Вы находитесь на странице: 1из 33

Ethics In

Information
Computer and
Technology
(ICT)
What is Ethics?
What is Ethics in ICT?
– moral principles that govern a person's behaviour or the conducting of an
activity
– also mean the moral correctness of specified conduct
– Ethics in ICT goes for the development of apparatuses that can be connected
in frameworks advancement and use for the thought of noteworthy moral
viewpoints
– Ethic are essential not exclusively to develop a framework that maintains a
strategic distance from clashes with huge good standards however mostly to
assemble a fruitful framework that will play a noteworthy job in fulfilling the
most significant estimations of clients and partners
– Technology itself not the only nor the most responsible of these
ethical issues.
– due to its capability to augment mental and physical powers of
human beings, does stand in the role of a coconspirator
– An ethical issue is said to arise whenever one party in pursuit of
its goals engages in behavior that materially affects the ability
of another party to pursue its goals.
– When the effect is helpful—good, right, just—we say the
behavior is praiseworthy or exemplary. When, however, the
effect is harmful— bad, wrong, unjust—the behavior is
unethical.
Ethics Issues in ICT
– It revolve mainly in these areas : Crime, Privacy, Individuality, Employment,
Health, Working Condition.
– computer viruses and the hacker which also known as international spy
– the problem that is faced by them is not on the physical security but in term of
logical security like privacy and confidentially and controlling access to the
resources.
– Software ownership
– Cheating and fraud in cyber business
– hospital focus more on its profit margin instead of the well being of their
patient
Business Ethics

©McGraw-Hill Education. All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw-Hill Education.
Business Ethics 1 of 5
About Ethics
• Ethics — Simply put, learning what is right or wrong, and then doing the right thing.
• The right thing is not nearly as straightforward as conveyed in a great deal of business ethics
literature.
• Most ethical dilemmas in the workplace are not simply a matter of “Should Azam steal from
Adilah?” or “Should Shuib lie to his boss?”

©McGraw-Hill Education.
Business Ethics 2 of 5
What is Business Ethics?
• Business Ethics — What is right and what is wrong in the workplace, in terms of the
impact of the product or service with its stakeholders.
• No clear moral compass that could lead a leader through the difficult dilemma about what is
right or wrong.
• Ethics at work allows managers and employees to recognize their actions.
• Compliance with work ethics helps managers and leaders maintain a moral compass during
times of crisis and confusion.

©McGraw-Hill Education.
Business Ethics 3 of 5
Managing ethics in the workplace
1. Managing ethics program in the workplace.
2. Developing codes of ethics.
3. Developing codes of conduct.
4. Resolving ethical dilemmas.
5. Making ethical decision

©McGraw-Hill Education.
Business Ethics 4 of 5
Ethics Training
• Ethics training
• An ethics program is basically useless if all employees are not
trained about what it is, how it works, and what its role is.
• All employees must be familiar and fully comply with policies and
procedures
• This applies regardless of whether policies and procedures apply to
ethics program or HR management.
• This full compliance requires training in policies and procedures

©McGraw-Hill Education.
Business Ethics 5 of 5
Ethical Principles for Business Executives

©McGraw-Hill Education.
A10113 INTRODUCTION TO ICT

GROUP 3 : LEGAL AND SECURITY ISSUES


SOFTWARE PIRACY

The act of stealing software that is legally protected. This stealing includes copying,
distributing, modifying or selling the software.

When you purchase a commercial software package, an end user license agreement ( EULA )
is included to protect that software program from copyright infringement. Typically, the
license states that you can install the original copy of software you bought on one computer
and that you can make a backup copy in case the original is lost or damaged.

Software Piracy Regulation


Computer piracy is illegal and constitutes a federal crime. The monetary penalties for those
who break this law can reach up to $150,000 per instance of copyright violation.

End-User License Agreement


The End-User License Agreement (EULA) is a license used for most software. It is a
contract between the manufacturer or author and the end user.
TYPES OF SOFTWARE PIRACY

TYPES OF SOFTWARE DESCRIPTIONS


PIRACY

Softlifting Softlifting is when someone purchases one version of the software and downloads it onto multiple
computers, even though the software license states it should only be downloaded once. This often occurs
in business or school environments and is usually done to save money. Softlifting is the most common
type of software piracy.
Client-server overuse Client-server overuse is when too many people on a network use one main copy of the program at the
same time. This often happens when businesses are on a local area network and download the software
for all employees to use. This becomes a type of software piracy if the license doesn’t entitle you to use
it multiple times.

Counterfeiting Counterfeiting occurs when software programs are illegally duplicated and sold with the appearance of
authenticity. Counterfeit software is usually sold at a discounted price in comparison to the legitimate
software.
Hard disk loading Hard disk loading is a type of commercial software piracy in which someone buys a legal version of the
software and then reproduces, copies or installs it onto computer hard disks. The person then sells the
product. This often happens at PC resale shops and buyers aren’t always aware that the additional
software they are buying is illegal.
THE DANGERS OF SOFTWARE PIRACY

Software piracy may have a cheaper price point, but there are many dangers that software pirates should be aware of.Consequences of software piracy are:

Forfeited
No warranty
access to
and the Slowed
support for
software down PC
the program Increased Increased
can’t be
chances that risk of Legal
updated
the software infecting repercussion
will your PC with s due to
malfunction malware, copyright
or fail viruses or infringement
adware

Keep your PC secure by only purchasing software from authorized dealers. Be aware of any software’s terms and conditions.
INTELLECTUAL PROPERTY

The protection of creations of the


mind, which have both a moral
and a commercial value.

IP law typically grants the


author of an intellectual creation IP confers on individuals, enterprises or
exclusive rights for exploiting other entities the right to exclude others
and benefiting from their from the use of their creations
creation

IP protection encourages the publication,


Intended to stimulate the creativity distribution and disclosure of the creation to the
of the human mind for the benefit of public, rather than keeping it secret while at the
all by ensuring that the advantages same time encouraging commercial enterprises to
derived from exploiting a creation select creative works for exploitation.
benefit the creator
TYPES OF INTELLECTUAL PROPERTY

Patents
• An exclusive right granted for an Trademarks Copyright
invention, which is a process that • A trademark is a word, • Copyright is a legal means of
provides a new way of doing phrase, symbol, or design protecting an author's work.
something, or offers a new that distinguishes the source
technical solution to a problem. of products or services of • Provides exclusive publication,
one business from its distribution, and usage rights for
• In principle, the patent owner has competitors. the author.
the exclusive right to prevent or
stop others from commercially • In order to qualify for • This means whatever content the
exploiting the patented invention. patent protection, the mark author created cannot be used or
must be distinctive. For published by anyone else without
• The invention cannot be example, the Nike "swoosh" the consent of the author.
commercially made, used, design identifies athletic
distributed, imported or sold by footware made by Nike. • Many different types of content
can be protected by copyright.
others without the patent
Examples include books, poems,
owner's consent.
plays, songs, films
REFERENCES

• https://www.pandasecurity.com/mediacenter/panda-security/software-piracy/

• https://www.esa.int/About_Us/Law_at_ESA/Intellectual_Property_Rights/What_is_intellectual_property

• https://techterms.com/definition/copyright

• http://ipo.guernseyregistry.com/article/4970/What-are-Design-Rights-
ETHICAL GUIDELINES
OR CODES
Ethical guidelines or codes

 Used by groups and organizations to define what actions are morally right and wrong.

 Used by group members as a code with which to perform their duties.


 Psychologists use ethical guidelines in order to be certain that treatment and research are being conducted in a manner which is
not harmful to participants.

 Some of these guidelines include topics like research ethics, confidentiality, torture, and euthanasia.

It is imperative that ethical issues are considered during the formulation of the evaluation plan. Ethical considerations during evaluation
include:

 Informed consent

 Voluntary participation
 Do no harm

 Confidentiality

 Anonymity

 Only assess relevant components.

INFORMED CONSENT

1. Definition : the person participating in the evaluation is fully informed about the evaluation being conducted.

2. Participants need to be made aware of the purpose of the project, who or what group is funding it, how the findings will be used,
if there are any potential adverse impacts of their participation and who will have access to the findings.

3. The main purpose : the participant is able to make an informed decision as to whether they will participate in the evaluation or
not.
4. Additional information : should also be provided in the event that the participant becomes distressed in any way during their
participation.
VOLUNTARY PARTICIPATION

Means that people participate in the evaluation free from coercion. Participants are free to withdraw their participation at any time
without negatively impacting on their involvement in future services or the current program and relationships with any of the
researchers or research bodies involved. It can be challenging to encourage high risk youth to become engaged in a program and it is
therefore difficult when participants choose not to continue in a program. It is the right of participants to leave a program of this nature
at any time, therefore no pressure should be placed on those who choose not to continue. Explanations are also not required.

DO NOT HARM

1. Harm can be both physical and/or psychological.


2. Therefore can be in the form of :

 Stress

 Pain

 Anxiety

 diminishing self-esteem
 an invasion of privacy

1. It is imperative that the evaluation process does not in any way harm (unintended or otherwise) participants.

CONFIDENTIALITY
Confidentiality means that any identifying information is not made available to, or accessed by anyone but the program
coordinator.Confidentiality also ensures such identifying information is excluded from any reports or published documents. Given that
there are often small numbers in peer based programs, it is very important to consider how reports are worded to ensure that there is no
opportunity for people to be identified even though names are not used.

ANONYMITY

Anonymity is a stricter form of privacy than confidentiality, as the identity of the participant remains unknown to the research
team.This is more difficult to achieve than confidentiality as participants in the context of social research are usually known to the
program coordinator.
ONLY ASSESS RELEVANT COMPONENTS
Only assess those components that are of relevance to the program/initiative being conducted. High risk populations are
sometimes being used as guinea pigs or a captive audience to ask all sorts of questions in evaluations that are of interest to
groups conducting the program/initiative but not relevant to the program nor will be to the group who are involved in the
program. It is important to keep evaluations as simple as possible and to remain focused on the intention of the evaluation
and what the data gathered will be used for.

Importance
 creates a culture of trust and integrity
 training to be more responsibility
 excellence in the use of resources
 promotes privacy
 confidentiality of information
 unauthorized access to computer networks
 helping to prevent conflict and dishonesty
Technology
Ethics
What is technological ethics?

A field of concentrate that tries to


comprehend and resolve good issues that
surround the improvement and
commonsense use of mechanical and
electronic technology innovation.
Principle of Technology Ethics

Proportionalit X U Informed
Consent
y
s Ĥ

ĥ l F
Ñ

Justice 5 L
Minimizes risk
The great accomplished by the technology or innovation must
Proportionality exceed the damage or risk, there must be no alternative that
accomplishes the equivalent or comparable advantages with less
harm or risk.

Those influenced by the technology ought to comprehend and


Informed Consent acknowledge the risk that they have to face in the future.

The advantages and burdens of the technology should be distributed


Justice fairly. The individuals who have benefit should bear their fair of the
dangers and the individuals who do not profit benefit not endure a
huge increase in risk.

Regardless of whether made a decision about satisfactory by the


Minimizes Risk other three guidelines, the technology must be implemented in
order to avoid from all unnecessary risk.
THANKS

Вам также может понравиться