You are on page 1of 4

Pamantasan ng Lungsod ng Maynila

(University of the City of Manila) Intramuros, Manila

Ethical Issues In Information System

Submitted to: Prof. Melissa Alicando Submitted by: Group 7 Isiah Jeremiah Torres Marielle M. Ricafort Edmond Mauricio Jose Angelito Seguban 3rd Year BSCS-IT Block 2

Reporting Format: The report will be done in a video format. Video length is preferably around 20-25 minutes. Video format can either be .avi or .mpg. (We will be using a projector, preferably an overhead projector) Report Content: Our report will tackle the different ethical and moral issues concerning information technology (information ethics). Privacy and confidentiality, freedom and censorship, security, and computer-related crimes are to be discussed in the report. ---------------------------------------------------------------------------------------------------------------Privacy and Confidentiality All web communications are subject to "eavesdropping". Browsers record your activities in history files. Cookies deposited by web sites collect information about you and your browsing. EG many online e-commerce sites use cookies to track buying habits. When these cookies are collected into a database, they may reveal identities of individuals. Some companies sell these databases.
Protecting Privacy

Privacy - the right to be left alone and to be free of unreasonable personal intrusions. Two rules have been followed fairly closely in past court decision in many countries: the right of privacy is not absolutes; privacy must be balanced against the needs of society. And the publics right to know is superior to the individuals right of privacy. Information on Internet Bulletin Boards and Newsgroups - electronic discussions such as chat rooms and these other sites appear on the Internet, within corporate intranets, and on blogs. A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. Freedom and Censorship of Speech People have to respect Copyright laws, and many of these laws are being violated, resulting in other laws being enforced banning people from downloading things like music off the Internet. It is good for musicians who don't want their music stolen, but bad for musicians who want their

music to be downloaded so they can become popular. There are also people who warp what other people say, or criticise it. This isn't fair because the Internet is open to anyone to say whatever they want.
Intellectual property -property created by individuals or corporations

who are protected under trade secret, patent, and copyright laws.

Copyright - statutory grant that provides creators of intellectual

property with ownership of the property for life of the creator plus 70 years. Piracy - copying a software program without making payment to the owner. Security It is becoming increasingly easy to hack into people's computers and websites. This needs to be stopped because hacking into someones computer is the equivalent to breaking into someones house - it shouldn't happen. Threats
Espionage or Trespass - the act of gaining access to the information

an organization is trying to protect by an unauthorized individual. Industrial espionage occurs in areas where researching information about the competition goes beyond the legal limits.

Computer Crimes and Computer Related Crimes - like Security, more and more people are hacking into computers and programmes. A lot more crimes are being committed over and because of the Internet also. For example people can hack into bank accounts and steal money, or manipulate systems to cause destruction. A man in Australia hacked into a sewerage system and released millions of litres of raw waste into rivers and parks.
Sabotage or Vandalism - A popular type of online vandalism is

hacktivist or cyberactivist activities. Hacktivist or cyberactivist use technology for high-tech civil disobedience to protest operations, policies, or actions of an individual, an organization, or a government agency.

Cyberterrorism Cyberwar Identity Theft Malicious Insiders

Source:

http://wiki.answers.com/Q/Describe_all_major_ethical_issues_related_to_i nformation_technology_and_identify_situations_in_which_they_occur http://www.mscd.edu/~cis2010/pdf/ch03.pdf

You might also like