Вы находитесь на странице: 1из 10

PROFESSIONAL ETHICS IN IT

WEEK 3 & 4
Ms. Claire C. Raterta
Chapter III (Ethics in IT)
Definition of IT
Computer Ethics
Ethical problems related to computers
Computer Crime
Types of Computer Crime
Reason for Computer Crime
Relevance and Importance of Ethics in IT
Definition of IT

• IT – Information Technology
(Merriam-Webster Dictionary)
The technology involving the development, maintenance, and use of computer
systems, software, and networks for the processing and distribution of data.
Computer Ethics

• Can be defined as the application of classical ethical principles to the use of


computer technology.
• Privacy
Ethical problems related to computers
• Computers create a false sense of security
• People do not realize how vulnerable information stored on computers are
• Property
• Physical property
• Intellectual property
• Data as property

• Access
• Access computing technology
• Access to data
• Accuracy
• Accuracy of information stored
• Hacking, cracking and virus creation
• Software piracy
Computer Crime

• IT Infrastructure
• Illegal access
• Illegal Interruption
• Data Interfere
• System Interference
• Misuse of Device
• Electronic Fraud
Types of Computer Crimes

• Target of the Crime


• Medium of the Attack
• Tool
• Intimidate or Deceive

Types of Computer Criminal


• Outsiders
• Insiders
Reason for Computer Crimes

• Economic
• Ideological
• Psychological
• Egocentric
Relevance and Importance of Ethics in IT

The growth of the Internet, the ability to capture and store vast amounts of
personal data, and greater reliance on information systems in all aspects of life
have increase the risk that information technology will be used unethically. In the
midst of the many IT breakthroughs in recent years, the importance of ethics and
human values has been underemphasized- with a range of consequences. Here
are some examples that raise public concern about the ethical use of information
technology;
• Many employees have their email and internet access monitored while at work, as employers
struggle to balance their need to manage important company assets and work time with
employees’ desire for privacy and self direction.
• Millions of people have downloaded music and movies at no charge and in apparent violation of
copyright laws at tremendous expense to the owners to the owners of those copyrights.
• Organizations contact millions of people worldwide through unsolicited email (spam) as an
extremely low cost marketing approach.
• Hackers break into databases of financial and retail institutions to steal costumer information, then
use it to commit identity theft- opening new accounts and charging purchases to unsuspecting
victims.
• Students around the world have been caught downloading materials from the web and plagiarizing
content for their term papers.
• Websites plant cookies or spyware on visitors’ hard drives to track their online purchases and
activities.

Вам также может понравиться