Lectures 1 78
Lectures 1 78
Chapter # 1
Overview of Ethics
• Law is a system of rules that tells us what we can and cannot do.
Laws are enforced by a set of institutions (the police, courts, law-
making bodies).
• Legal acts are acts that conform to the law. Moral acts conform to
what an individual believes to be the right thing to do.
ETHICS IN THE BUSINESS WORLD
• Utilitarian Approach
• The utilitarian approach to ethical decision making states that you should
choose the action or policy that has the best overall consequences for all
people who are directly or indirectly affected.
• Fairness Approach
• The fairness approach focuses on how fairly actions and policies distribute
benefits and burdens among people affected by the decision. The guiding
principle of this approach is to treat all people the same.
Chapter # 2
• Evaluation benchmark
Common Ethical Issues for IT Users
• Software Piracy
Sometimes IT users are the ones who commit software piracy.
A common violation occurs when employees copy software
from their work computers for use at home.
Chapter # 3
COMPUTER AND INTERNET
CRIME
• Phishing is the act of using e-mail fraudulently to try to get the recipient
to reveal personal data.
Chapter # 4
Privacy
1. Identity Theft
Identity theft occurs when someone steals key pieces of personal
information to impersonate a person. This information may include
such data as name, address, date of birth, Social Security number,
passport number, driver’s license number, and mother’s maiden name.
2. Consumer Profiling
• Companies openly collect personal information about Internet
users when they register at Web sites, complete surveys, fill
out forms, or enter contests online.
• Many companies also obtain information about Web surfers
through the use of cookies, text files that a Web site can
download to visitors’ hard drives so that it can identify visitors
on subsequent visits.
• Companies also use tracking software to allow their Web sites
to analyze browsing habits and deduce personal interests and
preferences.
Contd……
4. Workplace Monitoring
• Many organizations have developed a policy
on the use of IT in the workplace in order to
protect against employee abuses that reduce
worker productivity or expose the employer to
harassment lawsuits.
Contd……
Chapter # 5
Intellectual Property
• Software Patents
• A software patent claims as its invention some
feature or process embodied in instructions executed
by a computer.
• Plagiarism
• Plagiarism is the act of stealing someone’s
ideas or words and passing them off as one’s
own.
• Reverse Engineering
• Reverse engineering is the process of taking
something apart in order to understand it,
build a copy of it, or improve it.
Continued…….
• Competitive Intelligence
• Competitive intelligence is legally obtained
information that is gathered to help a company gain
an advantage over its rivals.
Continued…..
• Cyber squatting
• Cyber-squatters registered domain names for famous
trademarks or company names to which they had no
connection, with the hope that the trademark’s owner would
eventually buy the domain name for a large sum of money.
Chapter # 6
Software Development
• Redundancy
Another key element of safety-critical systems is
redundancy, the provision of multiple interchangeable
components to perform a single function in order to
cope with failures and errors.
• Human Interface
One of the most important and difficult areas of safety-
critical system design is the human interface.
Quality Management Standards