Академический Документы
Профессиональный Документы
Культура Документы
According to Laudon & Laudon, ethics refers to the principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior.
What is privacy?
The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations.
The set of principles governing the collection and use of information about individuals is known as FIP
Structured decisions are repetitive and routine with standard procedures for solutions.
Ex: facility layout, plant scheduling
Characteristics are:
Ability to adapt Assurance that all parts work together Members are satisfied and functioning well Highly fragmented activities, rapid change, no sweeping policy decisions
FIP
The five principles are:
There should be no personal record systems whose existence is secret. Individuals have rights of access, inspection, review and amendment to systems that contain information about them. There must be no use of personal information for purposes other than those for which it was gathered without prior consent Managers of systems are responsible and can be held accountable and liable for the damage done by systems, for their reliability and security Governments have the right to intervene in the information relationships among private parties.
FIP Principles
Fair Information practices (FIP) principles include: individuals have rights of access, inspection, review, and amendment to systems that contain information about them
Security Issues
Some perceive that hacking has to do with the belief that all info should be free. Most FBI computer crimes were committed by hackers gaining access to internal networks through the Internet. Once a local area network is hooked up to the Net, sensitive data in the system potentially becomes accessible to every computer on the Net.
Hackers vengeance
Garbage dump. Angered by a piece a Newsday journalist had written about hackers, the articles subjects hacked their way into the root directories of IBM., Sprint, and a small Internet provider called Pipeline to fire thousands of abusive junk email items to his personal address, effectively preventing him from accessing the Internet.