chap1-security ethic
TRANSCRIPT
-
7/30/2019 Chap1-Security Ethic
1/18
SECURITY & ETHIC
CHAPTER 1
CFB2003
Computer Ethics & Cyber LawsBy Mr. Hanizan Shaker Hussain
-
7/30/2019 Chap1-Security Ethic
2/18
Security and EthicsEmployment
Health
Individuality
Privacy
WorkingConditions
CrimeBusiness/IT
SecurityEthics and
Society
-
7/30/2019 Chap1-Security Ethic
3/18
Professional Environment:Deals with codes of conduct, professionalexpectation
Question:
Can we influence individuals conduct bymaking them aware of theirprofessional/environment codes?
-
7/30/2019 Chap1-Security Ethic
4/18
Professional Codes: General codes:
UB code MIS related codes:
ACMhttp://www.acm.org/constitution/bylaw17.html
IEEE
http://www.ieee.org/committee/ethics/
AITPhttp://www.aitp.org/
-
7/30/2019 Chap1-Security Ethic
5/18
Ethical Guidelines
-
7/30/2019 Chap1-Security Ethic
6/18
James Rachels, moralist,
suggest two criteria:1. Reason..
Decision based on REASONS acceptable
to other RATIONAL persons.
2. Impartiality..
Decision is impartial when INTERESTSof all those affected by it are taken intoaccount
-
7/30/2019 Chap1-Security Ethic
7/18
State of Ethics in
Corporate World Enron
The Enronscandal was a corporate scandal involving the American energy company EnronCorporation based in Houston,Texas. Enron undoubtedly is the biggest audit failure.
Merck --draws VIOXXMerck says it will fund the $4.85 billion settlement designed to resolve tens of thousands of lawsuits related to its Vioxxpainkiller, waiving its right to walk away from the settlement deal. Payments to claimants will begin to be made before theend of August. Nearly 60,000 people have registered a claim that the once-popular painkiller caused a heart attack orstroke.
AIG, Marsh & McLennan - Insurance fraudThe America's biggest insurers are mired in a brewing scandal that many executives fear could shake the industry to itscore. Marsh & McLennan accused of price fixing (alleged conflicts of interest).
Options back datingOptions backdating is the practice of granting an employee stock option that is dated prior to the date that the companyactually granted the option. This practice raises a number of legal and accounting issues. The practice of backdating itself isnot illegal, nor is granting of discounted stock options. What is illegal is the improper disclosures, both in financial recordsand in filings with the United States Securities and Exchange Commission (SEC).
etc
-
7/30/2019 Chap1-Security Ethic
8/18
Legal and Ethical IssuesLEGAL ILLEGAL
ETHICAL I II
UNETHICAL III IV
I WORK WITHIN ETHICS AND LAW..
II INTRODUCE A TESTED BUT UNFINISHED DRUG IN 3RD WORLD
WHICH IS TIME SENSITIVE and MAY BENEFIT MASSES
III INTRODUCE AN APPROVED BUT HARMFUL DRUG..IV GIVE BRIBES TO GET CONTRACTS..
By : Haag & Cummins
-
7/30/2019 Chap1-Security Ethic
9/18
Ethical Responsibility
Business Ethics
Stockholder Theory Social Contract Theory
Stakeholder Theory
-
7/30/2019 Chap1-Security Ethic
10/18
Ethical Responsibility
-
7/30/2019 Chap1-Security Ethic
11/18
Technology Ethics
-
7/30/2019 Chap1-Security Ethic
12/18
Ten Commandments Of Computer
EthicsCreated by the Computer Ethics Institute
Thou Shalt Not Use A Computer To Harm Other People. Thou Shalt Not Interfere With Other Peoples Computer Work.
Thou Shalt Not SnoopAround In Other Peoples Computer Files. Thou Shalt Not Use A Computer To Steal. Thou Shalt Not Use A Computer To Bear False Witness. Thou Shalt Not Copy Or Use Proprietary Software For Which You have
Not Paid. Thou Shalt Not Use Other Peoples Computer Resources Without
Authorization Or Proper Compensation. Thou Shalt Not Appropriate Other Peoples Intellectual Output. Thou Shalt Think About The Social Consequences Of The Program You
Are Writing Or The System You Are Designing. Thou Shalt Always Use A Computer In Ways That Insure Consideration
And Respect For Your Fellow Humans.
-
7/30/2019 Chap1-Security Ethic
13/18
Right to Privacy
Computer Profiling Computer Matching Privacy Laws Computer Libel and Censorship Spamming
Privacy Issues
-
7/30/2019 Chap1-Security Ethic
14/18
Other Challenges
Employment Challenges Working Conditions
Individuality Issues
Health Issues
Privacy Issues
-
7/30/2019 Chap1-Security Ethic
15/18
Ergonomics
DESIGN HEALTHY WORK ENVIRONMENTwhich is:
Safe
Comfortable
Pleasant
-
7/30/2019 Chap1-Security Ethic
16/18
Ergonomics
Privacy Issues
-
7/30/2019 Chap1-Security Ethic
17/18
Antivirus96%
Virtual Private Networks
86%Intrusion-Detection Systems
85%
Content Filtering/Monitoring77%
Public-Key Infrastructure45%
Smart Cards43%
Biometrics19%
Security Technology Used
Security Management
-
7/30/2019 Chap1-Security Ethic
18/18
Computer Crime
Hacking Cyber Theft Unauthorized Use of Work
Piracy of Intellectual Property Computer Viruses and Worms
Security Management