0% found this document useful (0 votes)
14 views116 pages

Module 5

The document discusses the ethical challenges and responsibilities in information technology, highlighting issues such as privacy, security, and the impact of AI. It emphasizes the importance of ethical practices in technology to protect user data, build trust, and prevent misuse. Additionally, it outlines the need for a culture of responsibility and compliance with legal standards to ensure fair and equitable access to technology.

Uploaded by

hithushwetha555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views116 pages

Module 5

The document discusses the ethical challenges and responsibilities in information technology, highlighting issues such as privacy, security, and the impact of AI. It emphasizes the importance of ethical practices in technology to protect user data, build trust, and prevent misuse. Additionally, it outlines the need for a culture of responsibility and compliance with legal standards to ensure fair and equitable access to technology.

Uploaded by

hithushwetha555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 116

ETHICS IN IT

ETHICS IN IT
• Security and Ethical challenges of IT
• Ethical Responsibility
• Business Ethics
• Technology Ethics;
• Environmental Impact Analysis,
• Cyber Crime and Privacy Issues – Hacking, Cyber theft, Unauthorized use at
work, Software and Intellectual Property,
• Issues on Internet privacy Ethical issues pertaining to Technology: IT
influence on the changing business environment, Health and
• Social Issues - Ergonomics and Cyber terrorism –
• Cases Pertaining to Business Ethic, Tech Adoption, Cyber Security –
ETHICS IN IT OR IT ETHICS
Information technology ethics is the study of the ethical issues arising out of the use

and development of electronic technologies.

IT Ethics refers to the principles and moral values that guide the behavior and decisions

made by individuals and organizations in the field of technology. As IT plays an

increasingly significant role in business, society, and daily life, ethical considerations

help ensure that technology is used responsibly and beneficially.


IMPORTANCE OF IT ETHICS
•Protects Privacy: Ensures user data is kept safe and used responsibly.

•Builds Trust: Helps users trust technology and the companies behind it.

•Prevents Misuse: Stops harmful actions like hacking and cybercrime.

•Promotes Fairness: Ensures equal access to technology for all.

•Ensures Legal Compliance: Keeps technology use within legal boundaries.

•Reduces Harm: Prevents negative impacts from unethical tech use.

•Encourages Responsible AI: Ensures AI is fair and unbiased.

•Fosters Ethical Innovation: Encourages creating new tech that benefits society responsibly.
ETHICAL ISSUES OF IT
•Privacy: Misuse of personal data without consent.

•Security: Failing to protect systems from cyberattacks.

•Intellectual Property: Using or copying software without permission.

•Digital Divide: Unequal access to technology.

•Cyberbullying: Harmful behavior and harassment online.

•AI Bias: Algorithms making unfair or biased decisions.

•Hacking: Unauthorized access to systems or data.

•Surveillance: Excessive monitoring of individuals without transparency.


FEW MORE ETHICAL ISSUES OF IT

Misuse of Personal Information


Misinformation and Deep Fakes
https://www.youtube.com/watch?v=WzK1MBEpkJ0
https://www.youtube.com/watch?v=AmUC4m6w1wo

Lack of Oversight and Acceptance of Responsibility


Uses of AI : https://www.youtube.com/watch?v=1LyacmzB1Og
Autonomous Technology :
https://www.youtube.com/shorts/Z05_BbsbC5s?feature=share
ETHICAL ISSUES OF IT
• The Distinction Between what is legal and What is illegal is usually Clear
• But drawing a line between ethical and unethical can be more difficult
Lets take a look at Some Ethical Issues of IT

1. Misuse of Personal Information


2. Misinformation and Deep Fakes
3. Lack of Oversight and Acceptance of Responsibility
4. Uses of AI
5. Autonomous Technology
Misuse of Personal Information :
As we browse internet sites, make online purchases, enter our information on
websites, engage with different businesses online and participate in social media, we
are constantly providing personal details.

Companies often gather information to hyper-personalize our online experiences, but


to what extent is that information actually impeding our right to privacy?

Personal information is the new gold, as the saying goes. We have commoditized data
because of the value it provides to businesses attempting to reach their consumer
base. But when does it go too far?

For businesses, it’s extremely valuable to know what kind of products are being
searched for and what type of content people are consuming the most.
For political figures, it’s important to know what kind of social or legal issues are
MISINFORMATION AND DEEP FAKES

• Celebrities and political figures can disseminate opinions on social media without fact checking, which is then aggregated and further spread
despite its accuracy—or inaccuracy. Information no longer undergoes the strenuous validation process that we formerly used to publish
newspapers and books.
Similarly, we used to believe that video told a story that was undeniably rooted in truth. But deepfake technology now allows such a
sophisticated manipulation of digital imagery that people appear to be saying and doing things that never happened. The potential for
privacy invasion and misuse of identity is very high with the use of this technology.

https://www.youtube.com/watch?v=DfNZPDwIaPY

https://www.youtube.com/watch?v=AmUC4m6w1wo
Lack of Oversight and Acceptance of Responsibility

• Most companies operate with a hybrid stack, comprised of a


blend of third-party and owned technology. As a result, there is
often some confusion about where responsibility lies when it
comes to governance, use of big data, cybersecurity concerns
and managing personally identifiable information or PII. Whose
responsibility is it really to ensure data is protected?
• If you engage a third party for software that processes
payments, do you bear any responsibility if credit card details
are breached? The fact is that it’s everyone’s job. Businesses
need to adopt a perspective where all collective parties share
responsibility.
• Similarly, many experts lobby for a global approach to
governance, arguing that local policing is resulting in fractured
policy making and a widespread mismanagement of data. Similar
to climate change, we need to band together if we truly want to
see improvement.
• Imagine you're running a restaurant, and you decide to partner with a food delivery service to reach
more customers. You also use a computer system to store customer orders and payment information.
Here's how this relates to the issues mentioned:
1. Hybrid Stack:
1. In your restaurant, you have a mix of technologies: your own kitchen equipment (owned
technology) and the delivery service's app (third-party technology).
2. You use your computer system to manage customer orders and payments, which contains
important data.
2. Confusion about Responsibility:
1. You might wonder, "Whose job is it to make sure that customer data is safe?"
2. Is it solely the responsibility of the delivery service because their app handles orders and
payments, or do you also have a role to play since you use that technology?
3. Data Protection Responsibility:
1. The fact is, it's everyone's job to ensure data protection. Both you and the delivery service have a
part to play.
2. You should ensure that your computer system is secure and that you handle customer data
responsibly.
3. The delivery service must also take measures to protect customer information.
1. Global Approach vs. Local Policing:
1. Now, consider that different cities or countries may have different rules about data protection
and food safety.
2. Some experts argue that relying solely on local rules can lead to confusion and make it harder
to ensure consistent standards.
3. It's similar to how global cooperation is needed to address climate change because
environmental issues don't stop at national borders.
• In the business world, companies often use a mix of their own and third-party technologies, just like
you use your kitchen and the delivery app.
• Responsibility for protecting data and following rules is shared between all parties involved, just as
both you and the delivery service have a role in ensuring data security.
• To avoid confusion and ensure better data protection, there's a push for global standards and
cooperation, similar to international efforts to combat climate change.
• In essence, it's like running a successful restaurant – everyone, including partners, has a role in
making sure everything runs smoothly and safely.
• Use of AI
• Artificial intelligence certainly offers great
business potential. But, at what point do AI
systems cross an ethical line into dangerous
territory?

• Facial recognition
• Replacement of Jobs
• Heath Tracking
• Bias in AI Technology
Facial Recognition:

• Example: Consider a scenario where a retail store uses facial recognition to identify and track customers. While this may
improve customer service, it could also be misused to build profiles of shoppers without their knowledge, potentially
violating their privacy.

Replacement of Jobs:

• Example: Imagine a manufacturing company that replaces human workers with AI-driven robots to cut labor costs. While this
may boost profits, it may also result in job losses and harm to the livelihoods of employees.

Health Tracking:

• Example: A health tech startup develops an AI-based app that tracks users' health data and shares it with insurance
companies without explicit user consent. This could lead to unfair premium rates and violate users' trust.

Bias in AI Technology:

• Example: Let's say a lending institution uses an AI algorithm to assess loan applications but unintentionally, the algorithm
favors applicants from certain racial or gender groups due to biased training data. This would lead to systemic discrimination
in lending practices.
Facial recognition: Use of software to find individuals can quickly become a less-than-ethical problem. According to the NY Times, there
are various concerns about facial recognition, such as misuse, racial bias and restriction of personal freedoms. The ability to track
movements and activity quickly morphs into a lack of privacy. Facial recognition also isn’t foolproof and can create bias in certain
situations.

Replacement of jobs: While this is anticipated to a certain degree, AI is meant to increase automation of low-level tasks in many situations
so that human resources can be used on more strategic initiatives and complicated job duties. The large-scale elimination of jobs has many
workers concerned about job security, but AI is more likely to lead to job creation.

Health tracking: The pandemic brought contact tracing into the mainstream. Is it ethical to track the health status of people and how will
that impact the limitations we place on them?

Bias in AI technology: Technology is built by programmers and inherits the bias of its creators because humans inherently have bias.
“Technology is inherently flawed. Does it even matter who developed the algorithms? AI systems learn to make decisions based on
training and coding data, which can be tainted by human bias or reflect historical or social inequities,” according to Forbes. Leading AI
developer Google has even experienced an issue where AI software believes male nurses and female historians do not exist.
AUTONOMOUS TECHNOLOGY

• Self-driving cars, robotic weapons and drones for service are no longer a thing
of the future—they’re a thing of the present and they come with ethical
dilemmas. Robotic machines in place of human soldiers is a very real
possibility, along with self-driving cars and package delivery via unmanned
drone.

• Autonomous technology packs a punch when it comes to business potential,


but there is significant concern that comes with allowing programmed
technology to operate seemingly without needed oversight. It’s a frequently
mentioned ethical concern that we trust our technology too much without fully
understanding it.
Imagine a large manufacturing company that decides to implement automation technology in its
production facilities to increase efficiency and reduce costs. They invest in state-of-the-art robots and AI
systems to replace a significant portion of their workforce.

Ethical Issues with Automation Technology:

1.Job Displacement: Example: The company's decision to automate leads to the layoffs of hundreds of
workers, many of whom have been with the company for years. These employees face financial stress,
uncertainty, and potential difficulties finding new employment.

2.Fair Severance and Transition Support Example: The company, in its rush to automate, offers minimal
severance packages and does not provide resources for retraining or helping employees find new
opportunities. This approach can be seen as unethical and detrimental to the affected workers.
Transparency and Communication

Example: The company did not communicate its automation plans to employees until the last moment,
leaving them feeling betrayed and unprepared for the changes ahead. This lack of transparency damages the
company's reputation and ethical standing.

Social Responsibility

Example: The company's decision to automate has a domino effect on the local community, causing a decline
in local businesses that relied on the disposable income of former employees. This raises ethical questions
about the company's social responsibility.
Ethical Practices in Technology
• Respect for employees and Customers
• Moral Use of Data and Resources
• Responsible adoption of Disruptive Tech
• Create a culture of Responsibility
• RESPECT FOR EMPLOYEES AND CUSTOMERS
Businesses that engage in ethical technology have a firm moral sense of
employee rights and customer protections. Data is valuable, but the employees
and customers who power your business are undoubtedly your greatest asset.
Take care to always observe responsible protections for employees and
customers to practice ethical technology.

• MORAL USE OF DATA AND RESOURCES


Data is undoubtedly something of value for businesses. It allows companies to
target their marketing strategies and refine product offerings, but it can also be
an invasive use of privacy bringing many ethical considerations to the forefront.
Data protection measures and compliance procedures can help ensure that data
isn’t leaked or used inappropriately.
• RESPONSIBLE ADOPTION OF DISRUPTIVE TECH
Digital growth is a business reality. Disruptive tech often isn’t just a way to
outpace the competition—it’s the only way to break even. But embracing new
technologies doesn’t have to coincide with an ethical challenge. Do your due
diligence to ensure that the technology you adopt has protections in place and
you’ll be well on your way to practicing ethical tech.

• CREATE A CULTURE OF RESPONSIBILITY


Ultimately, we need to create a culture of responsibility within technology. If
the information technology workforce and industry giants believe they are
responsible for the safe and ethical usage of technology, then we will see more
governance and fair use of data.
ETHICAL RESPONSIBILITIES
• Ethical responsibility is the ability to recognize, interpret and act upon multiple principles
and values according to the standards within a given field and/or context.

• Examples:

• Obeying the company's rules


• Effective communication
• Taking responsibility
• Accountability
• Professionalism
• Trust and mutual respect for your colleagues at work.
BUSINESS ETHICS
Business Ethics:
• Business ethics are the moral principles and values that guide the behavior and
decisions of individuals and organizations in the business world. These principles help
ensure that businesses operate in a responsible, fair, and honest manner, taking into
account the interests of all stakeholders.
• Examples of Business Ethics:
1.Honesty and Integrity:
1. Example: A company accurately reports its financial performance to investors and doesn't
manipulate numbers to inflate profits.
2.Fair Treatment:
1. Example: Treating employees equally and without discrimination based on factors like gender,
race, or religion.
3.Transparency:
1. Example: A business discloses all relevant information to customers about the quality and safety of
its products.
4.Respect for Customer Privacy:
1. Example: Safeguarding customer data and not selling it to third parties without explicit consent.
5.Environmental Responsibility:
1. Example: A manufacturing company invests in eco-friendly technologies to reduce pollution and
minimize its carbon footprint.
Social Responsibility:
1.Example: A tech company donates a portion of its profits to support
local schools and community programs.
Ethical Marketing:
2.Example: Avoiding deceptive advertising practices and providing
accurate information about products.
Compliance with Laws and Regulations:
3.Example: A pharmaceutical company strictly follows FDA regulations
when testing and marketing its drugs.
Whistleblower Protection:
4.Example: Encouraging employees to report unethical behavior without
fear of retaliation.
Conflict of Interest:
5.Example: A company's board member abstains from voting on a
contract involving their own business to avoid a conflict of interest.
Technological Ethics
•Privacy Protection: Safeguarding personal information and ensuring that data is
collected and used responsibly, without violating people's privacy.

•Security: Creating and using technology that is secure and protects users from
hacking, theft, and other forms of digital harm.

•Fair Access: Ensuring that technology is accessible to everyone, regardless of


their background or location, and reducing the digital divide.

•Transparency in Algorithms: Ensuring that AI and algorithms used in technology


are transparent, fair, and free from hidden biases that could harm individuals or
groups.

•Intellectual Property: Respecting the rights of creators and developers by


protecting patents, copyrights, and other forms of intellectual property in the tech
•Environmental Impact: Considering the environmental footprint of technology,
including how devices are made, used, and disposed of, to minimize harm to
the planet.

•Misuse Prevention: Preventing technology from being used for harmful


purposes, such as cybercrime, surveillance without consent, or spreading
misinformation.

•Digital Well-being: Encouraging responsible use of technology to avoid


negative effects on mental health, such as addiction or social isolation.

•Accountability: Holding tech companies and developers accountable for their


products and services, ensuring they address issues like security breaches and
faulty systems.

•Ethical AI Development: Designing AI systems that are fair, unbiased, and


ethical, ensuring they do not perpetuate discrimination or harm society.
Environmental Impact Analysis
• Environmental Impact Analysis (EIA) is a process used to evaluate the potential environmental effects of a
proposed project or development before it begins.

• Project Proposal Review: The first step is understanding the project (like building a factory, road, or dam)
and its goals.

• Baseline Study: Collecting data on the current environmental conditions, such as air quality, water
resources, wildlife, and local communities, before the project starts.

• Impact Identification: Identifying potential environmental impacts the project might have, like pollution,
habitat destruction, or resource depletion.

• Impact Prediction: Predicting how severe these impacts might be and whether they are short-term (during
construction) or long-term (permanent changes).
• Alternatives Consideration: Exploring other options for the project that might reduce its environmental
impact, like using alternative sites, materials, or methods.

• Mitigation Measures: Suggesting ways to avoid, minimize, or offset negative impacts. For example, if a
forest is cleared, planting trees elsewhere or reducing the size of the project might be considered.

• Public Consultation: Engaging local communities and stakeholders to get their input and address concerns
about how the project might affect them.

• Environmental Management Plan (EMP): Creating a plan to manage, monitor, and mitigate the
environmental impacts during and after the project, ensuring that damage is minimized.

• Decision-Making: Based on the EIA report, authorities decide whether the project should go ahead, be
modified, or be stopped.

• Monitoring and Evaluation: Once the project is approved, regular monitoring ensures that environmental
standards are maintained and mitigation measures are effectively implemented.
Cyber Crime and Privacy Issues – Hacking
• Cybercrime is when people use computers or the internet to do illegal or
harmful things. Hacking is one type of cybercrime where someone breaks
into a computer, network, or system without permission.
HOW HACKING AND OTHER PRIVACY ISSUES AFFECT PEOPLE
AND THEIR DATA???

• Hacking: Hackers use their skills to break into computers or networks to steal, change, or delete important
information. This could include anything from breaking into a business system to accessing someone's
personal email or bank accounts.

• Identity Theft: Hackers often steal personal information like names, social security numbers, and bank
details to impersonate others and commit fraud.

• Data Theft: By hacking into databases, hackers can steal large amounts of data, such as customer
information, passwords, and financial records, which can be sold or misuse
• Phishing: Hackers often use "phishing" emails that trick people into giving away personal information by pretending to
be a trustworthy person or company.

• Ransomware: A type of hacking where hackers lock a user’s files and demand money to release them. It’s like holding
data “hostage” for a ransom.

• Spyware: Sometimes hackers install software that secretly records information (like passwords or credit card details)
from a user’s device without their knowledge.

• Financial Loss: Hacking can lead to financial losses, as hackers may access bank accounts, credit cards, or demand
payments to stop an attack.

• Privacy Breach: When hackers break into systems, they can see private data about individuals, like their conversations,
health records, or browsing history, violating their privacy.

• Social Media Hacking: Hackers can also break into social media accounts, leading to the misuse of personal information,
impersonation, or even cyberbullying.

• Cybersecurity Awareness: To protect against hacking, individuals and organizations use cybersecurity practices like
strong passwords, firewalls, antivirus software, and staying alert to potential threats.
Cyber theft, Unauthorised use at work
• Cyber Theft and Unauthorized Use at Work are two major issues that involve
the misuse of technology and digital resources. Here’s a simple explanation of
each:
• Data Theft
• Financial Theft
• Intellectual Property Theft
• Identity Theft
• Phishing
• Ransomware Attacks
• Unauthorized use at work is when employees misuse workplace resources, such as
computers, software, or information, for personal activities or unapproved
purposes.
• Using Work Devices for Personal Tasks: This includes shopping online, checking
personal social media, or browsing unrelated sites on company devices.
• Installing Unapproved Software: Employees might install apps or software on work
computers without permission, which could bring security risks or licensing issues.
• Accessing Confidential Information: Some employees access sensitive information
they don’t need for their job, which could lead to data leaks or misuse.
• Downloading or Sharing Sensitive Data: Employees might download or share
confidential information outside the workplace, putting the company at risk.
• Using Company Time for Personal Projects: Spending work hours on personal
projects or side businesses can reduce productivity and waste company resources.
• Bypassing Security Controls: Sometimes employees disable security settings, which
makes the system more vulnerable to cyber attacks.
How to Prevent These Issues
• Clear Policies: Outlining what is and isn’t allowed on work devices and
enforcing rules.
• Cybersecurity Training: Educating employees about phishing, safe browsing,
and data protection.
• Access Controls: Limiting access to sensitive data based on employees' roles
and responsibilities.
• Regular Audits and Monitoring: Checking usage patterns to detect unusual
behavior.
• Strong Passwords and Multi-Factor Authentication: Ensuring data is protected
by secure access measures.
Software and Intellectual
Property
• What is Intellectual Property (IP)?
• Intellectual Property refers to creations of the mind—things like inventions,
designs, music, books, and software. These creations are valuable, so laws
exist to protect the rights of the people who create them. The main forms of
IP protection include:
• Copyright: Protects original works like software code, books, music, and
movies.
• Patents: Protect inventions and new technology that offers a new solution to
a problem.
• Trademarks: Protect brand names, logos, or symbols that identify products
or services.
• Trade Secrets: Protects confidential business information that gives a
company an edge over competitors.
• Software as Intellectual Property
• Software is considered intellectual property, and there are several ways it
can be protected:
• Copyright for Software: Software is automatically protected under
copyright law once it’s written. This means that only the creator or owner
has the right to use, modify, or distribute the software. Others must get
permission before doing so.
• Software Patents: In some cases, if software involves a unique process or
innovation, it can be patented. This prevents others from copying the
technology or method for a set period.
• Licensing: Software companies often grant users licenses to use their
software. The license outlines the conditions under which the software
can be used. It doesn’t transfer ownership of the software, but gives the
user rights to use it in a specific way.
• Types of Software Licenses
• Proprietary Software: This software is owned by a company or individual
and requires a paid license to use. Users cannot modify or distribute it.
Examples include Microsoft Office and Adobe Photoshop.
• Open-Source Software: This type of software is freely available for anyone
to use, modify, and distribute. However, even open-source software is
protected by licenses that set conditions on its use. Examples include Linux
and Mozilla Firefox.
• Piracy and Copyright Infringement
Piracy is when someone copies, distributes, or uses software without
permission from the owner. This is a violation of intellectual property rights
and is illegal.

Software Piracy: This includes downloading cracked versions of software,


sharing it without a license, or using unauthorized copies in a business.

Copyright Infringement: Using software in a way that goes against the license
agreement, like installing it on more computers than allowed, is also a
violation.
Trade Secrets in Software Development

Companies developing software often keep their source code or


algorithms secret to maintain a competitive edge. These are called
trade secrets. If someone steals or reveals the code without
permission, it’s a serious violation of intellectual property laws.
• Importance of Protecting Software IP

• Encourages Innovation: Protecting software through IP laws ensures


that developers and companies can benefit financially from their hard
work.
• Prevents Unauthorized Use: IP protection ensures that others can’t
profit from someone else’s software without permission.
• Maintains Quality: Protecting software helps maintain the quality of
the software and prevents poorly modified versions from being
spread under the original creator’s name.
• Challenges with Software IP

• Global Enforcement: Because software is easily shared online,


enforcing intellectual property laws globally is difficult.
• Evolving Technology: As technology changes, laws need to adapt to
new types of software and innovation, which can sometimes lag
behind.
• Fair Use and Software
• Fair use allows limited use of copyrighted material without
permission, like using software for educational purposes, research, or
criticism. However, the scope of fair use is limited and doesn’t cover
commercial exploitation.
• Ethical Use of Software
• It's important to respect the intellectual property rights of software
creators by:
• Using licensed software.
• Avoiding software piracy.
• Not copying or distributing software without permission.
ETHICS IN IT
Security and Ethical challenges of IT:

Ethical Responsibility

Business Ethics

Technology Ethics

Environmental Impact Analysis

Cyber Crime and Privacy Issues – Hacking,

Cyber theft, Unauthorised use at work,

Software and Intellectual Property, Issues on Internet privacy

Ethical issues pertaining to Technology: Cloud and Mobile computing,

Internet of Things,

M-Commerce,

IT influence on the changing business environment,

Health and Social Issues - Ergonomics and Cyber terrorism


Types of Business Ethics
• Discuss the importance of business ethics in today's
corporate world. Provide examples of how ethical
business practices can impact a company's reputation
and success.
• Corporate responsibility in business ethics refers to a company's commitment to behaving ethically and responsibly toward various
stakeholders, including customers, employees, the environment, and the broader community. Here's an example of corporate responsibility in
action:

• Company: Patagonia

• Initiative: The Common Threads Initiative

• Description: Patagonia, an outdoor clothing and gear company, is widely recognized for its commitment to corporate responsibility and
sustainability. One of their most notable initiatives is the Common Threads Initiative, which exemplifies their dedication to environmental and
social responsibility.

• Key Actions:

1. Worn Wear Program: Patagonia actively encourages customers to buy used clothing and gear through their Worn Wear program. They
provide a platform for customers to buy, sell, and trade used Patagonia products. This initiative promotes the idea of "reduce, repair, reuse,
and recycle" and reduces the overall environmental impact of their products.

2. Fair Trade Certification: Patagonia is a pioneer in Fair Trade certification for apparel. They pay a premium for every Fair Trade Certified product
sold, and this money goes directly into a worker-managed fund for community development projects. This ensures fair wages and better
working conditions for factory workers.
Environmental Commitment: Patagonia is known for its strong environmental stewardship. They invest a significant
portion of their profits into environmental causes, such as protecting public lands, fighting climate change, and
advocating for responsible consumption.

Transparency: The company is transparent about its supply chain and manufacturing processes, even going as far as
encouraging customers to trace the origins of the materials used in their products through the Footprint Chronicles on
their website.

Activism: Patagonia doesn't shy away from using its platform for environmental and social advocacy. They have run
impactful ad campaigns and have taken legal action to protect public lands and combat climate change.

• Patagonia's Common Threads Initiative and its broader commitment to corporate responsibility have had a
significant positive impact. They have reduced their environmental footprint, supported fair labor practices, and
inspired other companies to adopt more sustainable and responsible business practices. Their brand has become
synonymous with ethical and environmentally responsible consumption.

• This example illustrates how a company can integrate corporate responsibility into its business ethics by taking
concrete actions to address social and environmental issues while remaining profitable and successful.
• Economic responsibility in business ethics relates to a company's obligation to operate profitably, efficiently, and within the
boundaries of the law while also considering the interests of its stakeholders. Here's an example:

• Company: Toyota

• Initiative: Lean Manufacturing and Cost Reduction

• Description: Toyota is renowned for its commitment to economic responsibility while maintaining high ethical standards in its
operations.

• Key Actions:

Lean Manufacturing: Toyota pioneered the concept of lean manufacturing, which focuses on minimizing waste, improving efficiency,
and reducing costs in production processes. This approach not only benefits the company economically but also helps conserve
resources and reduce environmental impact.

Continuous Improvement: Toyota places a strong emphasis on continuous improvement and innovation in its products and
processes. They invest in research and development to enhance product quality and safety while reducing production costs.

Cost Reduction without Compromising Quality: Toyota strives to reduce costs without compromising the quality of its products. This
commitment to delivering value for customers allows them to maintain profitability while providing reliable and affordable vehicles.
Supplier Relationships: Toyota maintains long-term relationships with its suppliers, helping
them improve their own processes and reduce costs. This collaborative approach benefits
both Toyota and its suppliers.

Community Investment: While maintaining economic responsibility, Toyota also invests in


the communities where it operates. Example : supporting education, environmental
initiatives, and disaster relief efforts.

• Impact: Toyota's dedication to economic responsibility has enabled it to achieve


sustainable profitability and long-term success as an automaker. Their focus on cost
reduction, efficiency, and quality has resulted in competitive products that consumers
trust. Additionally, their community investments contribute positively to the well-being of
the areas in which they operate.

• This example illustrates how a company can uphold economic responsibility by focusing on
profitability, efficiency, and cost reduction while also considering the broader impact on
stakeholders, including employees, suppliers, and the communities in which they operate
• "Technical morality" in business ethics refers to the ethical considerations and responsibilities associated with the development,
deployment, and use of advanced technologies. Here's an example:

• Company: google (alphabet inc.)

• Initiative: ethical ai principles

• Description: google, a technology company, recognizes the importance of addressing ethical concerns in the development and use of
artificial intelligence (ai), an area with significant implications for society.

• Key actions:

1. Ai principles: google has established a set of ai principles that guide its work in this field. These principles include a commitment to
developing ai that is safe and beneficial, avoids harm, is fair and accountable, and respects privacy and user data.

2. Project maven withdrawal: in response to employee and public concerns, google decided not to renew its contract with the u.S.
Department of defense for project maven, an ai project that involved the use of machine learning in military applications. Google's
decision reflected its commitment to avoiding the development of ai technology for potentially harmful purposes.
1. Responsible AI Research: Google invests in research and development aimed at ensuring that AI technologies are used in
ways that align with ethical values. They actively publish research papers addressing AI ethics, fairness, and accountability.

2. AI for Social Good: Google also promotes the use of AI for social good. They provide funding and resources to projects
that leverage AI to address global challenges, such as healthcare, conservation, and disaster response.

• Impact: Google's approach to technical morality in AI demonstrates the company's commitment to responsible AI
development. By setting ethical principles and making decisions that prioritize societal well-being over short-term profits,
they contribute to the responsible advancement of AI technology. This approach has influenced other tech companies to
consider the ethical implications of their AI research and applications.

• This example showcases how a technology company like Google can proactively address technical morality in business
ethics by establishing guiding principles and making ethical decisions concerning the development and use of advanced
technologies like artificial intelligence.
• Legal responsibility in business ethics pertains to a company's obligation to comply with all relevant laws and regulations governing its
operations. Here's an example:

• Company: XYZ Pharmaceuticals

• Scenario: XYZ Pharmaceuticals is a global pharmaceutical company that develops and manufactures various medications. They take legal
responsibility seriously, and here's how they demonstrate it:

1. Regulatory Compliance: XYZ Pharmaceuticals ensures that all its products and manufacturing processes comply with the regulations set
forth by government agencies such as the U.S. Food and Drug Administration (FDA) and the European Medicines Agency (EMA). They
undergo rigorous testing and quality control processes to ensure that their medications meet safety and efficacy standards.

2. Patent Protection: The company respects intellectual property laws and secures patents for their innovative drugs. They defend their
patents against infringement to protect their intellectual property rights.

3. Ethical Clinical Trials: When conducting clinical trials for new drugs, XYZ Pharmaceuticals follows strict ethical guidelines and informed
consent procedures. They adhere to laws and international standards, such as the Declaration of Helsinki, to ensure the rights and safety
of trial participants.
Data Privacy: XYZ Pharmaceuticals is compliant with data privacy laws, such as the General Data Protection Regulation (GDPR) in
Europe. They protect the personal data of patients, employees, and customers and have stringent cybersecurity measures in place.

Environmental Regulations: In their manufacturing and disposal processes, XYZ Pharmaceuticals adheres to environmental
regulations to minimize their environmental impact. They properly dispose of hazardous waste and work toward sustainable and eco-
friendly practices.

Anti-corruption Measures: The company has a strict anti-corruption policy in place and complies with international laws, such as the
U.S. Foreign Corrupt Practices Act (FCPA), to ensure transparency and integrity in their business dealings.

• Impact: XYZ Pharmaceuticals' commitment to legal responsibility ensures that they operate within the boundaries of the law,
which is essential for maintaining public trust, avoiding legal penalties, and protecting the health and safety of consumers. Their
adherence to ethical and legal standards also contributes to their reputation as a responsible and reliable pharmaceutical
company.

• In this example, legal responsibility is demonstrated by XYZ Pharmaceuticals through their strict adherence to pharmaceutical
regulations, patent protection, ethical clinical trials, data privacy practices, environmental compliance, and anti-corruption
measures, all of which are critical aspects of ethical business conduct in the pharmaceutical industry.
• Personal responsibilities in business ethics refer to the individual obligations and ethical standards that employees and
business professionals should uphold in their roles within an organization. Here's an example:

• Scenario: John works as a project manager for a software development company called TechSolutions. He exemplifies
personal responsibilities in business ethics in the following ways:

1. Honesty and Integrity: John is known for his honesty and integrity. He always provides accurate information to his team
members, superiors, and clients. He never engages in deceptive practices or misrepresentation.

2. Conflict of Interest: John is vigilant about identifying and disclosing any potential conflicts of interest. If he finds himself
in a situation where his personal interests might conflict with the interests of the company or its clients, he promptly
informs his supervisor and takes appropriate steps to mitigate the conflict.

3. Confidentiality: John handles sensitive company and client information with the utmost confidentiality. He does not
share proprietary data or confidential client information with unauthorized individuals, and he follows company policies
and legal requirements related to data protection.

4. Respect and Inclusivity: John treats all team members, clients, and stakeholders with respect and professionalism. He
promotes an inclusive work environment, welcoming diversity and ensuring that everyone's voices are heard and valued.
Professional Development: John takes personal responsibility for his professional development. He actively seeks
opportunities to enhance his skills, stay updated with industry trends, and contribute to his team's success.

Environmental Consciousness: If TechSolutions has sustainability initiatives, John participates actively and
supports environmentally responsible practices within the company, such as reducing waste and conserving
resources.

Compliance: John ensures that his actions and decisions comply with all applicable laws, regulations, and company
policies. He actively seeks clarification or guidance from the legal or compliance department if he encounters any
legal or ethical gray areas.

• Impact: John's personal responsibilities in business ethics contribute to a positive work environment, foster trust
among colleagues and clients, and enhance the reputation of TechSolutions as an ethical and responsible
company. His commitment to ethical conduct not only benefits the organization but also aligns with his personal
values and contributes to his professional growth and success.

• In this example, personal responsibilities in business ethics are demonstrated by an employee, John, who upholds
ethical standards in his interactions, decision-making, and personal development within the organization.
• Official responsibilities in business ethics refer to the obligations and ethical standards that organizations and their leadership have a
duty to uphold. Here's an example:

• Company: ABC Corporation

• Official Responsibilities in Business Ethics:

1. Transparency and Disclosure: ABC Corporation is committed to providing clear and accurate information to its stakeholders, including
shareholders, employees, customers, and the public. They regularly publish financial reports, corporate governance policies, and
other relevant information to ensure transparency.

2. Ethical Leadership: The company's leadership, from the CEO to department heads, exemplifies ethical behavior and sets the tone for
the entire organization. They prioritize integrity, honesty, and fairness in all business dealings.

3. Compliance with Laws and Regulations: ABC Corporation adheres to all applicable laws and regulations in its industry and geographic
locations of operation. They have a dedicated compliance team to ensure that the company operates within legal boundaries.

4. Fair Employment Practices: ABC Corporation maintains a commitment to fair employment practices, including equal opportunity
hiring, diversity and inclusion initiatives, and adherence to labor laws and regulations.
Customer Satisfaction: The company places a high value on customer satisfaction. They prioritize delivering quality products or
services, addressing customer concerns promptly and fairly, and ensuring transparency in pricing and contractual agreements.

Supplier Relations: ABC Corporation maintains ethical relationships with its suppliers. They engage in fair and transparent
procurement practices, avoid exploitative supplier contracts, and uphold ethical sourcing standards.

Environmental Stewardship: The company is dedicated to minimizing its environmental impact. They implement sustainable
practices in their operations, reduce waste, and invest in eco-friendly technologies and initiatives.

Community Engagement: ABC Corporation actively engages with the communities in which it operates. They support charitable
initiatives, volunteer programs, and community development projects to give back and foster positive relationships.

• Impact: By fulfilling these official responsibilities in business ethics, ABC Corporation not only ensures its own ethical reputation
but also contributes positively to society. Their commitment to transparency, ethical leadership, legal compliance, fair
employment, customer satisfaction, responsible supplier relationships, environmental sustainability, and community engagement
helps them maintain trust among stakeholders and promotes long-term success in their industry.

• This example illustrates how a company can fulfill its official responsibilities in business ethics by embedding ethical principles into
its organizational culture and operations, benefiting both the organization and the broader community.
ISSUES ON INTERNET PRIVACY
• Internet privacy is a complex and evolving issue with various concerns that impact individuals,
businesses, and society as a whole. Here are some key issues on internet privacy:
1.Data Collection and Tracking: Companies, websites, and apps often collect vast amounts of
personal data from users, including browsing history, location, and personal preferences. This data is
often used for targeted advertising, but it can also be vulnerable to breaches or misuse.
2.Online Tracking: Persistent tracking technologies like cookies and web beacons allow advertisers
and data brokers to monitor users' online behavior across different websites, potentially leading to
invasive profiling.
3.Data Breaches: High-profile data breaches have exposed sensitive information of millions of users,
including credit card details and personal identification. These breaches can have severe
consequences for individuals and erode trust in online services.
4.Social Media Privacy: Social media platforms have been criticized for their privacy practices,
including the handling of user data and concerns over the misuse of personal information for political
purposes or cyberbullying.
5.Lack of Informed Consent: Users often unknowingly agree to complex terms of service agreements
that grant companies broad rights to collect, use, and share their data. The lack of clear, concise, and
understandable terms makes it difficult for individuals to give informed consent.
6.Government Surveillance: Some governments conduct extensive surveillance on their citizens'
online activities, which raises concerns about privacy, civil liberties, and the potential for abuse of
power.
• Discuss the concept of internet privacy and its
importance in the digital age. Identify and explain
specific threats to online privacy that individuals and
organizations face today.
IoT and Smart Devices: The proliferation of Internet of Things (IoT) devices, such as smart
home appliances and wearables, can create vulnerabilities and privacy risks when these
devices collect and transmit personal data.
Data Minimization: Companies may collect more data than is necessary for their services,
which can increase the risk of data breaches and misuse. The principle of data minimization
suggests that only the minimum required data should be collected and retained.
Algorithmic Bias: Algorithms used for profiling and decision-making can perpetuate bias and
discrimination, leading to unfair outcomes in areas like employment, housing, and lending.
Regulatory Challenges: The legal and regulatory framework for internet privacy varies by
country and is often slow to adapt to technological advancements. This can create challenges
in protecting user privacy on a global scale.
Emerging Technologies: Emerging technologies like facial recognition, biometric data
collection, and artificial intelligence pose new privacy concerns, as they can enable more
invasive surveillance and profiling.
Personal Data Monetization: Individuals often have limited control over how their personal
data is monetized by companies, and they may not receive any compensation for the use of
their data in targeted advertising or other purposes.
• Addressing these internet privacy issues requires a combination of technological solutions,
regulatory frameworks, and individual awareness and empowerment. Users, businesses, and
governments all play a role in safeguarding internet privacy and ensuring that individuals'
rights are protected in the digital age.
• Why is business ethics important?
• Non-compliance with ethics can result in hefty fines and legal actions. Firms are liable
for the illegal activities of their employees. Even if laws can be circumvented,
businesses risk paying a hidden cost—loss of reputation. A small mistake made by
one employee can tarnish the brand image of a large firm.

• How to make ethical decisions in business?


• For making ethical decisions, the management should go through the ethical
guidelines. They must first ascertain what is right and what is wrong. Next, the firm
must evaluate the impact of decisions. These decisions impact customers,
employees, and shareholders. Finally, the management must communicate the
conclusion with the stakeholders.

• What are the different types of ethical issues?


• Common ethical issues include workplace discrimination, inaccurate financial
reporting, inappropriate safety measures, poor working conditions, employee
harassment, and misleading product information. Unfortunately, large firms struggle
to communicate ethics. Lack of direct communication hampers the enforcement of
ethical policies.
ISSUES ON INTERNET PRIVACY
• Internet Privacy : refers to the personal privacy that you’re
entitled to when you display, store, or provide
information regarding yourself on the Internet.
• 3 Common Internet Privacy Issues
• Tracking
• Surveillance
• Theft
• Tracking : When you browse the Internet, you may have
noticed those pesky ads following you where you go based
on your earlier web searches or visits to websites. Well,
that’s because websites, advertisers, etc. track your
movements.

• Surveillance: Some governments spy on their citizens


online to supposedly assist law enforcement agencies

• Theft : Cybercriminals use malware, spyware, and phishing


techniques to break into your online accounts or devices
and steal your personal information to engage in identity
theft activities.
Online habits that impact your privacy

• Online habits can significantly impact your privacy, and it's essential to be aware of how your actions on the
internet can compromise your personal information and data. Here are some online habits that can have
privacy implications:
1. Weak Passwords: Using easily guessable or commonly used passwords for your online accounts can make it
easier for hackers to gain unauthorized access to your accounts. Strong, unique passwords are essential for
protecting your privacy.
2. Reusing Passwords: Using the same password across multiple online accounts can be risky. If one account is
compromised, it could lead to others being compromised as well.
3. Ignoring Software Updates: Failing to keep your operating system, software applications, and antivirus
programs up to date can leave your devices vulnerable to security threats and exploits.
4. Over-Sharing on Social Media: Sharing personal information such as your full name, address, phone
number, and birthdate on social media can expose you to identity theft and other privacy risks. Additionally,
sharing vacation plans or location updates can signal to potential burglars that your home is vacant.
5. Accepting All Cookies and Permissions: Automatically accepting all cookies and granting permissions to
apps and websites without reviewing their requests for access to your data can result in indiscriminate data
sharing.
6. Ignoring Privacy Settings: Failing to adjust privacy settings on social media and other online platforms can
mean that your information is visible to a broader audience than you intend.
7. Using Public Wi-Fi Insecurely: Connecting to public Wi-Fi networks without using a Virtual Private Network
(VPN) can expose your internet traffic to eavesdropping and hacking attempts.
• Discuss five common online habits that can significantly impact an individual's privacy.
Clicking on Suspicious Links: Clicking on links or downloading attachments from
unknown or suspicious sources can lead to malware infections or phishing attacks aimed
at stealing your personal information.
Not Using Two-Factor Authentication (2FA): Failing to enable 2FA on your accounts
can make them more susceptible to unauthorized access.
Neglecting to Log Out: Leaving your online accounts open and logged in on shared or
public computers can result in unauthorized access to your accounts.
Ignoring Privacy Policies: Not reading or understanding the privacy policies of websites
and apps can lead to unintentional data sharing and a lack of awareness about how your
data is used.
Saving Payment Information: Saving credit card information on websites for
convenience can be risky if the site's security is compromised. It's often better to enter
payment details manually each time.
Not Using Encryption: Failing to use encrypted communication methods (e.g., HTTPS)
when sharing sensitive information online can make it easier for third parties to intercept
and access your data.
• To protect your online privacy, it's essential to develop good cybersecurity habits, stay
informed about the latest threats and privacy settings, and take proactive steps to
secure your digital presence.
Ways to Protect Your Privacy and Security on
the Internet
• Secure Your Web Browser
• Use a Virtual Private Network (VPN)
• Keep Your Software Up-to-Date
• Install an Anti-virus Program & Activate Firewall
• Delete Cookies at Browser Exit
• Adjust Your Settings on Google, Facebook, etc.
• Use HTTPS to Secure Your Online Connection
• Defuse Threats When Backing up to the Cloud
• Secure Online Communications
• share Online Files Securely
1.Secure Your Web Browser:
1. Example: Imagine you're an MBA student researching information for a class project. To secure your web
browser, you can install an ad-blocker extension like "AdBlock Plus" or "uBlock Origin." These extensions
will prevent intrusive ads and potentially harmful scripts from running on the websites you visit.
2.Use a Virtual Private Network (VPN):
1. Example: Suppose you're studying at a coffee shop and need to access your university's online portal to
submit an assignment. By connecting to a trusted VPN service on your laptop or mobile device, you can
encrypt your internet connection, making it safe to log in and submit your assignment even on a public
Wi-Fi network.
3.Keep Your Software Up-to-Date:
1. Example: Imagine you have a finance simulation software for your MBA coursework. Regularly check for
updates and install them promptly when they become available. These updates often contain important
security fixes that protect your financial data from potential breaches.
4.Install an Anti-virus Program & Activate Firewall:
1. Example: Let's say you use a Windows computer for your MBA studies. Install a reputable antivirus
program like "Windows Defender" and activate the built-in firewall. These security measures will help
block viruses and malicious software from infecting your computer and compromising your academic
files.
5.Delete Cookies at Browser Exit:
1. Example: After a research session on a stock trading website, go into your browser settings and enable
the option to delete cookies when you close the browser. This ensures that your browsing history and
personal data aren't stored, preserving your privacy.
6.Adjust Your Settings on Google, Facebook, etc.:
1. Example: Suppose you have a LinkedIn profile to connect with professionals in your field. Review your
privacy settings on LinkedIn and adjust them to limit the visibility of your contact information to only
your connections, helping you maintain a professional online image.
7.Use HTTPS to Secure Your Online Connection:
1. Example: When making an online payment for your MBA textbooks, make sure the
website's URL begins with "https://" and shows a padlock icon in the browser address
bar. This indicates that the connection is secure, protecting your credit card information
during the transaction.
8.Defuse Threats When Backing up to the Cloud:
2. Example: Before uploading your MBA project files to a cloud storage service like Google
Drive, use a strong, unique password and enable two-factor authentication. Additionally,
consider encrypting sensitive project files with a tool like VeraCrypt before uploading
them for an extra layer of security.
9.Secure Online Communications:
3. Example: When discussing a group project with classmates, use a secure messaging app
like Signal, WhatsApp, or Telegram. These apps offer end-to-end encryption, ensuring
that only you and your classmates can read your messages and share project details.
10.Share Online Files Securely:
4. Example: If you need to share a presentation with your MBA group, upload it to a secure
file-sharing service like Dropbox, OneDrive, or Google Drive. Set a password for the
shared link or use the service's built-in sharing permissions to control who can access
the file.
OTHER ISSUES ON INTERNET PRIVACY
• Spying and Snooping
• Information Mishandling
• Location Tracking

Spying and Snooping


When you are online, you are spied by a number of trackers for various purposes. Trackers keep a record of your
search history and track all your online activities through various means. This provides them a clear picture of who
you are and your interests, which is a breach of online privacy policy and makes you a public property. Most of the
time, this tracking is for advertisement purposes only and it allows advertisers to show ads according to your taste
and interests. But sometimes this information is used by cybercriminals to carry out unauthorized and illegal
activities risking your online existence.
Information Mishandling
• There are various sites on the internet that need your personal information to get access to their services.
These sites often store cookies and save your personal information and later use it for various purposes.
Most of the time this information is not encrypted and can be accessed by anyone. This mishandling of
personal information may lead to serious consequences. The modern trend of e-banking and e-business
portals have multiplied the risks associated with online privacy. By sharing your bank details and crucial files
on the internet, you are paving ways for burglars and making yourself vulnerable to cybercriminals.

Location Tracking
Most of the internet users proudly upload their social media posts highlighting their current location along with tagging
friends and family members. It's fun and exciting to share your life events with friends and family, but this data does not
remain restricted to your expected audience only. This same data is stored on the social media site you are using and stays
there forever, often without you knowing (though you may have given consent through a terms and services agreement).
Along with social media apps, Google Maps and other apps also ask for your location and by turning on your location you
are providing first-hand information to the world about where exactly you are and what your next move is, which is
certainly risky and insecure
Use a VPN
• There are various ways of protecting your online privacy, but the most
successful and certain way is through VPN. It is a tool that provides an
encrypted tunnel for all your online activities, which means it encodes all the
information transferred between you and your host site and leaves no chances
of snooping and spying. It also provides you an anonymous IP and disguises
your actual identity, hiding your geographical location and making your online
existence more safe and secure.
• There are various VPN available including free and paid ones Some VPN work on
a small scale and have access to a few countries only while others are
international ones with access to most parts of the world.

Conduct Safe Browsing


• Hackers can easily track your activities and get into your system through your
browser. It’s highly recommended to keep your browser updated to the latest
version. Avoid using spammy websites that asks for user details. You can also
block ads on your browser and take extra time to actually read privacy policies
before giving your consent.
Keep Your System Up-to-Date
• Keep your system up to date to ensure that you don’t miss out any feature and security fixes. If
you find it a hassle to manually apply updates, you can always use tools to automate your
software updates. Regularly scan your system or it’s better to keep auto scan on in your system.

Use Anti-Virus
• A strong anti-virus program will keep your device free from all types of malware, such as
spyware, viruses, Trojans, etc. You can also use a good anti-virus that will keep you updated if it
found something wrong in your system. Using anti-virus is essential as it helps you to get real
time updates.

Adjust Your Settings on Social Media


• Take advantage of the options that are available to you Big Internet companies such as
Facebook and Google usually give you options to opt out of some, if not all, of their
personalization and tracking.
SOFTWARE AND INTELLECTUAL PROPERTY,
• Software intellectual property, also known as software IP, is
a computer code or program that is protected by law against
copying, theft, or other use that is not permitted by the
owner. Software IP belongs to the company that either
created or purchased the rights to that code or software.

• A patent protects the way the program makes a computer


work.
• Copyright protects the code of a computer program from
being copied.
• Circuit layout rights protect the appearance (design and
layout) of an electronic circuit.
HOW TO PROTECT SOFTWARE INTELLECTUAL
PROPERTY

• Hire a good lawyer or legal team to clarify exactly which rights you have and how
best to protect them.

• File for patents and register trademarks where possible.

• Carefully screen employees and independent contractors and have them sign non-
disclosure agreements before working with you.

• Store and work with your data on secure devices and follow all best practices for
data security.
HOW TO PROTECT SOFTWARE IP WITH LICENSING MANAGEMENT

• A license is what authorizes a customer to use your product


legally.

• copying the code or transferring the program to


unauthorized devices or users can be very easy if it’s not
well protected with a good licensing management system.
What Is the Technology That Protects the Intellectual Property Rights of Software?

• Licensing management systems help protect intellectual property of software by issuing licenses to users
that allow them to use the software only in an authorized manner. Each license helps control the use of the
software so every use complies with the contract. A comprehensive licensing management system also
allows the vendor to track how the licenses that have been purchased by each client are being used.

• There are multiple models of licensing management that may be used for different types of software. The
right strategy for how to protect software IP varies from company to company and from software to
software, and may even involve multiple models for the same program.

• In essence, license keys are a kind of code that enables the program to work according to the software
intellectual property agreement. That code can be accessed using a physical electronic device — a dongle or
USB key — or via software installed or downloaded to the device.
MODELS OF SOFTWARE LICENSE INTELLECTUAL
PROPERTY PROTECTION

• Licensing hardware: Dongles or USB keys


• Software node locked, host locked, or single-use
licenses
• Floating, network, or concurrent licenses
• Named user, per-seat, or single-seat licenses
• License borrowing or offline licenses
• Hybrid models
• Licensing hardware: Dongles or USB keys

This type of license application requires the user to plug a physical electronic device into the
computer on which they intend to use the software. The code for the license is programmed
into the hardware key and enables the device to access the software. The main advantage of
this type of license is that it is very secure and doesn’t require reliance on the cloud or
Internet access to activate the license. The main disadvantage is that it’s relatively rigid and
non-customizable, and transferring the license requires the transfer of a physical object.

• Software node locked, host locked, or single-use licenses

• This type of license is similar to the former, except that the code to activate the software is
delivered via software that is installed or downloaded to a specific device. The advantage is
that no physical object is required, but the disadvantage is that the license only applies to a
single computer or device, so it can’t be transferred.
• Floating, network, or concurrent licenses
• This type of license is also a code that is installed or downloaded to the device, but it
can be shared among users on a network, or otherwise accessed on multiple devices.
This model is an excellent solution if your company is trying to figure out how to protect
intellectual property online. It can be especially cost-effective if a customer needs
multiple users or devices to access the software, but not all at once.

• If for example a company with 100 devices purchases a floating license that gives
access for up to 10 users at once, the user who needs to access it sends a request for
access to a central license server, and the server provides the license based on
availability. When the user is done using the software, the license is “returned” to the
central server and can then be transferred to a different user.
Named user, per-seat, or single-seat licenses

Another way of providing access to users from multiple


devices is the named user or per-seat license: a license that
can only be activated by a particular user who signs in with
specific credentials. This is useful if a company knows that
only specific employees will need to access this software. For
example, if the company has a team of designers that work
with Adobe Photoshop, you can purchase a per-seat license
for that team.
• License borrowing or offline licenses

• This model allows a user to download a software license


and use it without needing to connect to the central
license server each time they log in, and then “return” the
license once they no longer need to use it offline. This is
especially useful for employees who are on the road or in
the field and won’t have reliable Internet access. However,
it may be expensive, since the company will have to pay
for the license for the full duration of the period it’s been
downloaded to the device.
Hybrid models

• Many software vendors choose to offer a range or combination of different types of


software licenses to best suit the needs of their clients. Many of the license models listed
above can be mixed and matched. For example, a company may prefer per-seat licenses
for a team of employees who need to access the software regularly, and a concurrent
license for a different team that needs to access it only occasionally. Another company
might prefer a cloud-based license for most of the team, and USB keys for certain
employees who need more data security or who don’t have regular Internet access.

• By providing a flexible licensing model, software vendors can attain high-quality


software intellectual property protection while responding to clients’ varied needs.
IT INFLUENCE ON THE CHANGING BUSINESS ENVIRONMENT

• Impact on Operating Cost


• Securing Sensitive Information
• Improved Communication Processes
• Increased Employee Productivity
• Broden Customer Bases
• Collaboration and Outsourcing
Impact on Operating Costs
• Small business owners can use technology to reduce business costs. Basic enterprise software enables a firm
to automate back office functions, such as record keeping, accounting and payroll.

• Mobile tech allows home offices and field reps to interact in real time. For example, field reps can use mobile
apps to record their daily expenses as they incur them and have them sync automatically with accounting
software back at the office.

Securing Sensitive Information


• Business owners can also use technology to create secure environments for maintaining sensitive business or
consumer information. Many types of business technology or software programs are user-friendly and allow
business owners with only minor backgrounds in information technology to make the most of their tools and
features.
Improved Communication Processes
• Business technology helps small businesses improve their communication processes.
Emails, texting, websites and apps, for example, facilitate improved communication with
consumers. Using several types of information technology communication methods
enable companies to saturate the economic market with their message. Companies may
also receive more consumer feedback through these electronic communication methods.

• Technology also improves inter-office communication as well. For example, social


intranet software gives employees a centralizes portal to access and update internal
documents and contracts and relay relevant data to other departments instantly. These
methods also help companies reach consumers through mobile devices in a real-time
format.
Increased Employee Productivity
• Small businesses can increase their employees' productivity through the use of
technology. Computer programs and business software usually allow employees to
process more information than manual methods. Business owners can also implement
business technology to reduce the amount of human labor in business functions. This
allows small businesses to avoid paying labor costs along with employee benefits.

• Even fundamental business tech can have a major impact on employee performance.
For example, by placing employee-performance appraisal information in an online
framework, supervisors can easily create measurable goals for their employees to
reach and sustain company objectives. Business owners may also choose to expand
operations using technology rather than employees if the technology will provide
better production output.
BROADEN CUSTOMER BASES

• Technology allows small businesses to reach new economic markets. Rather than
just selling consumer goods or services in the local market, small businesses can
reach regional, national and international markets. Retail websites are the most
common way small businesses sell products in several different economic markets

• Websites represent a low-cost option that consumers can access 24/7 when needing
to purchase goods or services. Small business owners can also use internet
advertising to reach new markets and customers through carefully placed web
banners or ads.
COLLABORATION AND OUTSOURCING

• Business technology allows companies to outsource business functions to other


businesses in the national and international business environment. Outsourcing can
help companies lower costs and focus on completing the business function they do
best. Technical support and customer service are two common function companies
outsource.

• Small business owners may consider outsourcing some operations if they do not have
the proper facilities or available manpower. Outsourcing technology also allows
businesses to outsource function to the least expensive areas possible, including
foreign countries.
M – COMMERCE
• M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as smartphones and tablets.
• Three Main Categories

1. Mobile Shopping
2. Mobile Payments
3. Mobile Banking
List of Important M – Commerce Applications

1. Banking
2. M – Commerce for Retails
3. Mobile Marketing
4. Mobile Ticketing
5. Reservations
6. Entertainment
7. Healthcare
8. Office Commucation
Banking
iMobile is an application that was developed by ICICI Bank that allows users to complete
all internet banking transactions through their mobile phone. Users can transfer money
from bank accounts that are ICICI and those that are not and can also request a stop to
checks, pay bills, and more. This is a very useful app that allows users to use completely
all their mobile banking needs in one easy to access space.

M-commerce for Retail


Companies are using mobile commerce for more and more retail applications as well. If you own a business
and are looking to break into M-commerce, you can always create an online catalog of items that you have for
sale so that customers can access it and then purchase the items. This is a great way for businesses to use M-
commerce to get the most in terms of retail and mobile phones.
3. Mobile Marketing
• This is another fantastic application for mobile commerce. You can send messages on phones
for new products or services, you can send out promotional rewards, and you can send out
correspondence to help get customers on board. M-commerce is a great way to market and to
reach more people. Most people always have their smartphones on them, which means that
you are going to be able to get to these potential customers and to bring them to your
business.

• 4. Mobile Ticketing
• Another great application is to purchase tickets with the help of mobile devices. Airlines have mobile ticket movie
theaters, concerts and more all offer mobile purchase of tickets. You can also then show your electronic ticket to the
event or the place where the ticket is to be redeemed, working to eliminate paper tickets altogether.
5. Reservations

• Reservations are a fantastic use of M-commerce. This could mean hotel rooms,
parking spots, restaurant reservations and more. Customers can now reserve their
spot with their mobile phone which is easier for everyone involved. This means that
both the customer and the company involved can help to reduce the amount of
work and effort that is needed to book various reservations.

6. Entertainment

• You can also use M-commerce in terms of mobile entertainment as well. From
applications that show movies and television shows, to those that show videos like
YouTube, even music applications, you can use your phone for all sorts of mobile
entertainment. Mobile entertainment is one of the best uses for M-commerce and
for your mobile phone in terms of using it for something other than making calls.
7. Healthcare
A mobile phone can be used for accessing health records, for paying medical bills, for accessing the
medical records of patients and more. In a healthcare setting a mobile phone can be used by a doctor or
a practitioner to access the health record of a patient, to send in a prescription, or to make clinical
decisions. It helps doctors and other healthcare professionals to remain connected to the main database
of the hospital or the medical facility and helps doctors and healthcare professionals provide patients with
a better experience overall.

8. Office Communication
M-commerce applications can also help to promote communication within offices and other areas where
you may be working with a team. With those professionals that are in the field such as a real estate agent
or an insurance agent, it is often necessary to get back in touch with the office or to access information
that might be back at the office. M-commerce is going to allow these professionals to track inventory, to
talk to personnel that is in the field and back and the office, and to make sure that salesmen that are in
the field, for example, get approval to make sales without having to wait as long.
M-Commerce vs. E-Commerce

• Electronic commerce refers to the buying and selling of goods and services
over the internet. E-commerce may be conducted via a desktop computer,
laptop, smartphone, or tablet. However, e-commerce is typically
associated with a computer in which a user has to find a location with an
internet connection.

• Conversely, m-commerce specifically refers to transactions done via a


smartphone or mobile device. With m-commerce, users can transact
anywhere provided there's a wireless internet provider available in that
area.
GROWTH OF MOBILE COMMERCE

• As mobile ownership rates continue to rise globally, alongside access to


high-speed internet, m-commerce is set to continue taking market share
within the e-commerce sector.

• If we think about the fact that more internet usage currently comes from
mobile than from desktop, a clear picture of the future of online/digital
commerce can be understood.

• Businesses that do not take advantage of this shift to m-commerce will


limit their reach as the shift to mobile continues.
BENEFITS OF MOBILE COMMERCE
• The range of devices capable of mobile commerce is growing.
• For example, digital wallets like Apple Pay and Google Pay let customers make in-store purchases without
the inconvenience of swiping cards.
• And during the mid- to late-2010s, social media platforms, such as Meta (formerly
Facebook), Twitter, Pinterest, and Instagram, launched "buy buttons" on their mobile platforms, enabling
users to conveniently make purchases from other retailers directly from these social media sites.

• The portability of mobile devices helps businesses extend their reach to their customers through mobile
commerce. Coupons and discounts can be sent from retailers to customers. Personalized shopping
experiences can also connect the retailer with their client.

• M-commerce apps allow for location tracking via GPS to offer their customers help finding items in their
store.
• Security can also be enhanced using m-commerce apps since multi-factor authentication can be done,
including biometrics such as fingerprints and retina scans.
HEALTH AND SOCIAL ISSUES - ERGONOMICS

ERGONOMICS : HEALTH AND SOCIAL ISSUES

Ergonomics, or "human factors", is the science of designing equipment, the workplace and
even the job to fit the worker.It covers a broad spectrum of factors that make up the fit
between humans and work

Ergonomics is everything around us, affecting our behavior at work.


The design of the office,
the people within it and the culture of the organization all play a part.

When designing a workplace, it's important to promote relationships between colleagues,


but also give staff a little privacy.
Ergonomics is the science of designing and adapting work
environments, tools, and systems to fit the physical and
cognitive abilities, needs, and preferences of workers.
It aims to improve health, safety, comfort, and performance in
various settings and tasks.
But ergonomics is not only about physical factors. It also
involves psychological and social aspects that affect how
workers perceive, experience, and interact with their work.
TYPES OF EROGONOMICS
1. Physical Ergonomics: This branch of ergonomics deals with the physical aspects of human-machine interaction. It
involves designing equipment, tools, and workspaces to minimize physical strain, discomfort, and the risk of
musculoskeletal disorders. Examples include ergonomic chairs, adjustable workstations, and tools with comfortable
grips.

2. Cognitive Ergonomics: Cognitive ergonomics focuses on mental processes, such as perception, memory, decision-
making, and problem-solving. It aims to design interfaces, displays, and systems that are intuitive, easy to understand,
and support efficient cognitive functioning. User-friendly software interfaces and cockpit displays in aircraft are
examples of cognitive ergonomics in action.

3. Organizational Ergonomics: Organizational ergonomics, also known as macroergonomics, examines the broader
organizational and sociotechnical systems within which work is performed. It involves optimizing factors like work
processes, team dynamics, job design, and communication to enhance overall productivity, safety, and employee well-
being.
Environmental Ergonomics: This type of ergonomics focuses on the impact of the physical environment on
human performance and comfort. It encompasses factors such as lighting, noise, temperature, humidity,
and air quality. Designing an office with appropriate lighting levels or optimizing the thermal environment
in a manufacturing facility are examples of environmental ergonomics.

Human Factors Engineering: Human factors engineering is often used interchangeably with ergonomics
and encompasses the various branches. It involves the application of principles from cognitive and physical
ergonomics to the design and evaluation of products, systems, and environments to ensure they are safe,
efficient, and user-friendly.

Usability Engineering: Usability engineering is closely related to cognitive ergonomics and focuses on the
usability of products and systems, particularly in the context of user interfaces and user experience (UX)
design. It aims to create interfaces that are intuitive, easy to navigate, and meet users' needs and
preferences.
Safety Ergonomics: Safety ergonomics concentrates on reducing the risk of accidents, injuries, and human error in
various settings. It involves designing safety-critical systems, such as control panels in industrial processes or safety
protocols in healthcare, to minimize the likelihood of adverse events.

Occupational Ergonomics: Occupational ergonomics combines elements of physical ergonomics and organizational
ergonomics to address issues related to the workplace, job design, and the well-being of workers. It often includes the
design of workstations, tools, and processes to enhance productivity and minimize health-related problems.

Agricultural Ergonomics: Agricultural ergonomics focuses on improving the safety and efficiency of farming and
agricultural operations. It involves designing ergonomic equipment and tools for tasks like planting, harvesting, and
livestock handling.

Transportation Ergonomics: Transportation ergonomics deals with the design of vehicles, controls, and interfaces to
ensure safe and comfortable transportation experiences. Examples include the design of car seats, aircraft cockpit
layouts, and train control systems.
1.Physical Ergonomics: Using a chair with an adjustable height to match your desk, allowing you
to maintain a proper sitting posture and reduce back strain.
2.Cognitive Ergonomics: Organizing your smartphone apps into folders by category (e.g., social
media, productivity) to make it easier to find and access the apps you need without cognitive
overload.
3.Organizational Ergonomics: Implementing a clear system for task delegation and
communication within a small team to improve workflow and reduce confusion about
responsibilities.
4.Environmental Ergonomics: Adjusting the lighting in your workspace to reduce glare on your
computer screen, thereby improving visibility and reducing eye strain.
5.Human Factors Engineering: Designing a car dashboard with easily accessible and intuitive
controls, such as large buttons for the radio and air conditioning, to minimize distractions while
driving.
6.Usability Engineering: Simplifying a website's navigation menu by using clear labels like
"Home," "About," and "Contact" to make it easy for users to find information quickly.
7.Safety Ergonomics: Placing non-slip mats in the bathtub to prevent slips and falls, promoting
safety in the bathroom.
8.Occupational Ergonomics: Providing employees with adjustable office chairs and ergonomic
keyboards to reduce the risk of discomfort and repetitive strain injuries in an office environment.
9.Agricultural Ergonomics: Designing a hoe with an ergonomic handle that fits comfortably in a
farmer's hand, reducing strain during long hours of use in the field.
10.Transportation Ergonomics: Installing an adjustable driver's seat in a car, allowing the driver to
find the most comfortable and safe driving position.
ASPECTS OF ERGONOMICS

• Motivation and satisfaction


• Stress and well-being
• Learning and performance
• Communication and collaboration
• Participation and empowerment
• Identity and culture
• Motivation and Satisfaction :

One of the main goals of ergonomics is to enhance motivation and satisfaction among workers by creating
conditions that match their expectations, values, and goals. Motivation and satisfaction are influenced by
factors such as autonomy, feedback, recognition, variety, challenge, and support. When workers feel
motivated and satisfied, they are more likely to perform well, stay engaged, and cope with stress. Ergonomics
can help foster motivation and satisfaction by designing work that allows workers to have some control over
their tasks, receive timely and constructive feedback, and be recognized for their achievements.

• Stress and well-being

Another important aspect of ergonomics is to reduce stress and promote well-being among workers. Stress
can have negative effects on workers' health, mood, cognition, and behavior. Ergonomics can help prevent and
manage stress by designing work that balances the demands and resources of workers, provides adequate rest
and recovery periods, and reduces environmental disturbances.
• Learning and performance

• A third aspect of ergonomics is to facilitate learning and performance among workers by optimizing the fit between
their skills, knowledge, and abilities. Learning and performance are influenced by factors such as attention, memory,
decision-making, problem solving, creativity, and adaptation. When workers learn and perform well, they are more
likely to achieve their goals, improve their competence, and increase their confidence. Ergonomics can help enhance
learning and performance by designing work that captures and maintains attention, supports memory and
information processing, and aids decision-making and problem solving.

• Communication and collaboration

• A fourth aspect of ergonomics is to improve communication and collaboration among workers by ensuring the
quality, clarity, and accessibility of information. Communication and collaboration are influenced by factors such as
language, culture, personality, and conflict resolution. When workers communicate and collaborate effectively, they
are more likely to share ideas, knowledge, and resources. Ergonomics can help foster communication and
collaboration by designing work that uses clear and consistent language, provides multiple channels and modes of
communication, and enables feedback and dialogue.
• Participation and empowerment

• A fifth aspect of ergonomics is to increase participation and empowerment among workers by involving them in the design,

implementation, and evaluation of their work. Participation and empowerment are influenced by factors such as involvement,

influence, ownership, responsibility, and accountability. When workers participate and feel empowered, they are more likely to

express their opinions, contribute to the improvement of their work, and take initiative and action. Ergonomics can help support

participation and empowerment by designing work that solicits and incorporates workers' input and feedback, provides

opportunities for choice and influence, and acknowledges and rewards workers' contributions.

• Identity and culture

• A sixth aspect of ergonomics is to respect and enhance identity and culture among workers by recognizing and valuing their

individual and collective characteristics. Identity and culture are influenced by factors such as personal history, background,

values, norms, traditions, and symbols. When workers identify and feel connected to their work, they are more likely to develop a

positive self-image, a sense of purpose and meaning, and a shared vision and mission. Ergonomics can help nurture identity and

culture by designing work that reflects and respects workers' individuality and diversity, supports their personal growth and

development, and aligns with their values and goals.


Issues Due to Poor Ergonomics
• Poor ergonomics can lead to a variety of issues, both in the workplace and everyday life. These
issues can have a significant impact on health, safety, and overall well-being. Here are some
common issues that can result from poor ergonomics:
1.Musculoskeletal Disorders (MSDs): One of the most prevalent problems associated with poor
ergonomics is the development of musculoskeletal disorders. These can include conditions such as
carpal tunnel syndrome, tendonitis, back pain, neck pain, and repetitive strain injuries. Prolonged
exposure to awkward postures, repetitive movements, and poor workstation setups can contribute
to these disorders.
2.Fatigue: Poor ergonomics can lead to increased physical and mental fatigue. Uncomfortable
seating, improper monitor placement, and repetitive tasks can cause individuals to become tired
more quickly, impacting their ability to concentrate and perform tasks efficiently.
3.Decreased Productivity: Discomfort and fatigue resulting from poor ergonomics can lead to a
decrease in productivity. Workers who are in pain or discomfort may take more breaks, make
errors, or have difficulty staying focused on their tasks.
4.Absenteeism: Employees who suffer from musculoskeletal disorders or other health issues due to
poor ergonomics may need to take time off work for medical reasons. This can result in increased
absenteeism and associated costs for employers.
5.Work-Related Injuries: Poor ergonomics can contribute to work-related injuries and accidents.
For example, tripping over poorly arranged cables, straining to lift heavy objects without proper
equipment, or slipping on wet or uneven surfaces can lead to injuries.
Decreased Quality of Work: In jobs that require precision and attention to detail, poor ergonomics can lead to a decreased

quality of work. Discomfort and fatigue can make it challenging to maintain the necessary level of focus and accuracy.

Increased Healthcare Costs: Employers may face higher healthcare costs due to employees seeking medical treatment

for ergonomics-related health issues. These costs can include doctor's visits, physical therapy, and even surgeries in severe

cases.

High Turnover: Employees experiencing discomfort or pain due to poor ergonomics may choose to leave their jobs in

search of more comfortable and healthier work environments. This turnover can be costly for employers in terms of

recruitment and training.

Reduced Employee Morale: Working in an uncomfortable or unsafe environment can negatively affect employee morale.

Employees who feel that their employer is not taking their well-being seriously may become disengaged or demotivated.

Legal and Compliance Issues: Employers who fail to address ergonomic issues adequately may face legal and regulatory

compliance issues. Governments and labor agencies often have guidelines and regulations in place to ensure safe and

ergonomic workplaces.
Health and Social Issues – Cyber terrorism

• Cyberterrorism refers to the use of digital technology,


particularly the internet, to conduct terrorist activities. It
involves attacks on computer systems, networks, and
critical infrastructure for the purpose of causing fear,
disruption, or harm to individuals, organizations, or
governments. Here are some health and social issues
associated with cyberterrorism:
Health Issues:

1.Physical Harm: While traditional terrorism typically involves physical attacks,


cyberterrorism can result in physical harm indirectly. For example, cyberattacks on
healthcare systems could disrupt medical services, leading to delayed or
compromised patient care.

2.Mental Health Impact: Cyberterrorism can create a sense of insecurity and fear
among the general population. The constant threat of cyberattacks can contribute
to anxiety and stress, affecting individuals' mental health.

3.Data Breaches: Cyberattacks often result in data breaches, which can expose
sensitive personal and medical information. This can lead to identity theft, financial
loss, and emotional distress for individuals whose data is compromised.
National Security Concerns: Cyberterrorism can pose a significant threat to national
security. Attacks on military and defense systems can compromise a nation's ability to
defend itself, potentially leading to conflict and geopolitical instability.

Erosion of Trust: Repeated cyberattacks can erode trust in digital systems and
government institutions. People may lose faith in the ability of organizations and
governments to protect their data and critical infrastructure.

Geopolitical Tensions: Nation-states or state-sponsored cyberterrorists may engage in


cyber operations against other countries, leading to diplomatic tensions and potential
escalation of conflicts.

Privacy Concerns: The increased surveillance and monitoring that often follow
cyberterrorism threats can raise privacy concerns. Citizens may feel that their personal
data and communications are being excessively monitored in the name of security.

Legislation and Regulation: Governments may respond to cyberterrorism threats by


enacting stricter cybersecurity laws and regulations. While intended to enhance security,
these measures can also raise questions about civil liberties and individual freedoms.
• Emotional Trauma :Hack attacks and other cyber crimes can cause not only financial problems but
also mental stress. The victims might also find it difficult to trust anyone online.

• Guilt and Shame:Cybercrimes are often faceless crimes. However, victims might not report
cybercrimes, such as phishing attacks and email malware. They might blame themselves for
reasons such as weak cybersecurity.

• Feeling of helplessness : The feelings of helplessness might cause the victim to become isolated.
They might even decide to quit social media or go offline altogether to avoid more digital crimes.

• Eating Disorder : a person might turn to binge eating as a way to cope with online fraud.
“Emotional eating” is a way that people suppress negative emotions

• Cybercrimes can also cause insomnia as victims toss and turn worrying about stolen data or
financial situations. Various life situations, such as money problems, can cause stress-triggered
sleep disorders
Thank you

You might also like