contractual terms Ethics in Information Technology, Fourth Edition 13
  • 14. Relationships Between IT Workers and Clients (cont’d.) • Client makes decisions about a project based on information, alternatives, and recommendations provided by the IT worker • Client trusts IT worker to act in client’s best interests • IT worker trusts that client will provide relevant information, listen to and understand what the IT worker says, ask questions to understand impact of key decisions, and use the information to make wise choices Ethics in Information Technology, Fourth Edition 14
  • 15. Relationships Between IT Workers and Clients (cont’d.) • Ethical problems arise if a company recommends its own products and services to remedy problems they have detected – Creates a conflict of interest • Problems arise during a project if IT workers are unable to provide full and accurate reporting of a project’s status – Finger pointing and heated discussions can ensue Ethics in Information Technology, Fourth Edition 15
  • 16. Relationships Between IT Workers and Clients (cont’d.) • Fraud – Crime of obtaining goods, services, or property through deception or trickery • Misrepresentation – Misstatement or incomplete statement of material fact – If misrepresentation causes a party to enter into a contract, that party may have the right to cancel contract or seek reimbursement for damages Ethics in Information Technology, Fourth Edition 16
  • 17. Relationships Between IT Workers and Clients (cont’d.) • Breach of contract – One party fails to meet the terms of a contract – When there is material breach of contract: • The non-breaching party may rescind the contract, seek restitution of any compensation paid to the breaching party, and be discharged from any further performance under the contract • IT projects are joint efforts in which vendors and customers work together – When there are problems, it is difficult to assign who is at fault Ethics in Information Technology, Fourth Edition 17
  • 18. Relationships Between IT Workers and Suppliers • Develop good working relationships with suppliers: – To encourage flow of useful information and ideas to develop innovative and cost-effective ways of using the supplier in ways that the IT worker may not have considered – By dealing fairly with them – By not making unreasonable demands Ethics in Information Technology, Fourth Edition 18
  • 19. Relationships Between IT Workers and Suppliers (cont’d.) • Bribery – Providing money, property, or favors to obtain a business advantage – U.S. Foreign Corrupt Practices Act (FCPA): crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office – At what point does a gift become a bribe? – No gift should be hidden – Perceptions of donor and recipient can differ – United Nations Convention Against Corruption is a global treaty to fight bribery and corruption Ethics in Information Technology, Fourth Edition 19
  • 20. Relationships Between IT Workers and Suppliers (cont’d.) Ethics in Information Technology, Fourth Edition 20
  • 21. Relationships Between IT Workers and Other Professionals • Professionals feel a degree of loyalty to other members of their profession • Professionals owe each other adherence to their profession’s code of conduct • Ethical problems among the IT profession – Résumé inflation on 30% of U.S. job applications – Inappropriate sharing of corporate information • Information might be sold intentionally or shared informally with those who have no need to know Ethics in Information Technology, Fourth Edition 21
  • 22. Relationships Between IT Workers and IT Users • IT user: person using a hardware or software product • IT workers’ duties – Understand users’ needs and capabilities – Deliver products and services that meet those needs – Establish environment that supports ethical behavior: • To discourages software piracy • To minimize inappropriate use of corporate computing resources • To avoid inappropriate sharing of information Ethics in Information Technology, Fourth Edition 22
  • 23. Relationships Between IT Workers and Society • Society expects members of a profession: – To provide significant benefits – To not cause harm through their actions • Actions of an IT worker can affect society • Professional organizations provide codes of ethics to guide IT workers’ actions Ethics in Information Technology, Fourth Edition 23
  • 24. Professional Codes of Ethics • State the principles and core values that are essential to the work of an occupational group • Most codes of ethics include: – What the organization aspires to become – Rules and principles by which members of the organization are expected to abide • Many codes also include commitment to continuing education for those who practice the profession Ethics in Information Technology, Fourth Edition 24
  • 25. Professional Codes of Ethics (cont’d.) • Following a professional code of ethics can produce benefits for the individual, the profession, and society as a whole – Ethical decision making – High standards of practice and ethical behavior – Trust and respect from general public – Evaluation benchmark for self-assessment Ethics in Information Technology, Fourth Edition 25
  • 26. Professional Organizations • No universal code of ethics for IT professionals • No single, formal organization of IT professionals has emerged as preeminent • Five of the most prominent organizations include: – Association for Computing Machinery (ACM) – Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS) – Association of IT Professionals (AITP) – SysAdmin, Audit, Network, Security (SANS) Institute Ethics in Information Technology, Fourth Edition 26
  • 27. Certification • Indicates that a professional possesses a particular set of skills, knowledge, or abilities in the opinion of the certifying organization • Can also apply to products • Generally voluntary • May or may not require adherence to a code of ethics • Employers view as benchmark of knowledge • Opinions are divided on value of certification Ethics in Information Technology, Fourth Edition 27
  • 28. Certification (cont’d.) • Vendor certifications – Some certifications substantially improve IT workers’ salaries and career prospects – Relevant for narrowly defined roles or certain aspects of broader roles – Require passing a written exam, or in some cases, a hands-on lab to demonstrate skills and knowledge – Can take years to obtain necessary experience – Training can be expensive Ethics in Information Technology, Fourth Edition 28
  • 29. Certification (cont’d.) • Industry association certifications – Require a higher level of experience and a broader perspective than vendor certifications – Must sit for and pass written exam – May need to pay annual renewal fee, earn continuing education credits, and/or pass renewal test – Lag in developing tests that cover new technologies – Are moving from purely technical content to a broader mix of technical, business, and behavioral competencies Ethics in Information Technology, Fourth Edition 29
  • 30. Government Licensing • License is a government-issued permission to engage in an activity or operate a business • Generally administered at the state level in the United States • Often requires that recipient pass a test • Some professionals must be licensed – doctors, lawyers, CPAs, medical and day care providers, engineers • One goal: protect public safety Ethics in Information Technology, Fourth Edition 30
  • 31. Government Licensing (cont’d.) • Case for licensing IT workers – Encourages following highest standards of profession – Encourages practicing a code of ethics – Violators would be punished • Without licensing, there are no requirements for heightened care and no concept of professional malpractice Ethics in Information Technology, Fourth Edition 31
  • 32. Government Licensing (cont’d.) • Issues associated with government licensing of IT workers – There are few licensing programs for IT professionals • No universally accepted core body of knowledge • Unclear who should manage content and administration of licensing exams • No administrative body to accredit professional education programs • No administrative body to assess and ensure competence of individual workers Ethics in Information Technology, Fourth Edition 32
  • 33. IT Professional Malpractice • Negligence: not doing something that a reasonable person would do, or doing something that a reasonable person would not do • Duty of care: obligation to protect people against any unreasonable harm or risk – Reasonable person standard – Reasonable professional standard • Professional malpractice: professionals who breach the duty of care are liable for injuries that their negligence causes Ethics in Information Technology, Fourth Edition 33
  • 34. IT Users • Employees’ ethical use of IT is an area of growing concern because of increased access to: – Personal computers – Corporate information systems and data – The Internet Ethics in Information Technology, Fourth Edition 34
  • 35. Common Ethical Issues for IT Users • Software piracy • Inappropriate use of computing resources – Erodes productivity and wastes time – Could lead to lawsuits • Inappropriate sharing of information, including: – Every organization stores vast amounts of private or confidential data • Private data (employees and customers) • Confidential information (company and operations) Ethics in Information Technology, Fourth Edition 35
  • 36. Supporting the Ethical Practices of IT Users • Policies that protect against abuses: – Set forth general rights and responsibilities of users – Create boundaries of acceptable behavior – Enable management to punish violators • Policy components include: – Establishing guidelines for use of company software – Defining appropriate use of IT resources – Structuring information systems to protect data and information – Installing and maintaining a corporate firewall Ethics in Information Technology, Fourth Edition 36
  • 37. Supporting the Ethical Practices of IT Users (cont’d.) Ethics in Information Technology, Fourth Edition 37
  • 38. Ethics in Information Technology, Fourth Edition 38
  • 39. Compliance • To be in accordance with established policies, guidelines, specifications, and legislation – Sarbanes-Oxley – established requirements for internal controls – HIPAA – ensures security and privacy of employee healthcare data – Failure to be in conformance can lead to criminal or civil penalties and also lawsuits Ethics in Information Technology, Fourth Edition 39
  • 40. Compliance (cont’d.) • Major challenge to comply with multiple government and industry regulations that are sometimes in conflict • To meet this challenge: – Implement software to track and record compliance actions – Hire management consultants for advice and training – Create Chief Compliance Officer position Ethics in Information Technology, Fourth Edition 40
  • 41. Compliance (cont’d.) • Audit committee is subset of the board of directors, with oversight for the following activities: – Quality and integrity of accounting and reporting practices and controls – Compliance with legal and regulatory requirements – Qualifications, independence, and performance of organization’s independent auditor – Performance of company’s internal audit team Ethics in Information Technology, Fourth Edition 41
  • 42. Compliance (cont’d.) • Internal audit committee responsibilities: – Determine that internal systems and controls are adequate and effective – Verify existence of company assets and maintain proper safeguards over their protection – Measure the organization’s compliance with its own policies and procedures – Insure that institutional policies and procedures, appropriate laws, and good practices are followed – Evaluate adequacy and reliability of information available for management decision making Ethics in Information Technology, Fourth Edition 42
  • 43. Summary • Professionals – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized • From a legal standpoint, a professional: – Has passed the state licensing requirements – Has earned the right to practice in a state(s) • IT professionals have many different relationships – Each with its own ethical issues and potential problems Ethics in Information Technology, Fourth Edition 43
  • 44. Summary (cont’d.) • Professional code of ethics – States the principles and core values essential to the work of an occupational group – Serves as a guideline for ethical decision making – Promotes high standards of practice and behavior – Enhances trust and respect from the general public – Provides an evaluation benchmark • Licensing and certification of IT professionals – Would increase the reliability and effectiveness of information systems – Raises many issues Ethics in Information Technology, Fourth Edition 44
  • 45. Summary (cont’d.) • IT-related professional organizations have developed their code of ethics that: – Outlines what the organization aspires to become – Lists rules and principles for members – Includes a commitment to continuing education for those who practice the profession • Audit committee and internal audit team have a major role in ensuring that both the IT organization and IT users are in compliance with guidelines and various legal and regulatory practices Ethics in Information Technology, Fourth Edition 45