w3_1_Ethics Security_Sp12

w3_1_Ethics Security_Sp12 - Ethics Privacy and Information...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethics, Privacy, and Information Security 1 Agenda 1. Notes: HW2; Lab/HW grading re. extra credits 2. Review: (1) Porter’s five forces? Examples? Purpose? 3. Review: (2) Role of ICT for competitive advantage? organizations and society? 4. ICT and ethics; and privacy IE 332 1.23.12
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
NASA Loses Secret Information for Years Millions of zappos.com customers lost private information USA reconnaissance drone lost in Iran 2
Background image of page 2
NASA Losses Kept Secret What are the two overarching problems? How did the government officials initially respond to these incidents? Federal Information Security Management Act of 2002 ( FISMA ) 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
3.1 Ethical Issues Ethics Code of Ethics See more in Automation and Ethics , Chapter 47, Springer Handbook of Automation (2009), pp. 809-833 available as e-book on Purdue Libraries 4
Background image of page 4
Fundamental Tenets of Ethics Responsibility Accountability Liability 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unethical vs. Illegal What is unethical is not necessarily illegal 14 Ethics scenarios http://bcs.wiley.com/he- 6368&resourceId=8968 6
Background image of page 6
The Four Categories of Ethical Issues Privacy Issues Accuracy Issues Property Issues Accessibility Issues 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How much privacy do we have left? 8
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/22/2012 for the course IE 332 taught by Professor Staff during the Spring '08 term at Purdue.

Page1 / 20

w3_1_Ethics Security_Sp12 - Ethics Privacy and Information...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online