1 / 14

Morals and Ethics in IT

Morals and Ethics in IT. Or… being a decent person. Morals and Ethics. It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere in the world – and can cause serious harm.

efia
Download Presentation

Morals and Ethics in IT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Morals and Ethics in IT Or… being a decent person

  2. Morals and Ethics • It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere in the world – and can cause serious harm. • As IT professionals, you will be able to study the examples here, and produce a publicity item showing people how to behave ethically and morally using IT – and you’ll be able to be sure you’re doing that yourself, too…

  3. Morals and Ethics • Exactly what you produce is pretty much up to you – it could be another presentation, or an information leaflet. As long as it is clear enough for you to use for revision, and it covers everything you need in the detail you need, then the medium is your choice. OK? • You need to explain – what each element means, and what can happen when things go wrong – to the customer, the employee, the organisation, the victim, and in the eyes of the law.

  4. Use and abuse of personal and private data • Stuff you type into your phone or tablet or pc goes just where you want it – doesn’t it? • Ah. No. Not always. And while you might think you have no secrets from anyone, well… think again. EVERYONE has some things that other people don’t know. It’s often called minding their own business! So check out the links on the next slide, and put together your guide on what can happen if your data is poached…

  5. Use and abuse of personal and private data • http://ukliberty.wordpress.com/data-abuse/ (a bit of a fiery group this, but their info is useful as long as you’re careful) • http://www.computerworld.com/s/article/9220633/Facebook_API_abuse_can_expose_private_user_data_say_hackers (any Facebook users here?) • http://news.bbc.co.uk/1/hi/uk/8239596.stm (old but useful) • http://www.zdnet.com/blog/london/uk-government-staff-caught-snooping-on-citizen-data/4716 • http://www.zdnet.com/blog/london/queens-speech-unveils-uks-8216patriot-act-web-monitoring-plan/4663?tag=content;siu-container (bothers me, this one…) • And then – recently in the news – cookie control through http://www.aboutcookies.org/ and http://www.bbc.co.uk/webwise/guides/about-cookies and http://www.allaboutcookies.org/cookies/ • And any search for ‘keylogger’ is just too darn scary: look how easy it is to get this software! Check what it does!

  6. And there’s more… • Electronic surveillance goes further than keylogging: • http://humanresources.about.com/od/technology/a/surveillance.htm • http://www.adt.co.uk/retail/retail-electronic-article-surveillance-solutions • Lastly – tracking your cell/mobile phone… • http://www.ehow.com/how_2385973_triangulate-cell-phone.html • http://news.bbc.co.uk/1/hi/technology/4738219.stm • http://www.mobilelocators.com/how.php • http://planetcreation.co.uk/sat-gps/

  7. PAUSE! Add your info into your work – a leaflet/presentation/audio recording?

  8. cyberbullying • Hopefully you know not to text, email or comment in ways that are just too pathetic to copy here. Hopefully you’re not one of those… well, what do you call them? There’s a current Net trend of ‘trolling’ (more on the next slide) which is pretty disgusting too. • Use the resources on the next slide to help you guide people on how to avoid being a victim, and what to do if they are bullied in this fashion…

  9. cyberbullying • http://stopcyberbullying.org/ • http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bullying/DG_070501 • http://www.cyberbullying.info/ (an interactive resource that I think is pretty good – what do you think?) • http://old.digizen.org/cyberbullying/default.aspx • http://www.cyberbullying.org/ • http://www.ncpc.org/cyberbullying • http://www.childline.org.uk/Explore/Bullying/Pages/CyberBullying.aspx

  10. PAUSE! Add your info into your work – a leaflet/presentation/audio recording?

  11. Worker monitoring • With the increasing use of ICT, employees are increasingly checked on and monitored. • Staff here are checked in and out with their electronic tags, for example. • Ambulance drivers are checked to make sure they don’t stop off at home without asking first • Call centre staff are recorded to check they stick to the script and have no personal calls • Just about every organisation – this school included – has an Acceptable User Policy for the kit which tells you that your Internet use is checked and that there are things you are just not allowed to do. • Check out the sources on the next slide to help you provide your thoughts and advice on dealing with being monitored

  12. Worker monitoring • http://www.employeeprivacyrights.co.uk/monitoring-your-workers.html • http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1074414934&type=RESOURCES • http://www.dailymail.co.uk/sciencetech/article-2153100/Theyre-watching-By-2015-60-employers-monitor-workers-Facebook-pages.html (hmph! Beware of sources like this – but still, they’re worth using – carefully!) • http://www.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm (same with this bunch!)

  13. STOP! Add your info into your work – a leaflet/presentation/audio recording?

  14. Review what you’ve done • So what have you discovered? • What sources did you use that were NOT on the slides? (extra credit for any paper-based resources) • SPELLCHECK and get someone else to proof read it for you, to make sure it all makes sense to someone else… • Then send it in! 

More Related