Ethics in Information Technology, Second Edition: Ethics For IT Professionals and IT Users
Ethics in Information Technology, Second Edition: Ethics For IT Professionals and IT Users
Ethics in Information
Technology, Second Edition
Book page 34
Objectives (continued)
What are the key tenets of four different codes of ethics that provide
guidance for IT professionals?
Book page 34
IT Professionals
Book page 35
5
Are IT Workers Professionals?
Book page 35
Are IT Workers Professionals?
(continued)
Legal perspective
IT workers are not recognized as professionals
Not licensed
IT workers are not liable for malpractice
Book page 36
Professional Relationships That Must
Be Managed
IT professionals have many different relationships with:
Employers
Clients
Suppliers
Other professionals
IT users
Society at large
Book page 34
Relationships Between IT Professionals
and Employers
IT professionals must set an example and enforce
policies regarding the ethical use of IT
Software piracy is the act of illegally making copies of
software or enabling others to access software to which
they are not entitled
Software piracy is an area in which IT professionals can
be tempted to violate laws and policies
The Business Software Alliance (BSA) is a trade group
that represents the world’s largest software and
hardware manufacturers
Its mission is to stop the unauthorized copying of
9
software produced by its members
Book page 36
Relationships Between IT Professionals
and Employers (continued)
Trade secret
Information used in business
Generally unknown to the public
Company has taken strong measures to keep confidential
Whistle-blowing
Attracts attention to a negligent, illegal, unethical, abusive, or dangerous act
that threatens the public interest
10
Book page 38
11
Relationships Between IT Professionals
and Clients
IT professional provides
Hardware, software, or services at a certain cost and within a given time frame
Client provides
Compensation
Access to key contacts
Work space
Relationship is usually documented in contractual terms
12
Book page 39
Relationships Between IT Professionals
and Clients (continued)
13
Book page 39
Legal Overview:
Fraud, Misrepresentation,
and Breach of Contract
Fraud
Crime of obtaining goods, services, or property through deception or trickery
Fraud is proven in court
Breach of contract
One party fails to meet the terms of a contract
14
Book page 40
Legal Overview:
Fraud, Misrepresentation, and
Breach of Contract (continued)
IT projects are joint efforts in which vendors and customers work together
Difficult to assign blame
15
Book page 40
16
17
Relationships Between IT Professionals
and Suppliers
18
Book page 41
Relationships Between IT Professionals
and Suppliers (continued)
Bribery
At what point does a gift become a bribe?
No gift should be hidden
Perceptions of donor and recipient can differ
19
Book page 41
Distinguishing Between a Bribe and a
Gift
20
Book page 42
Relationships Between IT Professionals
and Other Professionals
21
22
Book page 43
23
Relationships Between IT Professionals
and Society
24
Book page 43
Certification
25
Book page 46
Certification (continued)
Vendor certifications
Some certifications substantially improve IT workers’ salaries and career
prospects
Relevant for narrowly defined roles
Or certain aspects of broader roles
Require passing a written exam
Workers are commonly recertified as newer technologies become available
26
Book page 47
27
Certification (continued)
28
29
30
32
Book page 50
IT Users
33
Book page 91
34
35
36
37
38
viruses
39
Common Ethical Issues for IT Users
Software piracy
Inappropriate use of computing resources
Inappropriate sharing of information
Private data
Confidential information
40
Book page 51
Supporting the Ethical Practices of IT
Users
Policies that protect against abuses:
Establish boundaries of acceptable and unacceptable behavior
Enable management to punish violators
Policy components include:
Defining and limiting the appropriate use of IT resources
Establishing guidelines for use of company software
Structuring information systems to protect data and information
Installing and maintaining a corporate firewall
41
Book page 52
Manager’s Checklist of Items to Consider when
Establishing an IT Usage Policy
42
Book page 53
Summary
43
44