Outline for Today
• Chapter 3: Ethics and Privacy
• Tech Guide: Protecting Information Assets
REMINDER:
Project 1 due tonight before midnight!
A Reminder on Cheating
COPYING OF OTHERS’ FILES
JOINTLY WORKING ON THE SAME BASE FILES (meaning two or more students work on the same assignment on the same machine at the same time)
PROVIDING YOUR FILES TO OTHER STUDENTS
Handing in the work of others
In addition, hands-on open book assignments permit the use of books and written notes, but not electronic files or the use of student computers.
Cheating of any kind shall result in a grade of zero (0) on the test, assignment, project or quiz in question with a minimum deduction of ONE LETTER GRADE for the class, and a note to the Office of the Dean of Students. The second instance of cheating will result in the grade of an F for the class.
Chapter Opening Case
Data
Broker
Marketers
Internet
Consumer s http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/
Another Case
Questions about Cases
Is this legal?
Who is acting unethical?
Chapter 3 - Ethics
How do you define ethics?
7
3.1 Ethical Issues - Standards
Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior
Guidelines/Approaches
General Framework for Ethics
1.
Recognize an ethical issue
2.
Get the facts
3.
Evaluate alternative actions
4.
Make a decision and test it
5.
Act and reflect on the outcome of your decision
Ethics in the Corporate Environment
Code of ethics / conduct
Microsoft
Fundamental tenets of ethics
1.
2.
3.
Unethical vs. Illegal
Is everything that is unethical also illegal?
Enron
World Com
Subprime Mortgages
Other Examples
Ethics and Information Technology
Ethical use of information and information technology
Should organizations:
• monitor employees?
• sell customer info?
• audit employee computers?
(unauthorized software or content)
Ethics and Information Technology
This can also apply to messaging at companies.
Advice for Organization Use
1. Only use company computer for business related work
2.
Don’t send emails you wouldn’t want your parents to see
3. Limit who you give work email to
Ethics and Information Technology
Four categories of ethical issues involving
IT applications :
•
•
•
•
How much privacy do we have left?
1) We Still Have a high level of privacy
2) We are beginning to have less privacy
3) Privacy? What’s that?
Privacy
Court decisions have followed two rules:
Ex. Google and User Data http://www.technologyreview.com/view/507441/the-us-governments-growing-appetite-for-google-users-data/
Ex. Mobile Device Location
Threats to Privacy
Data aggregators, digital dossiers, and profiling
Electronic Surveillance
Personal Information in Databases
Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
Data Aggregators, Digital Dossiers, and Profiling
© Ilin Sergey/Age Fotostock America, Inc.
Electronic Surveillance
What are employee rights against surveillance?
© Ilin Sergey/Age Fotostock America, Inc.
Electronic Surveillance
A Face in the crowd:
Say goodbye to anonymity
Personal Information in Databases
Banks
Utility companies
Government agencies
Credit reporting agencies
© Nicolas Nadjar/Age Fotostock America, Inc.
Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
© Marina Bordjieva/Age Fotostock America, Inc.
Social Networking Sites Can
Cause You Problems
Anyone can post derogatory information about you anonymously .
(See this Washington Post article .)
You can also hurt yourself, as this article shows.
What Can You Do?
First, be careful what information you post on social networking sites.
Second, a company, ReputationDefender, says it can remove derogatory information from the
Web.
Protecting Privacy
Privacy Codes and Policies
Ex . Facebook , Apple
Opt-out Model vs. Opt-in Model
Information Assets
What is meant when we say information assets?
Behavioral Actions
Protect SSN#
Secure credit cards
Physical
Virtual
Debit Cards vs. Credit Cards
Proactive Protection
Identity Theft
Dumpster Diving
Skimming
Phishing
Changing your address
Old-Fashioned Stealing
Pretexting
Federal Trade Commission http://www.ftc.gov/bcp/edu/microsites/idtheft2012/
Computer-Based Actions
Know what sites have been visited
Infected Computers
Malware Infections
Anti-Virus
( http://www.uncw.edu/ITSD/help/antivirus.html
)
Security suite ( ZoneAlarm )
Antispyware ( Ad-Aware )
Computer-Based Actions
Information in SNS
Manage Patches
Browser and Operating Systems
Portable Devices and Information
Data Encryption
Password Protect
Locating Devices
Prey Project
Find my iPhone
Where’s My Droid http://thisguyhasmymacbook.tumblr.com/