/
ISNE101 ISNE101

ISNE101 - PowerPoint Presentation

alexa-scheidler
alexa-scheidler . @alexa-scheidler
Follow
371 views
Uploaded On 2016-03-06

ISNE101 - PPT Presentation

Dr Ken Cosh Review Dependability Reliability How do we improve it Security Threats amp Countering the Threats This Week Ethics Ethical amp Social Impact Ethical issues in the areas of crime privacy individuality employment health and working conditions ID: 244569

work privacy computer ethical privacy work ethical computer employees information email sharing human speech theory customers monitoring conditions working

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "ISNE101" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

ISNE101

Dr. Ken

CoshSlide2

Review

Dependability

Reliability

How do we improve it?

Security

Threats & Countering the ThreatsSlide3

This Week

EthicsSlide4

Ethical & Social Impact

Ethical issues in the areas of crime, privacy, individuality, employment, health and working conditions.

Impacts can be positive, negative or both;

Computerising a manufacturing process has lead to people losing jobs, while improving the working conditions of those left and producing higher quality product and less cost.Slide5

Managing Ethically

Should you monitor employees email?

Should employees use work computers for private purposes?

Should they take copies of software home?

Should you keep electronic copies of employee’s personal records?

Should you sell your customers information?Slide6

Management’s Ethical Challenges

Employment

The introduction of IS/IT has created many new jobs, while at the same time eliminating some – how do we ethically introduce job cutting systems?

Computer Monitoring

How can we weigh up our employees right to privacy against the desire to monitor computer usage (as a way of managing employees work)?Slide7

Management’s Ethical Challenges

Working Conditions

While IS/IT has removed many repetitive, monotonous tasks, often the human role has changed from one of a craftsman to one of a machine regulating a machine

Individuality

Many IS/IT remove the individual treatment of people by imposing strict, uncustomisable procedures. Rather than dealing with customers individually, we are constrained by the capabilities of the system.Slide8

Business Ethics

Stockholder Theory

Managers are agents of the stockholders, with the ethical responsibility to them to increase profits without breaking the law

Social Contract Theory

Companies have an ethical responsibility to all members of society.

Stakeholder Theory

Managers should manage for the benefit of all stakeholders; shareholders, customers, suppliers, local community, employees etc.Slide9

Unauthorised Use at Work

Time and Resource Theft (Cyberslacking)

Often monitored by sniffing software.

Includes;

General Email abuse (spamming, chain letters, spoofing, virus spreading, harrassment, defamatory statements)

Unauthorised Usage and Access (Sharing passwords and network access)

Copyright Infringement / Plagiarism (illegal or pirate software, copying websites or logos)Slide10

Unauthorised Use at Work

Transmission of Confidential Data (Sharing company secrets)

Pornography (Accessing inappropriate websites on work resources)

Hacking

Non-work-related bandwidth use (sharing movies, music etc.)

Leisure use (online shopping, chatting, gambling)

Usage of External ISPs (avoiding detection by using external ISP)

Moonlighting (using company resources for personal business).Slide11

Privacy

A basic human right is the right to privacy, but this right is brought into question by Technology.

Accessing individuals private email conversations and computer records is a violation of privacy

Monitoring peoples whereabouts through CCTV, computer monitoring, Mobile GPS.

Computer matching of customer information gained from different sources.

Collecting telephone number / email addresses etc. to build customer profilesSlide12

Anonymity

The internet allows almost anonymity

In reality much of it is very visible and open to privacy violations.

But precautions can be taken to protect privacy, such as encryption, authentication etc.Slide13

Freedom of Speech / Information

Freedom of speech (information and the press), is another important human right.

Do people have a right to know about matters that others may wish to keep private?

With modern communication systems, sharing opinions (using ones right to free speech) becomes easier;

Flaming

SpammingSlide14

Facebook…

So who has read Facebook’s Privacy Policy?Slide15
Slide16
Slide17
Slide18
Slide19
Slide20

Related Contents


Next Show more