Chapter 11&12 - Chapter 11 Security and Ethical...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11 Security and Ethical Challenges 1. What is the Ethical responsibility of business professionals? As a business professional, you have a responsibility to promote ethical use of information technology in the workplace. That includes properly performing your role as a vital human resource in the business systems. As a manager or business professional, it will be your responsibility to make decisions about business activities and the use of information technologies that may have an ethical dimension that must considered. 2. What are the three theories of ethical decision making? h Stockholder Theory: Managers are agents of stockholders. Their ethical responsibility is to increase profits without violating laws or engaging in fraud. h Social Contract Theory: Companies have an ethical responsibility to all members of society h Stakeholder Theory: Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders 3. What are the Principles of Technology Ethics? h Proportionality: that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. h Informed Consent: Those affected by technology should understand and accept the risks. h Justice: Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk. h Minimized Risk; even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. 4. ATTP Standards: please study Figure 11.5. I will give you one question of this. Example Question: All of the following are AITP standards of professional conduct related to a person's obligation to his employer except : A. Protect the privacy and confidentiality of all information entrusted to me. B. Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts. C. Never misrepresent or withhold information that is germane to a problem or a situation of public concern. D. Never exploit the weakness of a computer system for personal gain or personal satisfaction. 5. Computer Crimes h Unauthorized use, access, modification, or destruction of hardware, software, data, or network resources h The unauthorized release of information h The unauthorized copying of software h Denying an end user access to his/her own hardware, software, data, or network resources h Using or conspiring to use computer or network resources illegally to obtain information or tangible property
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6. Several terms or definitions h Hacking: The obsessive use of computers or unauthorized access/use of networked computers. h
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/14/2011 for the course ACCT 101 taught by Professor Ggfthyu during the Spring '11 term at University of Central Punjab.

Page1 / 7

Chapter 11&12 - Chapter 11 Security and Ethical...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online