information assets

advertisement

CHAPTER 3

Ethics and Privacy

Outline for Today

• Chapter 3: Ethics and Privacy

• Tech Guide: Protecting Information Assets

REMINDER:

Project 1 due tonight before midnight!

A Reminder on Cheating

COPYING OF OTHERS’ FILES

JOINTLY WORKING ON THE SAME BASE FILES (meaning two or more students work on the same assignment on the same machine at the same time)

PROVIDING YOUR FILES TO OTHER STUDENTS

Handing in the work of others

In addition, hands-on open book assignments permit the use of books and written notes, but not electronic files or the use of student computers.

Cheating of any kind shall result in a grade of zero (0) on the test, assignment, project or quiz in question with a minimum deduction of ONE LETTER GRADE for the class, and a note to the Office of the Dean of Students. The second instance of cheating will result in the grade of an F for the class.

Chapter Opening Case

Data

Broker

Marketers

Internet

Consumer s http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/

Another Case

Questions about Cases

Is this legal?

Who is acting unethical?

Chapter 3 - Ethics

How do you define ethics?

7

3.1 Ethical Issues - Standards

Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior

Guidelines/Approaches

General Framework for Ethics

1.

Recognize an ethical issue

2.

Get the facts

3.

Evaluate alternative actions

4.

Make a decision and test it

5.

Act and reflect on the outcome of your decision

Ethics in the Corporate Environment

Code of ethics / conduct

 Microsoft

 Google

Fundamental tenets of ethics

1.

2.

3.

Unethical vs. Illegal

Is everything that is unethical also illegal?

 Enron

 World Com

 Subprime Mortgages

 Other Examples

Ethics and Information Technology

Ethical use of information and information technology

Should organizations:

• monitor employees?

• sell customer info?

• audit employee computers?

(unauthorized software or content)

Ethics and Information Technology

Do emails last forever?

This can also apply to messaging at companies.

Advice for Organization Use

1. Only use company computer for business related work

2.

Don’t send emails you wouldn’t want your parents to see

3. Limit who you give work email to

Ethics and Information Technology

Four categories of ethical issues involving

IT applications :

How much privacy do we have left?

1) We Still Have a high level of privacy

2) We are beginning to have less privacy

3) Privacy? What’s that?

Privacy

Court decisions have followed two rules:

Ex. Google and User Data http://www.technologyreview.com/view/507441/the-us-governments-growing-appetite-for-google-users-data/

Ex. Mobile Device Location

Threats to Privacy

 Data aggregators, digital dossiers, and profiling

 Electronic Surveillance

 Personal Information in Databases

 Information on Internet Bulletin Boards,

Newsgroups, and Social Networking Sites

Data Aggregators, Digital Dossiers, and Profiling

© Ilin Sergey/Age Fotostock America, Inc.

Electronic Surveillance

What are employee rights against surveillance?

© Ilin Sergey/Age Fotostock America, Inc.

Electronic Surveillance

A Face in the crowd:

Say goodbye to anonymity

Personal Information in Databases

Banks

Utility companies

Government agencies

Credit reporting agencies

© Nicolas Nadjar/Age Fotostock America, Inc.

Information on Internet Bulletin Boards,

Newsgroups, and Social Networking Sites

© Marina Bordjieva/Age Fotostock America, Inc.

Social Networking Sites Can

Cause You Problems

Anyone can post derogatory information about you anonymously .

(See this Washington Post article .)

You can also hurt yourself, as this article shows.

What Can You Do?

First, be careful what information you post on social networking sites.

Second, a company, ReputationDefender, says it can remove derogatory information from the

Web.

Protecting Privacy

Privacy Codes and Policies

 Ex . Facebook , Apple

Opt-out Model vs. Opt-in Model

Tech Guide 5

Protecting Your

Information Assets

Information Assets

What is meant when we say information assets?

Behavioral Actions

 Protect SSN#

 Secure credit cards

 Physical

 Virtual

 Debit Cards vs. Credit Cards

 Proactive Protection

Identity Theft

Dumpster Diving

Skimming

Phishing

Changing your address

Old-Fashioned Stealing

Pretexting

Federal Trade Commission http://www.ftc.gov/bcp/edu/microsites/idtheft2012/

Computer-Based Actions

 Know what sites have been visited

 Infected Computers

 Malware Infections

 Anti-Virus

( http://www.uncw.edu/ITSD/help/antivirus.html

)

 Security suite ( ZoneAlarm )

 Antispyware ( Ad-Aware )

Computer-Based Actions

 Information in SNS

 Manage Patches

 Browser and Operating Systems

Portable Devices and Information

 Data Encryption

 Password Protect

 Locating Devices

 Prey Project

 Find my iPhone

Where’s My Droid http://thisguyhasmymacbook.tumblr.com/

Download