Security , Ethical challenges of
IT
Health
Employment
Individuality
Working
Crime
Privacy
Business Ethics
Is concerned with the no of ethical
questions that managers must confront as
part of their daily business decision
making
To Promote responsibility of business
professionals
Business Ethics
Intellectual Property right
Customer and employee privacy
Security of company records
Exercise of corporate power
Customer and employee privacy
Employee health
Sexual Harassment
Affirmative action
Equal employment opportunity
Security of company records
Inappropriate gift
Advertising content
Government cash
Financial and cash management
procedure
Questionable business practices in foreign
country
Exercise of corporate power
Product safety
Environment issue
Disinvestment
Corporate contribution
Social issue raised by religious
organizations
Political action committee
Technology Ethics
AITP (Association of information
Technology)
Informed consent
Justice
Minimized risk
Computer Crime / Cyber Crime
The unauthorized use, access, modification and
destruction of H/W, S/W, data or network
resources
The unauthorized release of information
The unauthorized copying of S/W
Denying an end user access to their own H/W,
S/w , Data
Using network resources to illegally obtain
information or tangible property
Security Technology
Antivirus
Virtual Private network
Intrusion-detection system
Content filtering / monitoring
Public key infrastructure
Smart cards
Bio informatics
Hacking
Hacker can be outsiders or company
employee who use the internet and other
networks to steal or damage data
Common Hacking Tactics
Denial of services
Shifter –Capture password or entire contents / is
frequently used to monitor network traffic to
evaluate network capacity as well as reveal
evidence of improper use
Spooling – Faking an email address or web
page to trick users into passing along critical info
like passwords ,or credit card numbers
Common Hacking Tactics
…..
Viruses
( Trojan Horse , Back Doors, malicious,
applets, logic bombs, buffer overflows,
password crackers)
Cyber theft
Many computer crimes involves the theft
of money
Unauthorized use at work
Use of computer systems and networks
can be called time and resource theft
(personal use on office computer)
Doing private consulting or personal
Playing video games
To unauthorized use of internet on
company networks
Internet Abuses
General E-Mail abuses
Unauthorized usage and access
Copy right infringement
Newsgroup posting
Transmission of confidential data
Pornography
Hacking
Non work related download / upload
Leisure use of the internet
Usage of external ISPs
Moonlighting
Moonlighting
Using office resources such as networks
and computers to organize and conduct
personal business (side jobs)
Software Piracy
Computer programs are valuable property and
thus are the subject of theft from computer
systems. However unauthorized copying of
software or software piracy is also a major form
of S/W theft.
S/W is not the only property subject to computer
based piracy . Other intellectual property in the
forms of copy righted material such as music,
videos , images, articles, books and other written
materials
Privacy Issues
Right to privacy of every individual
Spamming is the indiscriminate sending of
unsolicited email message (spam)
Junk e mail
Unsolicited advertisement
Flaming –is the practice of sending
extremely critical derogatory and often
vulgar email messages
Usage of external ISPs
Using an external ISP to connect to the
internet to avoid detection
Leisure use of the internet
Locating around the internet , which
includes shopping , sending e cards and
personal email, gabling online ,chatting ,
game playing , stock trading and doing
personal activities
Non work related download /
upload
Propagation of S/w that ties up office
bandwidth ,use of programs that allow the
transmission of movie , music and
graphical materials
Hacking
Hacking of websites, ranging from denial
of service attacks to accessing
organizational data bases
Pornography
Accessing sexually explicit sites from
workplace as well as the display,
distribution and surfing of these offensive
sites
Transmission of confidential data
Using the internet to display or transmit
trade secrets
Newsgroup posting
Posting of messages on various non work
related
Copy right infringement
Using illegal or pirated S/W
Copying of web sites
Copyrighted logos
Unauthorized usage and access
Sharing of passwords and access into
networks without permission
General E-Mail abuses
Include spamming, harassments, chain
letters , spoofing, viruses
Other Challenges
Employment Challenges
Computer Monitoring
Health Issues
Employment Challenges
- New jobs availability
- Significant reduction in some types of
job opportunity
Computer Monitoring
Computer are being used to monitor the
productivity and behavior of millions of
employees while they works
Health Issues
Repetitive key stroke jobs can suffer a
variety of health problems
Cumulative trauma disorders( fingers,
wrists, arms, necks, and backs may
become so weak)
Carpal Tunnel Syndrome( a painful,
crippling, ailment of the hand and wrist
that typically requires surgery to cure)