Module 5
Module 5
ETHICS IN IT
• Security and Ethical challenges of IT
• Ethical Responsibility
• Business Ethics
• Technology Ethics;
• Environmental Impact Analysis,
• Cyber Crime and Privacy Issues – Hacking, Cyber theft, Unauthorized use at
work, Software and Intellectual Property,
• Issues on Internet privacy Ethical issues pertaining to Technology: IT
influence on the changing business environment, Health and
• Social Issues - Ergonomics and Cyber terrorism –
• Cases Pertaining to Business Ethic, Tech Adoption, Cyber Security –
ETHICS IN IT OR IT ETHICS
Information technology ethics is the study of the ethical issues arising out of the use
IT Ethics refers to the principles and moral values that guide the behavior and decisions
increasingly significant role in business, society, and daily life, ethical considerations
•Builds Trust: Helps users trust technology and the companies behind it.
•Fosters Ethical Innovation: Encourages creating new tech that benefits society responsibly.
ETHICAL ISSUES OF IT
•Privacy: Misuse of personal data without consent.
Personal information is the new gold, as the saying goes. We have commoditized data
because of the value it provides to businesses attempting to reach their consumer
base. But when does it go too far?
For businesses, it’s extremely valuable to know what kind of products are being
searched for and what type of content people are consuming the most.
For political figures, it’s important to know what kind of social or legal issues are
MISINFORMATION AND DEEP FAKES
• Celebrities and political figures can disseminate opinions on social media without fact checking, which is then aggregated and further spread
despite its accuracy—or inaccuracy. Information no longer undergoes the strenuous validation process that we formerly used to publish
newspapers and books.
Similarly, we used to believe that video told a story that was undeniably rooted in truth. But deepfake technology now allows such a
sophisticated manipulation of digital imagery that people appear to be saying and doing things that never happened. The potential for
privacy invasion and misuse of identity is very high with the use of this technology.
https://www.youtube.com/watch?v=DfNZPDwIaPY
https://www.youtube.com/watch?v=AmUC4m6w1wo
Lack of Oversight and Acceptance of Responsibility
• Facial recognition
• Replacement of Jobs
• Heath Tracking
• Bias in AI Technology
Facial Recognition:
• Example: Consider a scenario where a retail store uses facial recognition to identify and track customers. While this may
improve customer service, it could also be misused to build profiles of shoppers without their knowledge, potentially
violating their privacy.
Replacement of Jobs:
• Example: Imagine a manufacturing company that replaces human workers with AI-driven robots to cut labor costs. While this
may boost profits, it may also result in job losses and harm to the livelihoods of employees.
Health Tracking:
• Example: A health tech startup develops an AI-based app that tracks users' health data and shares it with insurance
companies without explicit user consent. This could lead to unfair premium rates and violate users' trust.
Bias in AI Technology:
• Example: Let's say a lending institution uses an AI algorithm to assess loan applications but unintentionally, the algorithm
favors applicants from certain racial or gender groups due to biased training data. This would lead to systemic discrimination
in lending practices.
Facial recognition: Use of software to find individuals can quickly become a less-than-ethical problem. According to the NY Times, there
are various concerns about facial recognition, such as misuse, racial bias and restriction of personal freedoms. The ability to track
movements and activity quickly morphs into a lack of privacy. Facial recognition also isn’t foolproof and can create bias in certain
situations.
Replacement of jobs: While this is anticipated to a certain degree, AI is meant to increase automation of low-level tasks in many situations
so that human resources can be used on more strategic initiatives and complicated job duties. The large-scale elimination of jobs has many
workers concerned about job security, but AI is more likely to lead to job creation.
Health tracking: The pandemic brought contact tracing into the mainstream. Is it ethical to track the health status of people and how will
that impact the limitations we place on them?
Bias in AI technology: Technology is built by programmers and inherits the bias of its creators because humans inherently have bias.
“Technology is inherently flawed. Does it even matter who developed the algorithms? AI systems learn to make decisions based on
training and coding data, which can be tainted by human bias or reflect historical or social inequities,” according to Forbes. Leading AI
developer Google has even experienced an issue where AI software believes male nurses and female historians do not exist.
AUTONOMOUS TECHNOLOGY
• Self-driving cars, robotic weapons and drones for service are no longer a thing
of the future—they’re a thing of the present and they come with ethical
dilemmas. Robotic machines in place of human soldiers is a very real
possibility, along with self-driving cars and package delivery via unmanned
drone.
1.Job Displacement: Example: The company's decision to automate leads to the layoffs of hundreds of
workers, many of whom have been with the company for years. These employees face financial stress,
uncertainty, and potential difficulties finding new employment.
2.Fair Severance and Transition Support Example: The company, in its rush to automate, offers minimal
severance packages and does not provide resources for retraining or helping employees find new
opportunities. This approach can be seen as unethical and detrimental to the affected workers.
Transparency and Communication
Example: The company did not communicate its automation plans to employees until the last moment,
leaving them feeling betrayed and unprepared for the changes ahead. This lack of transparency damages the
company's reputation and ethical standing.
Social Responsibility
Example: The company's decision to automate has a domino effect on the local community, causing a decline
in local businesses that relied on the disposable income of former employees. This raises ethical questions
about the company's social responsibility.
Ethical Practices in Technology
• Respect for employees and Customers
• Moral Use of Data and Resources
• Responsible adoption of Disruptive Tech
• Create a culture of Responsibility
• RESPECT FOR EMPLOYEES AND CUSTOMERS
Businesses that engage in ethical technology have a firm moral sense of
employee rights and customer protections. Data is valuable, but the employees
and customers who power your business are undoubtedly your greatest asset.
Take care to always observe responsible protections for employees and
customers to practice ethical technology.
• Examples:
•Security: Creating and using technology that is secure and protects users from
hacking, theft, and other forms of digital harm.
• Project Proposal Review: The first step is understanding the project (like building a factory, road, or dam)
and its goals.
• Baseline Study: Collecting data on the current environmental conditions, such as air quality, water
resources, wildlife, and local communities, before the project starts.
• Impact Identification: Identifying potential environmental impacts the project might have, like pollution,
habitat destruction, or resource depletion.
• Impact Prediction: Predicting how severe these impacts might be and whether they are short-term (during
construction) or long-term (permanent changes).
• Alternatives Consideration: Exploring other options for the project that might reduce its environmental
impact, like using alternative sites, materials, or methods.
• Mitigation Measures: Suggesting ways to avoid, minimize, or offset negative impacts. For example, if a
forest is cleared, planting trees elsewhere or reducing the size of the project might be considered.
• Public Consultation: Engaging local communities and stakeholders to get their input and address concerns
about how the project might affect them.
• Environmental Management Plan (EMP): Creating a plan to manage, monitor, and mitigate the
environmental impacts during and after the project, ensuring that damage is minimized.
• Decision-Making: Based on the EIA report, authorities decide whether the project should go ahead, be
modified, or be stopped.
• Monitoring and Evaluation: Once the project is approved, regular monitoring ensures that environmental
standards are maintained and mitigation measures are effectively implemented.
Cyber Crime and Privacy Issues – Hacking
• Cybercrime is when people use computers or the internet to do illegal or
harmful things. Hacking is one type of cybercrime where someone breaks
into a computer, network, or system without permission.
HOW HACKING AND OTHER PRIVACY ISSUES AFFECT PEOPLE
AND THEIR DATA???
• Hacking: Hackers use their skills to break into computers or networks to steal, change, or delete important
information. This could include anything from breaking into a business system to accessing someone's
personal email or bank accounts.
• Identity Theft: Hackers often steal personal information like names, social security numbers, and bank
details to impersonate others and commit fraud.
• Data Theft: By hacking into databases, hackers can steal large amounts of data, such as customer
information, passwords, and financial records, which can be sold or misuse
• Phishing: Hackers often use "phishing" emails that trick people into giving away personal information by pretending to
be a trustworthy person or company.
• Ransomware: A type of hacking where hackers lock a user’s files and demand money to release them. It’s like holding
data “hostage” for a ransom.
• Spyware: Sometimes hackers install software that secretly records information (like passwords or credit card details)
from a user’s device without their knowledge.
• Financial Loss: Hacking can lead to financial losses, as hackers may access bank accounts, credit cards, or demand
payments to stop an attack.
• Privacy Breach: When hackers break into systems, they can see private data about individuals, like their conversations,
health records, or browsing history, violating their privacy.
• Social Media Hacking: Hackers can also break into social media accounts, leading to the misuse of personal information,
impersonation, or even cyberbullying.
• Cybersecurity Awareness: To protect against hacking, individuals and organizations use cybersecurity practices like
strong passwords, firewalls, antivirus software, and staying alert to potential threats.
Cyber theft, Unauthorised use at work
• Cyber Theft and Unauthorized Use at Work are two major issues that involve
the misuse of technology and digital resources. Here’s a simple explanation of
each:
• Data Theft
• Financial Theft
• Intellectual Property Theft
• Identity Theft
• Phishing
• Ransomware Attacks
• Unauthorized use at work is when employees misuse workplace resources, such as
computers, software, or information, for personal activities or unapproved
purposes.
• Using Work Devices for Personal Tasks: This includes shopping online, checking
personal social media, or browsing unrelated sites on company devices.
• Installing Unapproved Software: Employees might install apps or software on work
computers without permission, which could bring security risks or licensing issues.
• Accessing Confidential Information: Some employees access sensitive information
they don’t need for their job, which could lead to data leaks or misuse.
• Downloading or Sharing Sensitive Data: Employees might download or share
confidential information outside the workplace, putting the company at risk.
• Using Company Time for Personal Projects: Spending work hours on personal
projects or side businesses can reduce productivity and waste company resources.
• Bypassing Security Controls: Sometimes employees disable security settings, which
makes the system more vulnerable to cyber attacks.
How to Prevent These Issues
• Clear Policies: Outlining what is and isn’t allowed on work devices and
enforcing rules.
• Cybersecurity Training: Educating employees about phishing, safe browsing,
and data protection.
• Access Controls: Limiting access to sensitive data based on employees' roles
and responsibilities.
• Regular Audits and Monitoring: Checking usage patterns to detect unusual
behavior.
• Strong Passwords and Multi-Factor Authentication: Ensuring data is protected
by secure access measures.
Software and Intellectual
Property
• What is Intellectual Property (IP)?
• Intellectual Property refers to creations of the mind—things like inventions,
designs, music, books, and software. These creations are valuable, so laws
exist to protect the rights of the people who create them. The main forms of
IP protection include:
• Copyright: Protects original works like software code, books, music, and
movies.
• Patents: Protect inventions and new technology that offers a new solution to
a problem.
• Trademarks: Protect brand names, logos, or symbols that identify products
or services.
• Trade Secrets: Protects confidential business information that gives a
company an edge over competitors.
• Software as Intellectual Property
• Software is considered intellectual property, and there are several ways it
can be protected:
• Copyright for Software: Software is automatically protected under
copyright law once it’s written. This means that only the creator or owner
has the right to use, modify, or distribute the software. Others must get
permission before doing so.
• Software Patents: In some cases, if software involves a unique process or
innovation, it can be patented. This prevents others from copying the
technology or method for a set period.
• Licensing: Software companies often grant users licenses to use their
software. The license outlines the conditions under which the software
can be used. It doesn’t transfer ownership of the software, but gives the
user rights to use it in a specific way.
• Types of Software Licenses
• Proprietary Software: This software is owned by a company or individual
and requires a paid license to use. Users cannot modify or distribute it.
Examples include Microsoft Office and Adobe Photoshop.
• Open-Source Software: This type of software is freely available for anyone
to use, modify, and distribute. However, even open-source software is
protected by licenses that set conditions on its use. Examples include Linux
and Mozilla Firefox.
• Piracy and Copyright Infringement
Piracy is when someone copies, distributes, or uses software without
permission from the owner. This is a violation of intellectual property rights
and is illegal.
Copyright Infringement: Using software in a way that goes against the license
agreement, like installing it on more computers than allowed, is also a
violation.
Trade Secrets in Software Development
Ethical Responsibility
Business Ethics
Technology Ethics
Internet of Things,
M-Commerce,
• Company: Patagonia
• Description: Patagonia, an outdoor clothing and gear company, is widely recognized for its commitment to corporate responsibility and
sustainability. One of their most notable initiatives is the Common Threads Initiative, which exemplifies their dedication to environmental and
social responsibility.
• Key Actions:
1. Worn Wear Program: Patagonia actively encourages customers to buy used clothing and gear through their Worn Wear program. They
provide a platform for customers to buy, sell, and trade used Patagonia products. This initiative promotes the idea of "reduce, repair, reuse,
and recycle" and reduces the overall environmental impact of their products.
2. Fair Trade Certification: Patagonia is a pioneer in Fair Trade certification for apparel. They pay a premium for every Fair Trade Certified product
sold, and this money goes directly into a worker-managed fund for community development projects. This ensures fair wages and better
working conditions for factory workers.
Environmental Commitment: Patagonia is known for its strong environmental stewardship. They invest a significant
portion of their profits into environmental causes, such as protecting public lands, fighting climate change, and
advocating for responsible consumption.
Transparency: The company is transparent about its supply chain and manufacturing processes, even going as far as
encouraging customers to trace the origins of the materials used in their products through the Footprint Chronicles on
their website.
Activism: Patagonia doesn't shy away from using its platform for environmental and social advocacy. They have run
impactful ad campaigns and have taken legal action to protect public lands and combat climate change.
• Patagonia's Common Threads Initiative and its broader commitment to corporate responsibility have had a
significant positive impact. They have reduced their environmental footprint, supported fair labor practices, and
inspired other companies to adopt more sustainable and responsible business practices. Their brand has become
synonymous with ethical and environmentally responsible consumption.
• This example illustrates how a company can integrate corporate responsibility into its business ethics by taking
concrete actions to address social and environmental issues while remaining profitable and successful.
• Economic responsibility in business ethics relates to a company's obligation to operate profitably, efficiently, and within the
boundaries of the law while also considering the interests of its stakeholders. Here's an example:
• Company: Toyota
• Description: Toyota is renowned for its commitment to economic responsibility while maintaining high ethical standards in its
operations.
• Key Actions:
Lean Manufacturing: Toyota pioneered the concept of lean manufacturing, which focuses on minimizing waste, improving efficiency,
and reducing costs in production processes. This approach not only benefits the company economically but also helps conserve
resources and reduce environmental impact.
Continuous Improvement: Toyota places a strong emphasis on continuous improvement and innovation in its products and
processes. They invest in research and development to enhance product quality and safety while reducing production costs.
Cost Reduction without Compromising Quality: Toyota strives to reduce costs without compromising the quality of its products. This
commitment to delivering value for customers allows them to maintain profitability while providing reliable and affordable vehicles.
Supplier Relationships: Toyota maintains long-term relationships with its suppliers, helping
them improve their own processes and reduce costs. This collaborative approach benefits
both Toyota and its suppliers.
• This example illustrates how a company can uphold economic responsibility by focusing on
profitability, efficiency, and cost reduction while also considering the broader impact on
stakeholders, including employees, suppliers, and the communities in which they operate
• "Technical morality" in business ethics refers to the ethical considerations and responsibilities associated with the development,
deployment, and use of advanced technologies. Here's an example:
• Description: google, a technology company, recognizes the importance of addressing ethical concerns in the development and use of
artificial intelligence (ai), an area with significant implications for society.
• Key actions:
1. Ai principles: google has established a set of ai principles that guide its work in this field. These principles include a commitment to
developing ai that is safe and beneficial, avoids harm, is fair and accountable, and respects privacy and user data.
2. Project maven withdrawal: in response to employee and public concerns, google decided not to renew its contract with the u.S.
Department of defense for project maven, an ai project that involved the use of machine learning in military applications. Google's
decision reflected its commitment to avoiding the development of ai technology for potentially harmful purposes.
1. Responsible AI Research: Google invests in research and development aimed at ensuring that AI technologies are used in
ways that align with ethical values. They actively publish research papers addressing AI ethics, fairness, and accountability.
2. AI for Social Good: Google also promotes the use of AI for social good. They provide funding and resources to projects
that leverage AI to address global challenges, such as healthcare, conservation, and disaster response.
• Impact: Google's approach to technical morality in AI demonstrates the company's commitment to responsible AI
development. By setting ethical principles and making decisions that prioritize societal well-being over short-term profits,
they contribute to the responsible advancement of AI technology. This approach has influenced other tech companies to
consider the ethical implications of their AI research and applications.
• This example showcases how a technology company like Google can proactively address technical morality in business
ethics by establishing guiding principles and making ethical decisions concerning the development and use of advanced
technologies like artificial intelligence.
• Legal responsibility in business ethics pertains to a company's obligation to comply with all relevant laws and regulations governing its
operations. Here's an example:
• Scenario: XYZ Pharmaceuticals is a global pharmaceutical company that develops and manufactures various medications. They take legal
responsibility seriously, and here's how they demonstrate it:
1. Regulatory Compliance: XYZ Pharmaceuticals ensures that all its products and manufacturing processes comply with the regulations set
forth by government agencies such as the U.S. Food and Drug Administration (FDA) and the European Medicines Agency (EMA). They
undergo rigorous testing and quality control processes to ensure that their medications meet safety and efficacy standards.
2. Patent Protection: The company respects intellectual property laws and secures patents for their innovative drugs. They defend their
patents against infringement to protect their intellectual property rights.
3. Ethical Clinical Trials: When conducting clinical trials for new drugs, XYZ Pharmaceuticals follows strict ethical guidelines and informed
consent procedures. They adhere to laws and international standards, such as the Declaration of Helsinki, to ensure the rights and safety
of trial participants.
Data Privacy: XYZ Pharmaceuticals is compliant with data privacy laws, such as the General Data Protection Regulation (GDPR) in
Europe. They protect the personal data of patients, employees, and customers and have stringent cybersecurity measures in place.
Environmental Regulations: In their manufacturing and disposal processes, XYZ Pharmaceuticals adheres to environmental
regulations to minimize their environmental impact. They properly dispose of hazardous waste and work toward sustainable and eco-
friendly practices.
Anti-corruption Measures: The company has a strict anti-corruption policy in place and complies with international laws, such as the
U.S. Foreign Corrupt Practices Act (FCPA), to ensure transparency and integrity in their business dealings.
• Impact: XYZ Pharmaceuticals' commitment to legal responsibility ensures that they operate within the boundaries of the law,
which is essential for maintaining public trust, avoiding legal penalties, and protecting the health and safety of consumers. Their
adherence to ethical and legal standards also contributes to their reputation as a responsible and reliable pharmaceutical
company.
• In this example, legal responsibility is demonstrated by XYZ Pharmaceuticals through their strict adherence to pharmaceutical
regulations, patent protection, ethical clinical trials, data privacy practices, environmental compliance, and anti-corruption
measures, all of which are critical aspects of ethical business conduct in the pharmaceutical industry.
• Personal responsibilities in business ethics refer to the individual obligations and ethical standards that employees and
business professionals should uphold in their roles within an organization. Here's an example:
• Scenario: John works as a project manager for a software development company called TechSolutions. He exemplifies
personal responsibilities in business ethics in the following ways:
1. Honesty and Integrity: John is known for his honesty and integrity. He always provides accurate information to his team
members, superiors, and clients. He never engages in deceptive practices or misrepresentation.
2. Conflict of Interest: John is vigilant about identifying and disclosing any potential conflicts of interest. If he finds himself
in a situation where his personal interests might conflict with the interests of the company or its clients, he promptly
informs his supervisor and takes appropriate steps to mitigate the conflict.
3. Confidentiality: John handles sensitive company and client information with the utmost confidentiality. He does not
share proprietary data or confidential client information with unauthorized individuals, and he follows company policies
and legal requirements related to data protection.
4. Respect and Inclusivity: John treats all team members, clients, and stakeholders with respect and professionalism. He
promotes an inclusive work environment, welcoming diversity and ensuring that everyone's voices are heard and valued.
Professional Development: John takes personal responsibility for his professional development. He actively seeks
opportunities to enhance his skills, stay updated with industry trends, and contribute to his team's success.
Environmental Consciousness: If TechSolutions has sustainability initiatives, John participates actively and
supports environmentally responsible practices within the company, such as reducing waste and conserving
resources.
Compliance: John ensures that his actions and decisions comply with all applicable laws, regulations, and company
policies. He actively seeks clarification or guidance from the legal or compliance department if he encounters any
legal or ethical gray areas.
• Impact: John's personal responsibilities in business ethics contribute to a positive work environment, foster trust
among colleagues and clients, and enhance the reputation of TechSolutions as an ethical and responsible
company. His commitment to ethical conduct not only benefits the organization but also aligns with his personal
values and contributes to his professional growth and success.
• In this example, personal responsibilities in business ethics are demonstrated by an employee, John, who upholds
ethical standards in his interactions, decision-making, and personal development within the organization.
• Official responsibilities in business ethics refer to the obligations and ethical standards that organizations and their leadership have a
duty to uphold. Here's an example:
1. Transparency and Disclosure: ABC Corporation is committed to providing clear and accurate information to its stakeholders, including
shareholders, employees, customers, and the public. They regularly publish financial reports, corporate governance policies, and
other relevant information to ensure transparency.
2. Ethical Leadership: The company's leadership, from the CEO to department heads, exemplifies ethical behavior and sets the tone for
the entire organization. They prioritize integrity, honesty, and fairness in all business dealings.
3. Compliance with Laws and Regulations: ABC Corporation adheres to all applicable laws and regulations in its industry and geographic
locations of operation. They have a dedicated compliance team to ensure that the company operates within legal boundaries.
4. Fair Employment Practices: ABC Corporation maintains a commitment to fair employment practices, including equal opportunity
hiring, diversity and inclusion initiatives, and adherence to labor laws and regulations.
Customer Satisfaction: The company places a high value on customer satisfaction. They prioritize delivering quality products or
services, addressing customer concerns promptly and fairly, and ensuring transparency in pricing and contractual agreements.
Supplier Relations: ABC Corporation maintains ethical relationships with its suppliers. They engage in fair and transparent
procurement practices, avoid exploitative supplier contracts, and uphold ethical sourcing standards.
Environmental Stewardship: The company is dedicated to minimizing its environmental impact. They implement sustainable
practices in their operations, reduce waste, and invest in eco-friendly technologies and initiatives.
Community Engagement: ABC Corporation actively engages with the communities in which it operates. They support charitable
initiatives, volunteer programs, and community development projects to give back and foster positive relationships.
• Impact: By fulfilling these official responsibilities in business ethics, ABC Corporation not only ensures its own ethical reputation
but also contributes positively to society. Their commitment to transparency, ethical leadership, legal compliance, fair
employment, customer satisfaction, responsible supplier relationships, environmental sustainability, and community engagement
helps them maintain trust among stakeholders and promotes long-term success in their industry.
• This example illustrates how a company can fulfill its official responsibilities in business ethics by embedding ethical principles into
its organizational culture and operations, benefiting both the organization and the broader community.
ISSUES ON INTERNET PRIVACY
• Internet privacy is a complex and evolving issue with various concerns that impact individuals,
businesses, and society as a whole. Here are some key issues on internet privacy:
1.Data Collection and Tracking: Companies, websites, and apps often collect vast amounts of
personal data from users, including browsing history, location, and personal preferences. This data is
often used for targeted advertising, but it can also be vulnerable to breaches or misuse.
2.Online Tracking: Persistent tracking technologies like cookies and web beacons allow advertisers
and data brokers to monitor users' online behavior across different websites, potentially leading to
invasive profiling.
3.Data Breaches: High-profile data breaches have exposed sensitive information of millions of users,
including credit card details and personal identification. These breaches can have severe
consequences for individuals and erode trust in online services.
4.Social Media Privacy: Social media platforms have been criticized for their privacy practices,
including the handling of user data and concerns over the misuse of personal information for political
purposes or cyberbullying.
5.Lack of Informed Consent: Users often unknowingly agree to complex terms of service agreements
that grant companies broad rights to collect, use, and share their data. The lack of clear, concise, and
understandable terms makes it difficult for individuals to give informed consent.
6.Government Surveillance: Some governments conduct extensive surveillance on their citizens'
online activities, which raises concerns about privacy, civil liberties, and the potential for abuse of
power.
• Discuss the concept of internet privacy and its
importance in the digital age. Identify and explain
specific threats to online privacy that individuals and
organizations face today.
IoT and Smart Devices: The proliferation of Internet of Things (IoT) devices, such as smart
home appliances and wearables, can create vulnerabilities and privacy risks when these
devices collect and transmit personal data.
Data Minimization: Companies may collect more data than is necessary for their services,
which can increase the risk of data breaches and misuse. The principle of data minimization
suggests that only the minimum required data should be collected and retained.
Algorithmic Bias: Algorithms used for profiling and decision-making can perpetuate bias and
discrimination, leading to unfair outcomes in areas like employment, housing, and lending.
Regulatory Challenges: The legal and regulatory framework for internet privacy varies by
country and is often slow to adapt to technological advancements. This can create challenges
in protecting user privacy on a global scale.
Emerging Technologies: Emerging technologies like facial recognition, biometric data
collection, and artificial intelligence pose new privacy concerns, as they can enable more
invasive surveillance and profiling.
Personal Data Monetization: Individuals often have limited control over how their personal
data is monetized by companies, and they may not receive any compensation for the use of
their data in targeted advertising or other purposes.
• Addressing these internet privacy issues requires a combination of technological solutions,
regulatory frameworks, and individual awareness and empowerment. Users, businesses, and
governments all play a role in safeguarding internet privacy and ensuring that individuals'
rights are protected in the digital age.
• Why is business ethics important?
• Non-compliance with ethics can result in hefty fines and legal actions. Firms are liable
for the illegal activities of their employees. Even if laws can be circumvented,
businesses risk paying a hidden cost—loss of reputation. A small mistake made by
one employee can tarnish the brand image of a large firm.
• Online habits can significantly impact your privacy, and it's essential to be aware of how your actions on the
internet can compromise your personal information and data. Here are some online habits that can have
privacy implications:
1. Weak Passwords: Using easily guessable or commonly used passwords for your online accounts can make it
easier for hackers to gain unauthorized access to your accounts. Strong, unique passwords are essential for
protecting your privacy.
2. Reusing Passwords: Using the same password across multiple online accounts can be risky. If one account is
compromised, it could lead to others being compromised as well.
3. Ignoring Software Updates: Failing to keep your operating system, software applications, and antivirus
programs up to date can leave your devices vulnerable to security threats and exploits.
4. Over-Sharing on Social Media: Sharing personal information such as your full name, address, phone
number, and birthdate on social media can expose you to identity theft and other privacy risks. Additionally,
sharing vacation plans or location updates can signal to potential burglars that your home is vacant.
5. Accepting All Cookies and Permissions: Automatically accepting all cookies and granting permissions to
apps and websites without reviewing their requests for access to your data can result in indiscriminate data
sharing.
6. Ignoring Privacy Settings: Failing to adjust privacy settings on social media and other online platforms can
mean that your information is visible to a broader audience than you intend.
7. Using Public Wi-Fi Insecurely: Connecting to public Wi-Fi networks without using a Virtual Private Network
(VPN) can expose your internet traffic to eavesdropping and hacking attempts.
• Discuss five common online habits that can significantly impact an individual's privacy.
Clicking on Suspicious Links: Clicking on links or downloading attachments from
unknown or suspicious sources can lead to malware infections or phishing attacks aimed
at stealing your personal information.
Not Using Two-Factor Authentication (2FA): Failing to enable 2FA on your accounts
can make them more susceptible to unauthorized access.
Neglecting to Log Out: Leaving your online accounts open and logged in on shared or
public computers can result in unauthorized access to your accounts.
Ignoring Privacy Policies: Not reading or understanding the privacy policies of websites
and apps can lead to unintentional data sharing and a lack of awareness about how your
data is used.
Saving Payment Information: Saving credit card information on websites for
convenience can be risky if the site's security is compromised. It's often better to enter
payment details manually each time.
Not Using Encryption: Failing to use encrypted communication methods (e.g., HTTPS)
when sharing sensitive information online can make it easier for third parties to intercept
and access your data.
• To protect your online privacy, it's essential to develop good cybersecurity habits, stay
informed about the latest threats and privacy settings, and take proactive steps to
secure your digital presence.
Ways to Protect Your Privacy and Security on
the Internet
• Secure Your Web Browser
• Use a Virtual Private Network (VPN)
• Keep Your Software Up-to-Date
• Install an Anti-virus Program & Activate Firewall
• Delete Cookies at Browser Exit
• Adjust Your Settings on Google, Facebook, etc.
• Use HTTPS to Secure Your Online Connection
• Defuse Threats When Backing up to the Cloud
• Secure Online Communications
• share Online Files Securely
1.Secure Your Web Browser:
1. Example: Imagine you're an MBA student researching information for a class project. To secure your web
browser, you can install an ad-blocker extension like "AdBlock Plus" or "uBlock Origin." These extensions
will prevent intrusive ads and potentially harmful scripts from running on the websites you visit.
2.Use a Virtual Private Network (VPN):
1. Example: Suppose you're studying at a coffee shop and need to access your university's online portal to
submit an assignment. By connecting to a trusted VPN service on your laptop or mobile device, you can
encrypt your internet connection, making it safe to log in and submit your assignment even on a public
Wi-Fi network.
3.Keep Your Software Up-to-Date:
1. Example: Imagine you have a finance simulation software for your MBA coursework. Regularly check for
updates and install them promptly when they become available. These updates often contain important
security fixes that protect your financial data from potential breaches.
4.Install an Anti-virus Program & Activate Firewall:
1. Example: Let's say you use a Windows computer for your MBA studies. Install a reputable antivirus
program like "Windows Defender" and activate the built-in firewall. These security measures will help
block viruses and malicious software from infecting your computer and compromising your academic
files.
5.Delete Cookies at Browser Exit:
1. Example: After a research session on a stock trading website, go into your browser settings and enable
the option to delete cookies when you close the browser. This ensures that your browsing history and
personal data aren't stored, preserving your privacy.
6.Adjust Your Settings on Google, Facebook, etc.:
1. Example: Suppose you have a LinkedIn profile to connect with professionals in your field. Review your
privacy settings on LinkedIn and adjust them to limit the visibility of your contact information to only
your connections, helping you maintain a professional online image.
7.Use HTTPS to Secure Your Online Connection:
1. Example: When making an online payment for your MBA textbooks, make sure the
website's URL begins with "https://" and shows a padlock icon in the browser address
bar. This indicates that the connection is secure, protecting your credit card information
during the transaction.
8.Defuse Threats When Backing up to the Cloud:
2. Example: Before uploading your MBA project files to a cloud storage service like Google
Drive, use a strong, unique password and enable two-factor authentication. Additionally,
consider encrypting sensitive project files with a tool like VeraCrypt before uploading
them for an extra layer of security.
9.Secure Online Communications:
3. Example: When discussing a group project with classmates, use a secure messaging app
like Signal, WhatsApp, or Telegram. These apps offer end-to-end encryption, ensuring
that only you and your classmates can read your messages and share project details.
10.Share Online Files Securely:
4. Example: If you need to share a presentation with your MBA group, upload it to a secure
file-sharing service like Dropbox, OneDrive, or Google Drive. Set a password for the
shared link or use the service's built-in sharing permissions to control who can access
the file.
OTHER ISSUES ON INTERNET PRIVACY
• Spying and Snooping
• Information Mishandling
• Location Tracking
Location Tracking
Most of the internet users proudly upload their social media posts highlighting their current location along with tagging
friends and family members. It's fun and exciting to share your life events with friends and family, but this data does not
remain restricted to your expected audience only. This same data is stored on the social media site you are using and stays
there forever, often without you knowing (though you may have given consent through a terms and services agreement).
Along with social media apps, Google Maps and other apps also ask for your location and by turning on your location you
are providing first-hand information to the world about where exactly you are and what your next move is, which is
certainly risky and insecure
Use a VPN
• There are various ways of protecting your online privacy, but the most
successful and certain way is through VPN. It is a tool that provides an
encrypted tunnel for all your online activities, which means it encodes all the
information transferred between you and your host site and leaves no chances
of snooping and spying. It also provides you an anonymous IP and disguises
your actual identity, hiding your geographical location and making your online
existence more safe and secure.
• There are various VPN available including free and paid ones Some VPN work on
a small scale and have access to a few countries only while others are
international ones with access to most parts of the world.
Use Anti-Virus
• A strong anti-virus program will keep your device free from all types of malware, such as
spyware, viruses, Trojans, etc. You can also use a good anti-virus that will keep you updated if it
found something wrong in your system. Using anti-virus is essential as it helps you to get real
time updates.
• Hire a good lawyer or legal team to clarify exactly which rights you have and how
best to protect them.
• Carefully screen employees and independent contractors and have them sign non-
disclosure agreements before working with you.
• Store and work with your data on secure devices and follow all best practices for
data security.
HOW TO PROTECT SOFTWARE IP WITH LICENSING MANAGEMENT
• Licensing management systems help protect intellectual property of software by issuing licenses to users
that allow them to use the software only in an authorized manner. Each license helps control the use of the
software so every use complies with the contract. A comprehensive licensing management system also
allows the vendor to track how the licenses that have been purchased by each client are being used.
• There are multiple models of licensing management that may be used for different types of software. The
right strategy for how to protect software IP varies from company to company and from software to
software, and may even involve multiple models for the same program.
• In essence, license keys are a kind of code that enables the program to work according to the software
intellectual property agreement. That code can be accessed using a physical electronic device — a dongle or
USB key — or via software installed or downloaded to the device.
MODELS OF SOFTWARE LICENSE INTELLECTUAL
PROPERTY PROTECTION
This type of license application requires the user to plug a physical electronic device into the
computer on which they intend to use the software. The code for the license is programmed
into the hardware key and enables the device to access the software. The main advantage of
this type of license is that it is very secure and doesn’t require reliance on the cloud or
Internet access to activate the license. The main disadvantage is that it’s relatively rigid and
non-customizable, and transferring the license requires the transfer of a physical object.
• This type of license is similar to the former, except that the code to activate the software is
delivered via software that is installed or downloaded to a specific device. The advantage is
that no physical object is required, but the disadvantage is that the license only applies to a
single computer or device, so it can’t be transferred.
• Floating, network, or concurrent licenses
• This type of license is also a code that is installed or downloaded to the device, but it
can be shared among users on a network, or otherwise accessed on multiple devices.
This model is an excellent solution if your company is trying to figure out how to protect
intellectual property online. It can be especially cost-effective if a customer needs
multiple users or devices to access the software, but not all at once.
• If for example a company with 100 devices purchases a floating license that gives
access for up to 10 users at once, the user who needs to access it sends a request for
access to a central license server, and the server provides the license based on
availability. When the user is done using the software, the license is “returned” to the
central server and can then be transferred to a different user.
Named user, per-seat, or single-seat licenses
• Mobile tech allows home offices and field reps to interact in real time. For example, field reps can use mobile
apps to record their daily expenses as they incur them and have them sync automatically with accounting
software back at the office.
• Even fundamental business tech can have a major impact on employee performance.
For example, by placing employee-performance appraisal information in an online
framework, supervisors can easily create measurable goals for their employees to
reach and sustain company objectives. Business owners may also choose to expand
operations using technology rather than employees if the technology will provide
better production output.
BROADEN CUSTOMER BASES
• Technology allows small businesses to reach new economic markets. Rather than
just selling consumer goods or services in the local market, small businesses can
reach regional, national and international markets. Retail websites are the most
common way small businesses sell products in several different economic markets
• Websites represent a low-cost option that consumers can access 24/7 when needing
to purchase goods or services. Small business owners can also use internet
advertising to reach new markets and customers through carefully placed web
banners or ads.
COLLABORATION AND OUTSOURCING
• Small business owners may consider outsourcing some operations if they do not have
the proper facilities or available manpower. Outsourcing technology also allows
businesses to outsource function to the least expensive areas possible, including
foreign countries.
M – COMMERCE
• M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as smartphones and tablets.
• Three Main Categories
1. Mobile Shopping
2. Mobile Payments
3. Mobile Banking
List of Important M – Commerce Applications
1. Banking
2. M – Commerce for Retails
3. Mobile Marketing
4. Mobile Ticketing
5. Reservations
6. Entertainment
7. Healthcare
8. Office Commucation
Banking
iMobile is an application that was developed by ICICI Bank that allows users to complete
all internet banking transactions through their mobile phone. Users can transfer money
from bank accounts that are ICICI and those that are not and can also request a stop to
checks, pay bills, and more. This is a very useful app that allows users to use completely
all their mobile banking needs in one easy to access space.
• 4. Mobile Ticketing
• Another great application is to purchase tickets with the help of mobile devices. Airlines have mobile ticket movie
theaters, concerts and more all offer mobile purchase of tickets. You can also then show your electronic ticket to the
event or the place where the ticket is to be redeemed, working to eliminate paper tickets altogether.
5. Reservations
• Reservations are a fantastic use of M-commerce. This could mean hotel rooms,
parking spots, restaurant reservations and more. Customers can now reserve their
spot with their mobile phone which is easier for everyone involved. This means that
both the customer and the company involved can help to reduce the amount of
work and effort that is needed to book various reservations.
6. Entertainment
• You can also use M-commerce in terms of mobile entertainment as well. From
applications that show movies and television shows, to those that show videos like
YouTube, even music applications, you can use your phone for all sorts of mobile
entertainment. Mobile entertainment is one of the best uses for M-commerce and
for your mobile phone in terms of using it for something other than making calls.
7. Healthcare
A mobile phone can be used for accessing health records, for paying medical bills, for accessing the
medical records of patients and more. In a healthcare setting a mobile phone can be used by a doctor or
a practitioner to access the health record of a patient, to send in a prescription, or to make clinical
decisions. It helps doctors and other healthcare professionals to remain connected to the main database
of the hospital or the medical facility and helps doctors and healthcare professionals provide patients with
a better experience overall.
8. Office Communication
M-commerce applications can also help to promote communication within offices and other areas where
you may be working with a team. With those professionals that are in the field such as a real estate agent
or an insurance agent, it is often necessary to get back in touch with the office or to access information
that might be back at the office. M-commerce is going to allow these professionals to track inventory, to
talk to personnel that is in the field and back and the office, and to make sure that salesmen that are in
the field, for example, get approval to make sales without having to wait as long.
M-Commerce vs. E-Commerce
• Electronic commerce refers to the buying and selling of goods and services
over the internet. E-commerce may be conducted via a desktop computer,
laptop, smartphone, or tablet. However, e-commerce is typically
associated with a computer in which a user has to find a location with an
internet connection.
• If we think about the fact that more internet usage currently comes from
mobile than from desktop, a clear picture of the future of online/digital
commerce can be understood.
• The portability of mobile devices helps businesses extend their reach to their customers through mobile
commerce. Coupons and discounts can be sent from retailers to customers. Personalized shopping
experiences can also connect the retailer with their client.
• M-commerce apps allow for location tracking via GPS to offer their customers help finding items in their
store.
• Security can also be enhanced using m-commerce apps since multi-factor authentication can be done,
including biometrics such as fingerprints and retina scans.
HEALTH AND SOCIAL ISSUES - ERGONOMICS
Ergonomics, or "human factors", is the science of designing equipment, the workplace and
even the job to fit the worker.It covers a broad spectrum of factors that make up the fit
between humans and work
2. Cognitive Ergonomics: Cognitive ergonomics focuses on mental processes, such as perception, memory, decision-
making, and problem-solving. It aims to design interfaces, displays, and systems that are intuitive, easy to understand,
and support efficient cognitive functioning. User-friendly software interfaces and cockpit displays in aircraft are
examples of cognitive ergonomics in action.
3. Organizational Ergonomics: Organizational ergonomics, also known as macroergonomics, examines the broader
organizational and sociotechnical systems within which work is performed. It involves optimizing factors like work
processes, team dynamics, job design, and communication to enhance overall productivity, safety, and employee well-
being.
Environmental Ergonomics: This type of ergonomics focuses on the impact of the physical environment on
human performance and comfort. It encompasses factors such as lighting, noise, temperature, humidity,
and air quality. Designing an office with appropriate lighting levels or optimizing the thermal environment
in a manufacturing facility are examples of environmental ergonomics.
Human Factors Engineering: Human factors engineering is often used interchangeably with ergonomics
and encompasses the various branches. It involves the application of principles from cognitive and physical
ergonomics to the design and evaluation of products, systems, and environments to ensure they are safe,
efficient, and user-friendly.
Usability Engineering: Usability engineering is closely related to cognitive ergonomics and focuses on the
usability of products and systems, particularly in the context of user interfaces and user experience (UX)
design. It aims to create interfaces that are intuitive, easy to navigate, and meet users' needs and
preferences.
Safety Ergonomics: Safety ergonomics concentrates on reducing the risk of accidents, injuries, and human error in
various settings. It involves designing safety-critical systems, such as control panels in industrial processes or safety
protocols in healthcare, to minimize the likelihood of adverse events.
Occupational Ergonomics: Occupational ergonomics combines elements of physical ergonomics and organizational
ergonomics to address issues related to the workplace, job design, and the well-being of workers. It often includes the
design of workstations, tools, and processes to enhance productivity and minimize health-related problems.
Agricultural Ergonomics: Agricultural ergonomics focuses on improving the safety and efficiency of farming and
agricultural operations. It involves designing ergonomic equipment and tools for tasks like planting, harvesting, and
livestock handling.
Transportation Ergonomics: Transportation ergonomics deals with the design of vehicles, controls, and interfaces to
ensure safe and comfortable transportation experiences. Examples include the design of car seats, aircraft cockpit
layouts, and train control systems.
1.Physical Ergonomics: Using a chair with an adjustable height to match your desk, allowing you
to maintain a proper sitting posture and reduce back strain.
2.Cognitive Ergonomics: Organizing your smartphone apps into folders by category (e.g., social
media, productivity) to make it easier to find and access the apps you need without cognitive
overload.
3.Organizational Ergonomics: Implementing a clear system for task delegation and
communication within a small team to improve workflow and reduce confusion about
responsibilities.
4.Environmental Ergonomics: Adjusting the lighting in your workspace to reduce glare on your
computer screen, thereby improving visibility and reducing eye strain.
5.Human Factors Engineering: Designing a car dashboard with easily accessible and intuitive
controls, such as large buttons for the radio and air conditioning, to minimize distractions while
driving.
6.Usability Engineering: Simplifying a website's navigation menu by using clear labels like
"Home," "About," and "Contact" to make it easy for users to find information quickly.
7.Safety Ergonomics: Placing non-slip mats in the bathtub to prevent slips and falls, promoting
safety in the bathroom.
8.Occupational Ergonomics: Providing employees with adjustable office chairs and ergonomic
keyboards to reduce the risk of discomfort and repetitive strain injuries in an office environment.
9.Agricultural Ergonomics: Designing a hoe with an ergonomic handle that fits comfortably in a
farmer's hand, reducing strain during long hours of use in the field.
10.Transportation Ergonomics: Installing an adjustable driver's seat in a car, allowing the driver to
find the most comfortable and safe driving position.
ASPECTS OF ERGONOMICS
One of the main goals of ergonomics is to enhance motivation and satisfaction among workers by creating
conditions that match their expectations, values, and goals. Motivation and satisfaction are influenced by
factors such as autonomy, feedback, recognition, variety, challenge, and support. When workers feel
motivated and satisfied, they are more likely to perform well, stay engaged, and cope with stress. Ergonomics
can help foster motivation and satisfaction by designing work that allows workers to have some control over
their tasks, receive timely and constructive feedback, and be recognized for their achievements.
Another important aspect of ergonomics is to reduce stress and promote well-being among workers. Stress
can have negative effects on workers' health, mood, cognition, and behavior. Ergonomics can help prevent and
manage stress by designing work that balances the demands and resources of workers, provides adequate rest
and recovery periods, and reduces environmental disturbances.
• Learning and performance
• A third aspect of ergonomics is to facilitate learning and performance among workers by optimizing the fit between
their skills, knowledge, and abilities. Learning and performance are influenced by factors such as attention, memory,
decision-making, problem solving, creativity, and adaptation. When workers learn and perform well, they are more
likely to achieve their goals, improve their competence, and increase their confidence. Ergonomics can help enhance
learning and performance by designing work that captures and maintains attention, supports memory and
information processing, and aids decision-making and problem solving.
• A fourth aspect of ergonomics is to improve communication and collaboration among workers by ensuring the
quality, clarity, and accessibility of information. Communication and collaboration are influenced by factors such as
language, culture, personality, and conflict resolution. When workers communicate and collaborate effectively, they
are more likely to share ideas, knowledge, and resources. Ergonomics can help foster communication and
collaboration by designing work that uses clear and consistent language, provides multiple channels and modes of
communication, and enables feedback and dialogue.
• Participation and empowerment
• A fifth aspect of ergonomics is to increase participation and empowerment among workers by involving them in the design,
implementation, and evaluation of their work. Participation and empowerment are influenced by factors such as involvement,
influence, ownership, responsibility, and accountability. When workers participate and feel empowered, they are more likely to
express their opinions, contribute to the improvement of their work, and take initiative and action. Ergonomics can help support
participation and empowerment by designing work that solicits and incorporates workers' input and feedback, provides
opportunities for choice and influence, and acknowledges and rewards workers' contributions.
• A sixth aspect of ergonomics is to respect and enhance identity and culture among workers by recognizing and valuing their
individual and collective characteristics. Identity and culture are influenced by factors such as personal history, background,
values, norms, traditions, and symbols. When workers identify and feel connected to their work, they are more likely to develop a
positive self-image, a sense of purpose and meaning, and a shared vision and mission. Ergonomics can help nurture identity and
culture by designing work that reflects and respects workers' individuality and diversity, supports their personal growth and
quality of work. Discomfort and fatigue can make it challenging to maintain the necessary level of focus and accuracy.
Increased Healthcare Costs: Employers may face higher healthcare costs due to employees seeking medical treatment
for ergonomics-related health issues. These costs can include doctor's visits, physical therapy, and even surgeries in severe
cases.
High Turnover: Employees experiencing discomfort or pain due to poor ergonomics may choose to leave their jobs in
search of more comfortable and healthier work environments. This turnover can be costly for employers in terms of
Reduced Employee Morale: Working in an uncomfortable or unsafe environment can negatively affect employee morale.
Employees who feel that their employer is not taking their well-being seriously may become disengaged or demotivated.
Legal and Compliance Issues: Employers who fail to address ergonomic issues adequately may face legal and regulatory
compliance issues. Governments and labor agencies often have guidelines and regulations in place to ensure safe and
ergonomic workplaces.
Health and Social Issues – Cyber terrorism
2.Mental Health Impact: Cyberterrorism can create a sense of insecurity and fear
among the general population. The constant threat of cyberattacks can contribute
to anxiety and stress, affecting individuals' mental health.
3.Data Breaches: Cyberattacks often result in data breaches, which can expose
sensitive personal and medical information. This can lead to identity theft, financial
loss, and emotional distress for individuals whose data is compromised.
National Security Concerns: Cyberterrorism can pose a significant threat to national
security. Attacks on military and defense systems can compromise a nation's ability to
defend itself, potentially leading to conflict and geopolitical instability.
Erosion of Trust: Repeated cyberattacks can erode trust in digital systems and
government institutions. People may lose faith in the ability of organizations and
governments to protect their data and critical infrastructure.
Privacy Concerns: The increased surveillance and monitoring that often follow
cyberterrorism threats can raise privacy concerns. Citizens may feel that their personal
data and communications are being excessively monitored in the name of security.
• Guilt and Shame:Cybercrimes are often faceless crimes. However, victims might not report
cybercrimes, such as phishing attacks and email malware. They might blame themselves for
reasons such as weak cybersecurity.
• Feeling of helplessness : The feelings of helplessness might cause the victim to become isolated.
They might even decide to quit social media or go offline altogether to avoid more digital crimes.
• Eating Disorder : a person might turn to binge eating as a way to cope with online fraud.
“Emotional eating” is a way that people suppress negative emotions
• Cybercrimes can also cause insomnia as victims toss and turn worrying about stolen data or
financial situations. Various life situations, such as money problems, can cause stress-triggered
sleep disorders
Thank you