Escolar Documentos
Profissional Documentos
Cultura Documentos
the business systems you help develop & use in your organization.
As a Manager,
For example,
electronic mail?
Should you let employees use their work computers for private business
Page | 132
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
There are a few examples of the types of decisions you will have to
Technological Ethics:
Proportionality :
The good achieved by the technology must out weigh the harm/risk.
Informed consent :
risks.
Page | 133
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
Justice :
fairly. Those who benefit should bear their fair share of the risks &
those who do not benefit should not suffer a significant increase in risk.
Minimized Risk:
Computer Crime:
terrorism.
Page | 134
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
including
4) Denying an end user access to his / her own H/w, S/w data or
Hacking:
Page | 135
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
only electronic breaking & entering that is, gets access to a computer
system, ready some files, but neither steals nor damages, anything. This
extract passwords of steal network files or to plant data that will cause a
Telnet, an internet tool for interactive use of remote computer can help
business application.
Page | 136
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
the majority of cases, they are “inside job” that involves unauthorized
In most cases, the scope of financial losses is much larger than the
incidents reported. Most co., don’t reveal that they have been target or
victims of the computer crime. They fear scaring off customer &
Page | 137
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
S/w Piracy:
Computer programs are valuable property & these are the subjects of
For eg. In US, commercial S/w packages are protected by the computer
S/w piracy and counter feiting amendment to the federal copy right act.
The alternatives are “Share wave”, which allows you to make copies of
S/w for others & “Public domain S/w” which is not copy righted.
videos, images, articles, books and other written works are especially
Page | 138
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
illegal.
For eg. P2P file sharing S/w enables direct MP3 audio file transfer of
specified tracks of music between your PC and those of the other uses
on the internet.
Thus, such S/w creates a Peer – to- peer network of millions of internet
Privacy Issues:-
integrate, interchange & retriever data & information quickly & easily.
Page | 139
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
Example :
privacy)
4) Collecting telephone Nos., E-mail address, credit card Nos., & other
Page | 140
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
making.
Exercise of
Equity Rights Honesty process
corporate
Executive Corporate due Employee Product safety
salaries process conflict of environmental
comparable with employee health internet issue
product pricing screening Security of Co., disagreement
intellectual customer information corporate
privacy
Page | 141
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
The above table outlines some of the basic categories of ethical issues &
employee privacy, security of co., records and work place safety are
I.T.
Internet privacy:
If you don’t take the proper precaution, any time you send an e-mail,
access a website, post a message to a new group, or use the internet for
banking and shopping. Whether you are online for business or pleasure,
Page | 142
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
your knowledge.
being selective about the sites you visit and the information you provide
you can minimize, if not completely eliminate the risk of your piracy
being violated.
when its actuality, they are highly visible & open to violation of their
privacy.
parties use compatible encryption S/w built into there e-mail program.
Finally, you can decline to several personal data & internet on online
whooping.
Page | 143
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
It has eliminated monotonous tasks in the office & the factory that
For eg: word processing and desktop publishing make producing office
document a lot easier to do, while robot have taken over repetitive
Thus, it can be said to upgrade the quality of work being it can upgrade
compared to the less burdensome & more creative jobs created by I.T.
CHALLENGES TO INDIVIDUALITY
Page | 144
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
activities that have been computerized, since they eliminate the human
HEALTH ISSUES:
The use of IT in the work place raises a variety of health issues. Heavy
Page | 145
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
related job stress. Workers, unions & govt. officials criticize computer
problems.
Social Issues:-
other ITs can have many beneficial effects on society. We can use IT’s
Page | 146
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
IT’s can be used for crime control through various law enforcement
applications.
For eg: Computerized alarm systems allow police to identify & quickly
IT possess the potential for great harm or pool for all human kind. If
responsibilities, then IT can help make this world a better place for us.
ERGONOMICS:
Page | 147
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
& pleasant for people to work in, thus increasing employee morale &
and even S/w package. other health issues may require ergonomics
For eg: This may require policies providing for work breaks from heavy
use every hour, while limiting the CRT exposure of pregnant workers.
Ergonomic job design can also provide more variety in job tasks for
those workers who spend most of their work day at computer work
stations.
Page | 148
MIT- Maharaja Institute of Technology
Maharaja Institute of Technology
Security and ethical Challenges
Page | 149
MIT- Maharaja Institute of Technology