AEC-31-IT-Report (Group 4 IT ETHICS)
AEC-31-IT-Report (Group 4 IT ETHICS)
AEC-31-IT-Report (Group 4 IT ETHICS)
Contratista, Wendellin
Ibale, Charissa
Pacamalan, Josini
Organizations implement codes of ethics in their policies that highlight the ethical
responsibilities of users in the use of information technology. These are:
· Ensure that information technology resources are used only for authorized purposes.
· Prevent sharing of access privileges, such as passwords, among users. This secures
computer systems from malicious attacks.
· Promotes respect in the use of information technology. This is because they prevent
users from denying others access to computer networks.
· Prevent users from introducing malicious software, such as viruses, to computer systems.
· Prevent conflict of interest in the use of technology and demonstrate competence and
quality of service.
1. Privacy
Most people have their personal data spread throughout the digital world. Even
things thought to be secure, such as email or private accounts, can be accessed by
unintended sources. Most employers actively check their employees’ computer habits.
Privacy has evolving legal implications, but there are also ethical considerations.
Privacy concerns can easily become a slippery slope, slowly eroding an individual’s
right to privacy completely.
2. Digital Ownership
Digital mediums have allowed information to flow more freely than before. This
exchange of ideas comes with a legal and ethical backlash. Things can be easily copied
and pasted online, which makes intellectual property hard to control. Legal notions such
as copyright have struggled to keep up with the digital era. Companies in the music and
entertainment industries have pushed for greater legal protections for intellectual
properties while other activists have sought to provide greater freedoms for the
exchange of ideas in the digital realm.
3. Data Gathering
On some level, everyone knows that their online lives are monitored. The United
States has even passed legislation allowing the government to actively monitor private
citizens in the name of national security. These measures have revived a debate about
what information can be gathered and why. This debate applies on a smaller scale as
well because companies need to consider what information to collect from their
employees. This issue invokes a question of consent. Do people know what information
is being monitored? Do they have a right to know how their data is being used?
Phishing - a fraudulent attempt, usually made through email, to steal your personal
information. It is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as personally identifiable information,
banking and credit card details, and passwords.
4. Security Liability
In the past, security issues were resolved by locking a door. Digital security is
much more complicated. Security systems for digital networks are computerized in
order to protect vital information and important assets. However, this increased security
comes with increased surveillance. All security systems have inherent risks, which
means it is a question of what risks are acceptable and what freedoms can be forfeited.
5. Access Costs
Net neutrality has become a trendy issue thanks to legislative efforts in the last
few years. The issue of net neutrality is essentially a question of access. Proponents
want the Internet to remain open to everyone while some businesses want to create
tiered access for those who are willing to pay. The issue even extends to private
Internet usage since the cost of service in some areas may be cost prohibitive. The
larger ethical question is whether or not digital exchange is now a universal right. The
cost of access can impede business growth, entrepreneurial spirit and individual
expression.
1. Data Governance
In any industry or company, the success of business depends on having the right
information at the right time at the right place to take informative decision. So as to
provide the right information, there is a need to have the right data about the
subject/customer.
Once this data is captured, IT department of a company is responsible for the security
of the data as well as the availability of the data to the people on a need to know basis.
The IT department also ensures that the data is secured and not shared nor sold to any
third party. Once this trust is gained in the society, then there will be more and more
people from the different parts of the society becoming part of this IT revolution.
For example, in companies like Intel and Infosys, a lot of emphasis and training is given
to the IT personnel on ethics related to the importance of data and its value.
2. Copyright Violation
Copyright law has been developed to establish exclusive rights for a copyright
holder. The copyright holder has the right to determine how their work may be used i.e.,
make copies, make different versions of the work or perform certain works in public and
decide whether they will grant the right to copy or use the material.. The company
should strictly give guidelines not to download any software, songs unless it is an open
source and do not copy copyrighted software without the author’s permission. The
company does a full scan of the computer from time to time to make sure that there is
no illegal software as well as there is no copyright violation.
3.Usage of Computer
The unauthorized and improper use of computer and their resources should be
prohibited. Using office computer and visiting sites which are related to violence,
pornography, abuse or getting emails related to any of the above topics is a serious
violation. This will decreases the productivity of the employee which in turn decreases
productivity of the company and that affects the society.
4. Sniffing
Using explicit information from other companies for personal gains is a serious
company policy violation and there could be legal consequences. Many companies use
‘Non-disclosure agreements’ to reduce the risk for company explicit information
.company should train and alert their employees in best possible ways on the ethical
scenarios of using ‘company exclusive information for personal gain’ and the
consequences for the same so that employees are completely aware .
6. Spam Emails
The unethical approach to programming and incorrect testing will have a severe
impact on the society – for example issues related to car programs not written and
tested correctly could be a life and death issue. Publishing of information without
checking the authenticity in media (social as well as digital) will affect the society in a
negative way.
9. Transparency
Starbuck is one of the companies that achieved CSR milestones such as their 99
percent ethically sourced coffee, creating global networks of farmers, pioneering green
building, and contributing community service.
SM Supermalls is one of the company that starts to adopt green initiatives and
committed to reduce greenhouse emissions and maximize energy efficiency. They
install solar panels at their stores like the SM City North Edsa which is the first ,all in the
Philippines to become solar powered.
4.)Factors affecting access to and acceptance of technology
1. Age
2. Culture
-Language barriers may restrict participation in community events. Some cultures may
view certain technologies as unnecessary or untraditional.
3. Education
-Students in remote regions can access information and research immediately as well
as communicate with far away teachers
-Individuals who have been poorly educated and denied technology may fear
technology.
4. Economic Status
-newest technology is of low priority for those with low Socioeconomic status
5. Disability
6. Geographical location
Those in remote locations may find it more difficult to access certain facilities,
technologies and services.
7. Gender
8. Religion
References:
https://year12cafstechnology.wordpress.com/technology-and-well-being/factors-
affecting-access-to-and-acceptance-of-technology/