Hall_AIS+7e+SM_Ch03

Hall_AIS+7e+SM_Ch03 - CHAPTER 3 ETHICS, FRAUD, AND INTERNAL...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 3 ETHICS, FRAUD, AND INTERNAL CONTROL REVIEW QUESTIONS
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 3 Page 45 1. Ethics pertain to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong. 2. Business ethics concern the issue of how managers determine what is considered to be right in their business conduct. Further, once this correct business conduct is determined, the issue becomes how it can be achieved. 3. Equity, rights, honesty, and the exercise of corporate power. 4. Conflicts of interest, Full and Fair Disclosures, Legal Compliance, Internal Reporting of Code Violations, Accountability. 5. Proportionality, justice, and minimization of risk. 6. Computer ethics concern the ethical use of hardware, software, computer networks, and databases, as well the societal impacts of these items. 7. The lowest level of computer ethics—pop—merely reflects the exposure to stories and reports regarding the ramifications of computer technology, such as computer viruses (bad ramifications) and educational enhancements for handicapped individuals (good ramifications). The next level—para—requires a little more involvement in learning about computer ethics cases and acquiring some skill and knowledge in ethics issues. The third level—theoretical—involves application of the theories of philosophy, sociology, and psychology to computer science with the hope that new understanding of the field can be achieved.
Background image of page 2
Chapter 3 Page 46 8. Ethical computer issues are considered to be new problems to those groups that feel intellectual property is not the same as physical property. However, other groups believe the same generic principles should apply. No agreement between these groups has been reached yet. 9. Individuals wish to have control over what information is kept about them and to whom this information is disseminated. Databases exist that store such items as merchandise purchases and movie rentals. Businesses oftentimes trade and/or sell the information kept in these databases. The ethical issues regarding the transfer of this information is an ethics question of privacy. 10. The ethical issues regarding computer security center on unauthorized access to systems and databases. Individuals can be harmed by the dissemination of inaccurate information to authorized users, and/or accurate information to unauthorized users. Security can be used to protect systems and personal information, but it can also restrict legitimate access.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 3 Page 47 11. The ethical question regarding ownership is: What can an individual (or organization) own? Ideas? Media? Source code? Object code? A related question is whether or not owners and users should be constrained in their use or access to software. This includes making copies or placing software on a network to permit access by multiple users. Some believe that copyright laws can cause more harm than good. For example, the League for Programming Freedom argues that copyrights for
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 50

Hall_AIS+7e+SM_Ch03 - CHAPTER 3 ETHICS, FRAUD, AND INTERNAL...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online