Solutions To Ethics in IT

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 68

Ethics in Information Technology

-Subeer Nadgonde -PMP

Computer and Internet Crime


Quote: In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, youre linking up to every computer that that computer has ever linked up to. (Dennis Miller, Saturday Night Live)

Sasser Worm
Microsoft posted a $250,000 reward By mid-May, authorities apprehended Sven Jaschan, a German teenager. Jaschan confessed and was convicted after a three-day trial He could receive up to five years in prison, but because he was tried as a minor, the court suspended his 21month sentence, leaving him with only 30 hours of community service Just a few month after Jaschans indictment, the Securepoint, a German IT security company hired him as a programmer
-Subeer Nadgonde -PMP

What is Ethics?
Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the moral code by which a society lives. Ethics is the set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms, many of which are almost universal. Virtues are habits that incline people to do what is acceptable, and vices are habits of unacceptable behavior Peoples virtues and vices help define their value system the complex scheme of moral values by which they live

-Subeer Nadgonde -PMP

Whats the difference between Moral ethics and Law?


Moral: One persons belief about right and wrong Ethics: Standards or code of behavior expected of an Individual by a group Law: It is a system of rules that tell us what we can and what we can not and Law of enforced b y certain institutions

-Subeer Nadgonde -PMP

Professional Codes of Ethics


A professional code of ethics states the principles and core values that are essential to the work of a particular occupational group Association of Computing Machinery ACM (founded 1947) has a code of ethics and professional conduct Association of Information Technology Professionals AITP (founded 1996) provides quality IT-related education, information on relevant IT issues, and forums for networking with experienced peers and other IT professionals. The AITP also has a code of ethics

-Subeer Nadgonde -PMP

What are the Common Ethical Issues for IT Users face?


Software Piracy: a common violation occurs when employees copy software from their work computers for use at home Inappropriate Use of Computing Resources: some employees use their work computers to surf popular Web sites that have nothing to do with their jobs. Half of Fortune 500 companies have dealt with at least one incident related to computer porn in the workplace over the past 12 months, according to a survey released today. Corporations are taking the problem seriously, and fired the offenders in 44% of the cases and disciplined those responsible in 41% of the instances.

-Subeer Nadgonde -PMP

Common Ethical Issues for IT Users. Cont.


Inappropriate Sharing of Information:
Organizations stored vast amount of information that can be classified as private or confidential. Private data describes individual employees for example, salary, attendance, performance rating, health record. Confidential information describes a company and its operations: sales, promotion plans, research and development. Sharing this information with unauthorized party, even inadvertently, has violated someones privacy or created the potential that company information could fall into the hands of competitors.

-Subeer Nadgonde -PMP

What are the practices that support ethical use of IT?


Defining and Limiting the Appropriate Use of IT Resources Companies must develop, communicate and enforce written guidelines that encourage employees to respect corporate IT resources and use them to enhance their job performance. Effective guidelines allow some level of personal use while prohibiting employees from visiting objectionable Web sites or using company e-mail to send offensive or harassing messages.

-Subeer Nadgonde -PMP

Cont.
Establishing Guidelines for Use of Company Software Company IT managers must provide clear rules that govern the use of home computers and associated software. The goal should be to ensure that employees have legal copies of all software Structuring Information Systems to Protect Data and Information Implement system and procedures that limit data access to employees who need it. Employees should be prohibited from accessing the data about research and development results, product formulae, and staffing projections if they dont need it to do their job
-Subeer Nadgonde -PMP

Why ethics is important for any organization?


Gaining the good will of the community Creating Organization that operates on consistency Fostering good business practices Protecting organizations and its employees from legal issues Avoiding unfavorable publicity

-Subeer Nadgonde -PMP

How Ethics Create Goodwill for an organization?


Organization Example of socially responsible activity Google, Inc. Donated $33 million in free ads to nonprofit organizations in low-income areas12 Hewlett-Packard Employees work to implement technology solutions to benefit residents of central city communities IBM Awards millions of dollars of grants each year to support the arts Intel Supplied 100,000 computers to schools in low-income neighborhoods Microsoft Matches its employees direct contributions to thousands of nonprofit organizations SAP America Awards up to nine undergraduate students a $10,000 scholarship each academic year Yahoo! Allows employees to take time off to develop technology applications to aid charitable

-Subeer Nadgonde -PMP

What is the flow of Decision Making process?


Develop Problem Statement

Identify Alternatives

Evaluations and Selection

Implementation

Evaluation of Result

No

Success Yes

Finish

-Subeer Nadgonde -PMP

What is information privacy?


The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used
Information Privacy : Information privacy is the combination of communications privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy (the ability to limit access to ones personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use What Kind of Data are usually stolen?
Financial Data Health Information Childrens Personal Data Electronic Surveillance Export of Personal Data Access to Govt. Records

-Subeer Nadgonde -PMP

What are the simple ways to protect privacy?


NoticeTell all customers what is done with their information. ChoiceGive customers a way to opt out of marketing. Onward transferWhen data is transferred to suppliers or other business partners, companies must observe the notice and choice principles mentioned above and require all recipients of such data to provide at least the same level of protection for such data. AccessGive customers access to their information. SecurityProtect customer information from unauthorized access. Data integrityEnsure that information is accurate and relevant. EnforcementIndependently enforce the privacy policy.
-Subeer Nadgonde -PMP

What are key issues with Privacy?


Identity Theft Consumer Profiling
Treating Consumer Data Responsibly

-Subeer Nadgonde -PMP

What is identity theft?


Identity Theft :
Completely and irrevocably destroy, digital identity data on used Equipment, Shred everything, Require retailers to request a photo ID when accepting your credit card, Beware shoulder surfing, Minimize personal data shown on checks, Minimize time that mail is in your mailbox, Do not use debit cards to pay for online purchases, Treat your credit card receipts safely, Use hardto-guess passwords and PINs

Data Breaches Purchase of Personal Data Phishing Spyware Identity Theft Monitoring Services
-Subeer Nadgonde -PMP

What is Consumer profiling?


Consumer Profiling
Aggregating Consumer Data Collecting Data from Website visits Personalization in Advertisement over the Web Platform for Privacy Preferences (P3P)

-Subeer Nadgonde -PMP

What are Proactive Steps to protect Privacy ?


Treating Consumer Data Responsibly Workplace monitoring Advanced Surveillance Technology
Camera Surveillance Facial Recognition Software GPS Chips

-Subeer Nadgonde -PMP

What is Freedom of Speech?


Freedom of speech is the freedom to speak freely without censorship.
The synonymous term freedom of expression is sometimes used to indicate not only freedom of verbal speech but any act of seeking, receiving and imparting information or ideas, regardless of the medium used.

Censorship in Bhutan refers to the way in which the RGoB controls


information within its borders. There are no laws that either guarantee citizens' right to information or define or structure censorship. However, censorship in Bhutan is still conducted by restrictions on the ownership of media outlets, licensing of journalists, and the blocking of websites.

-Subeer Nadgonde -PMP

Changing Communication Paradigm


Regulatory Paradigm
Evolving communication technology Print Media Broadcast Media Common Career (Telephones and Postal System Internet, BBS (Bulleting Board System) Protect citizens from government Prohibits restriction of speech, press peaceful assembly and religion Offensive and/or controversial speech and ideas Pictures and arts and other forms of expression Advertising

How constitution helps freedom of speech?

-Subeer Nadgonde -PMP

Changing Communication Paradigm


Special Status for Internet
Protection for internet User of interactive services will not be treated as publisher Remove possibility of suing BBS operators for user content Same status of press or better

-Subeer Nadgonde -PMP

Controlling Offensive speech


What is illegal /Offensive speech?
Political or religious speech Pornography Sexual or racial slurs Nazi Material Libelous statement Abortion information Material Inappropriate for children Violence

-Subeer Nadgonde -PMP

Censorship, Anonymity & Spam


How censorship has Global Impact? Ease of avoiding censorship Inter National Issues What is Anonymity and different view associated with it? Posts by Pseudonym Supporters view Opponents View What is Spam? Unsolicited mass e mail

-Subeer Nadgonde -PMP

Spam
What are the issues associated with Spam and how we can solve these issues? Issues
Cheap for sender, costs time to receiver May contain objectionable material Disguised return address May pass through filters Invades privacy Financial issues for ISP

Solution
Technology Market Pressure Business policy : Discretion of receiver, to be charged a micro fee Law Vigilantism / Spying -Subeer Nadgonde -PMP

Protecting Access & Innovation


Should companies be allowed to provide different levels of speed for different prices Special treatment based on content

Net Neutrality
Argue for equal treatment for all customers

De-Regulations
Flexibility and market incentive will benefit customers

-Subeer Nadgonde -PMP

What are the aspects associated with Political Campaign Regulation?


Raising Money Publicity Disclosure of Contributor Limits of Direct Contributors Prohibits corporations and unions from paying for ads Media exemption applies to traditional news and web media

-Subeer Nadgonde -PMP

What is Intellectual Property?


Intellectual property is a term used to describe works of the mindsuch as art, books, films, formulas, inventions, music, and processesthat are distinct, and owned or created by a single person or group. Intellectual property is protected through copyright, patent, and trade secret laws. Copyright law protects authored works, such as art, books, film, and music; patent law protects inventions; and trade secret law helps safeguard information that is critical to an organizations success. Together, copyright, patent, and trade secret legislation forms a complex body of law that addresses the ownership of intellectual property. Such laws can also present potential ethical problems for IT companies and users Protected by copyright and patent law

-Subeer Nadgonde -PMP

Form Copy Right

Key Terms of Agreement Computer programs are protected as literary works. Authors of computer programs and producers of sound recordings have the right to prohibit the commercial rental of their works to the public. Patent protection is available for any inventionwhether a product or processin all fields of technology without discrimination, subject to the normal tests of novelty, inventiveness, and industrial applicability. It is also required that patents be available and patent rights enjoyable without discrimination as to the place of invention and whether products are imported or locally produced.

Patent

Trade Secret Trade secrets and other types of undisclosed information that have commercial value must be protected against breach of confidence and other acts that are contrary to honest commercial practices. However, reasonable steps must have been taken to keep the information secret.

-Subeer Nadgonde -PMP

What is Copy Right?


A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. Copyright protection is granted to the creators of original works of authorship in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Copyright infringement is a violation of the rights secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of anothers copyrighted work without permission Eligible Works The types of work that can be copyrighted include architecture, art, audiovisual works, choreography, drama, graphics, literature, motion pictures, music, pantomimes, pictures, sculptures, sound recordings, and other intellectual works

-Subeer Nadgonde -PMP

What is patent?
A patent is a grant of a property right issued by the PATENT AUTHORITY of the country to an inventor. A patent permits its owner to exclude the public from making, using, or selling a protected invention, and it allows for legal action against violators. Unlike a copyright, a patent prevents independent creation as well as copying. Even if someone else invents the same item independently and with no prior knowledge of the patent holders invention, the second inventor is excluded from using the patented device without permission of the original patent holder. The rights of the patent are valid only in the specific country where it is patented Patent infringement, or the violation of the rights secured by the owner of a patent, occurs when someone makes unauthorized use of anothers patent. Unlike copyright infringement, there is no specified limit to the monetary penalty if patent infringement is found. In fact, if a court determines that the infringement is intentional, it can award up to three times the amount of the damages claimed by the patent holder

-Subeer Nadgonde -PMP

Significant Cases
Sharing music: the Napster case Was the sharing of music via Napster fair use? Napster's arguments for fair use The Sony decision allowed for entertainment use to be considered fair use Did not hurt industry sales because users sampled the music on Napster and bought the CD if they liked it RIAA's (Recording Industry Association of America) arguments against fair use "Personal" meant very limited use, not trading with thousands of strangers Songs and music are creative works and users were copying whole songs Claimed Napster severely hurt sales Court ruled sharing music via copied MP3 files violated copyright

-Subeer Nadgonde -PMP

Explain Software and Copyrights?


The purpose and character of the use (such as commercial use or nonprofit, educational purposes) The portion of the copyrighted work used in relation to the work as a whole The effect of the use on the value of the copyrighted work The use of copyrights to protect computer software raises many complicated issues of interpretation. For example, a software manufacturer can observe the operation of a competitors copyrighted program and then create a program that accomplishes the same result and performs in the same manner. To prove infringement, the copyright holder must show a striking resemblance between its software and the new software that could be explained only by copying

-Subeer Nadgonde -PMP

Copying and Sharing


Responses from the Content Industries: Ideas from the software industries Expiration dates within the software Dongles (a device that must be plugged into a computer port) Copy protection that prevents copying Activation or registration codes Obtained court orders to shut down Internet bulletin boards and Web sites Banning, suing and taxing Ban or delay technology via lawsuits CD-recording devices Digital Audio Tapes (DAT) DVD players Portable MP3 players Require that new technology include copyright protections Tax digital media to compensate the industry for expected losses
-Subeer Nadgonde -PMP

Copying and Sharing


Digital Rights Management : Collection of techniques that control uses of intellectual property in digital formats Includes hardware and software schemes using encryption The producer of a file has flexibility to specify what a user may do with it

-Subeer Nadgonde -PMP

Copying and Sharing


Video Sharing: Conflict and Solutions: Industry issues "take down" notices per the DMCA (Digital Millennium Copyright Act) As long as sites like YouTube and MySpace comply with take down notices they are not in violation Take down notices may violate fair use, some have been issued against small portions of video being used for educational purposes New Business Models and Constructive Solutions: Organizations set up to collect and distribute royalty fees Sites such as iTunes and the new Napster provide legal means for obtaining inexpensive music and generate revenue for the industry and artists Revenue sharing allows content-sharing sites to allow the posting of content and share their ad revenues with content owners in compensation
-Subeer Nadgonde -PMP

Copying and Sharing


Ethical Arguments About Copying: Unlike physical property, copying or distributing a song, video, or computer program does not decrease the use or enjoyment by another person Copying can decrease the economic value of creative work produced for sale International Piracy: Some countries do not recognize or protect intellectual property Countries that have high piracy rates often do not have a significant software industry Many countries that have a high amount of piracy are exporting the pirated copies to countries with strict copyright laws Economic sanctions often penalize legitimate businesses, not those they seek to target
-Subeer Nadgonde -PMP

Free Software
Types of software license Free software - idea, an ethic, advocated and supported by large, loose-knit group of computer programmers who allow people to copy, use, and modify their software Free means freedom of use, not necessarily lack of cost Open source - software distributed or made public in source code (readable and modifiable) Proprietary software - (commercial) sold in object code (obscure, not modifiable) (E.g.: Microsoft Office) Should All Software Be Free? Would there be sufficient incentives to produce the huge quantity of consumer software available now? Would the current funding methods for free software be sufficient to support all software development? Should software be covered under copyright law? Concepts such as copyleft and the GNU (General Public License) provide alternatives to proprietary software within today's current legal framework

-Subeer Nadgonde -PMP

Ownership Issues for Software Developers


Patents for Software? Patents protect inventions of new things or processes The Supreme Court said that software could not be patented; however a machine that included software could Patents are not supposed to be given for things that are obvious or are already in common use

-Subeer Nadgonde -PMP

Crime
Hacking: currently defined as to gain illegal or unauthorized access to a file, computer, or network Phase1: (1960s-1970s) Used as positive term for a creative programmer Phase2: (1970s-1990s) Negative connotation.
User for individual Breaking into computers for which he does not have authorized access Includes the spreading of computer worms and viruses and phone phreaking Companies began using hackers to analyze and improve security

Phase3: (Mid1990s) viruses and worms could be spread rapidly


Political hacking (Hacktivism) surfaced Denial-of-service (DoS) attacks used to shut down Web sites Large scale theft of personal and financial information
-Subeer Nadgonde -PMP

Hacking
Hacktivism, or Political Hacking: Use of hacking to promote a political cause Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished Some use the appearance of hacktivism to hide other criminal activities The Law: Catching and Punishing Hackers: Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems

-Subeer Nadgonde -PMP

Hacking
The Law: Catching and Punishing Hackers A variety of methods for catching hackers Law enforcement agents read hacker newsletters and participate in chat rooms undercover They can often track a handle by looking through newsgroup archives Security professionals set up honey pots which are Web sites that attract hackers, to record and study Computer forensics is used to retrieve evidence from computers Penalties for young hackers Many young hackers have matured and gone on to productive and responsible careers Temptation to over or under punish Sentencing depends on intent and damage done Most young hackers receive probation, community service, and/or fines Not until 2000 did a young hacker receive time in juvenile detention

-Subeer Nadgonde -PMP

Hacking
Security Internet started with open access as a means of sharing information for research Attitudes about security were slow to catch up with the risks Firewalls are used to monitor and filter out communication from un-trusted sites or that fit a profile of suspicious activity Responsibility for Security Developers have a responsibility to develop with security as a goal Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)

-Subeer Nadgonde -PMP

Scams and Frauds


Auctions: FTC reports that online auction sites are one of the top sources of fraud complaints Some sellers do not send items or send inferior products Shill bidding is used to artificially raise prices Sellers give themselves or friends glowing reviews to garner consumer trust Click fraud - repeated clicking on an ad to either increase a sites revenue or to use up a competitor's advertising budget Stock fraud - most common method is to buy a stock low, send out e-mails urging others to buy, and then sell when the price goes up, usually only for a short time Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment

-Subeer Nadgonde -PMP

Crime fighting V/S privacy and civil liberties


Search and Seizure of Computers: Requires a warrant to search and seize a computer Court rulings inconclusive about whether information found on computers, but not covered by a warrant, is considered in plain view Automated searches Can monitor constantly and less likely to miss suspicious activity Can be programmed to only look for what is covered in a warrant The Issue of Venue: Charges are generally filed where the crime occurs Laws differ between states and countries The FBI usually files in the state where the crime was discovered and the investigation began Cybercrime Treaty: International agreement to foster international cooperation among law enforcement agencies of different countries in fighting copyright violations, pornography, fraud, hacking and other online fraud Treaty sets common standards or ways to resolve international cases

-Subeer Nadgonde -PMP

Rules of Web and Issues


When Digital Actions Cross Borders: Laws vary from country to country Corporations that do business in multiple countries must comply with the laws of all the countries involved Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia An executive of a British online gambling site was arrested as he transferred planes in Dallas (online sports betting is not illegal in Britain) Libel, Speech and Commercial Law: Even if something is illegal in both countries, the exact law and associated penalties may vary Where a trial is held is important not just for differences in the law, but also the costs associated with travel between the countries; cases can take some time to come to trial and may require numerous trips Freedom of speech suffers if businesses follow laws of the most restrictive countries -Subeer Nadgonde -PMP

Work
Fear and Question: The introduction of computers in the workplace generated many fears Mass unemployment due to increased efficiency The need for increased skill and training widens the earning gap New trends still generating fears Off-shoring of jobs will lead to mass unemployment Employers use of technology to monitor their employees

-Subeer Nadgonde -PMP

Work
The Impact on Employment: Job Creation and destruction: A successful technology eliminates or reduces some jobs but creates others Reduced the need for telephone operators, meter readers, mid-level managers New industries arise Internet Cellular communications Lower prices increase demand and create jobs Music industry changed from serving the wealthy to serving the masses, employing more than just musicians Unemployment rates fluctuate Growth of computers has been steady, while unemployment has fluctuated widely Are we earning less? Since the 1970s, wages decreased but fringe benefits increased People work fewer hours since the Industrial Revolution Decrease in take-home pay may be due to other factors (e.g. increased taxes) Purchasing power increases as prices fall
-Subeer Nadgonde -PMP

Work
The Impact on Employment: Changing Skill Levels: The new jobs created from computers are different from the jobs eliminated New jobs such as computer engineer and system analyst jobs require a college degree, where jobs such as bank tellers, customer service representatives and clerks do not Companies are more willing to hire people without specific skills when they can train new people quickly and use automated support systems

-Subeer Nadgonde -PMP

Work
The Impact on Employment: A Global Workforce: Outsourcing - phenomenon where a company pays another company to build parts for its products or services instead of performing those tasks itself Off-shoring - the practice of moving business processes or services to another country, especially overseas, to reduce costs In-shoring - when another company employs thousands of people in the host country. (e.g. off-shoring for a German company means in-shoring for U.S.) Problems and side effects of off-shoring: Consumers complain about customer service representatives, because accents are difficult to understand Employees in U.S. companies need new job skills (e.g., managing, working with foreign colleagues) Increased demand for high-skill workers in other countries forces salaries up
-Subeer Nadgonde -PMP

Work
The Impact on Employment: Getting a Job: Learning about jobs and companies Online company histories and annual reports Job search and resume sites Online training Learning about applicants and employees Search online newsgroups and social networks Hire data-collection agencies such as ChoicePoint Prospective employees may craft an online profile and presence geared towards the job they want

-Subeer Nadgonde -PMP

Work
The Work Environment:

Job Dispersal and Telecommuting:


Telecommuting Working at home using a computer electronically linked to one's place of employment Mobile office using a laptop, working out of your car or at customer locations Fulltime and part-time telecommuting Benefits Reduces overhead for employers Reduces need for large offices Employees are more productive, satisfied, and loyal Reduces traffic congestion, pollution, gasoline use, and stress Reduces expenses for commuting and money spent on work clothes Allows work to continue after blizzards, hurricanes, etc. Problems Employers see resentment from those who have to work at the office For some telecommuting employees, corporation loyalty weakens Odd work hours Cost for office space has shifted to the employee Security risks when work and personal activities reside on the same computer

-Subeer Nadgonde -PMP

Work
Changing Structure of Business:
Increase in smaller businesses and independent consultants (information entrepreneurs) Mom and pop multi-nationals, small businesses on the Web Growth of large, multi-national corporations Not all changes due to technology

-Subeer Nadgonde -PMP

Work
Why Monitor Employee Employee Crime Embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted Trusted employees have stolen millions of dollars Angry fired employees sabotage company systems Logic bomb - software that destroys critical files (payroll and inventory records) after employee leaves Other Reasons for Monitoring: Employees spend time on non-work activities on the Web hence some companies block specific sites (e.g. adult content, sports sites, job search sites, social-network sites) Concerns over security threats such as viruses and other malicious software Concerns about inappropriate activities by employees (e.g., harassment, unprofessional comment)
-Subeer Nadgonde -PMP

Work
History Employee Monitoring: Early monitoring was mostly blue-collar (factory) and pink-collar (telephone and clerical) jobs Time-clocks and logs Output counts at the end of the day Bosses patrolled the aisles watching workers What is Monitored: 1. Data Entry, Phone Work, and Retail: Data entry Key stroke quotas Encourage competition Beep when workers pause Phone work Number and duration of calls Idle time between calls Randomly listen in on calls Retail Surveillance to reduce theft by employees 2. Location Monitoring: Cards and badges used as electronic keys increase security but track employee movements GPS tracks an employee's location Used in some hospitals to track nurse locations for emergency purposes, also shows where they are at lunch or when they use the bathroom Used to track long-haul trucks to reduce theft and optimize delivery schedules, also detects driving speeds and duration of rest breaks Employees often complain of loss of privacy

-Subeer Nadgonde -PMP

Work
3. E-Mail, Blogging, and Web Use: E-mail and voice mail at work Employees often assume passwords mean they are private Roughly half of major companies in the U.S. monitor or search employee e-mail, voice mail, or computer files Most companies monitor infrequently, some routinely intercept all e-mail Law and cases: Electronic Communications Privacy Act (ECPA) prohibits interception of email and reading stored e-mail without a court order, but makes an exception for business systems Courts put heavy weight on the fact that computers, mail, and phone systems are owned by the employer who provides them for business purposes Many employers have privacy policies regarding e-mail and voice mail

-Subeer Nadgonde -PMP

Evaluating and controlling technology


Information Knowledge and Judgment
Evaluating Information on the Web: Expert information or wisdom of the crowd? Daunting amount of information on the web, much of this information is not correct Search engines are replacing librarians, but Web sites are ranked by popularity, not by expert evaluation Wisdom of the crowd - ratings by public of website Wikipedia: Written by volunteers, some posts are biased and not accurate Although anyone can write, most people do not Those that do typically are educated and experts Wisdom of the crowd Problems of unreliable information are not new The Web magnifies the problems Rating systems are easy to manipulate
-Subeer Nadgonde -PMP

Evaluating and controlling technology


Information Knowledge and Judgment

Vulnerable viewers Less educated individuals Children Responsibilities of site operators Should identify user-supplied content Make clear which information has been verified Evaluating Information on the Web: Manipulation of images: Movies and videos use special effects to add creativity and enjoyment of entertainment People can use technology for deception and fraud Ease with which we can modify digital images and video
-Subeer Nadgonde -PMP

Evaluating and controlling technology


Information Knowledge and Judgment

Vulnerable viewers Less educated individuals Children Responsibilities of site operators Should identify user-supplied content Make clear which information has been verified Evaluating Information on the Web: Manipulation of images: Movies and videos use special effects to add creativity and enjoyment of entertainment People can use technology for deception and fraud Ease with which we can modify digital images and video
-Subeer Nadgonde -PMP

Evaluating and controlling technology


Writing, Thinking and Deciding: New tools have displaced skills that were once important Abdicating responsibility People willing to let computers do their thinking Reliance on computer systems over human judgment may become institutionalized Fear of having to defend your own judgment if something goes wrong Computer and Community It is human nature to form associations based on common interests Some feared early technologies, such as telephones, thinking communication would be de-humanized Computers and the Internet were blamed for the decline in community involvement and memberships in clubs and organizations The Internet provides communities focused on specialized interests or problems The Internet brings people together from all over the world E-mail and the Internet provide convenient and cheap ways for families and friends to stay in contact New trends include social-networking sites such as MySpace and virtual environments such as Second Life -Subeer Nadgonde -PMP

Evaluating and controlling technology


Digital Divide Trends in Computer Access: New technologies only available to the wealthy The time it takes for new technology to make its way into common use is decreasing Cost is not the only factor; ease of use plays a role Entrepreneurs provide low cost options for people who cannot otherwise afford something Government funds technology in schools As technology becomes more prevalent, the issues shift from the haves and have-nots to level of service

Neo-Luddism (View) Neo-Luddism is a personal world view opposing modern technology. Its name is based on the historical legacy of the British Luddites which were active between 1811 and 1816. Neo-luddism includes the critical examination of the effects technology has on individuals and communities .
Computers cause massive unemployment No real need (We use technologies because they are there, not because they satisfy real needs) Computers cause social inequity Benefit big business and the government Do little or nothing to solve real problems Computers separate humans from nature and destroy the environment

-Subeer Nadgonde -PMP

Evaluating and controlling technology


Accomplishments of Technology: Prices of food are down and raw materials are abundant Real buying power is up Food supplies and GDP are growing faster than the population Dramatic impact on life expectancy Assistive technologies benefit those with disabilities The Difficulty of Prediction: Each new technology finds new and unexpected uses The history of technology is full of wildly wrong predictions New technologies are often expensive, but costs drop as the technology advances and the demand increases Should we decline a technology because of potential abuse and ignore the benefits? We cannot prepare for aftermath, but prepare for more gradual developments
-Subeer Nadgonde -PMP

Errors failures and risks


Errors and Failures in computer systems:
Most computer applications are so complex it is virtually impossible to produce programs with no errors The cause of failure is often more than one factor Computer professionals must study failures to learn how to avoid them

Individual Problems/Failures: Billing errors Inaccurate and misinterpreted data in databases Large population where people may share names Automated processing may not be able to recognize special cases Overconfidence in the accuracy of data Errors in data entry System Failures: Businesses have gone bankrupt after spending huge amounts on computer systems that failed Voting system in 2000 presidential election, Denver Airport, Ariane 5 Rocket -Subeer Nadgonde -PMP

Errors failures and risks


Causes of System Failure: Lack of clear, well thought out goals and specifications Poor management and poor communication among customers, designers, programmers, etc. Pressures that encourage unrealistically low bids, low budget requests, and underestimates of time requirements Use of very new technology, with unknown reliability and problems Refusal to recognize or admit a project is in trouble

-Subeer Nadgonde -PMP

Errors failures and risks


Case Study Therac-25 Radiation Overdoses: Massive overdoses of radiation were given; the machine said no dose had been administered at all Caused severe and painful injuries and the death of three patients Important to study to avoid repeating errors Manufacturer, computer programmer, and hospitals/clinics all have some responsibility Software and Design problems (Therac-25 ): Re-used software from older systems, unaware of bugs in previous software Weaknesses in design of operator interface Inadequate test plan Bugs in software as it allowed beam to deploy when table not in proper position

-Subeer Nadgonde -PMP

Errors failures and risks


Manufacturers mistake (Therac-25 ): Hospitals had never seen such massive overdoses before, were unsure of the cause Manufacturer said the machine could not have caused the overdoses and no other incidents had been reported (which was untrue) The manufacturer made changes to the turntable and claimed they had improved safety after the second accident. The changes did not correct any of the causes identified later Recommendations were made for further changes to enhance safety; the manufacturer did not implement them The FDA declared the machine defective after the fifth accident The sixth accident occurred while the FDA was negotiating with the manufacturer on what changes were needed Observations and Perspective (Therac-25 ): Minor design and implementation errors usually occur in complex systems; they are to be expected but the problems in the Therac-25 case were not minor and suggest irresponsibility Accidents occurred on other radiation treatment equipment without computer controls when the technicians: Left a patient after treatment started to attend a party Did not properly measure the radioactive drugs -Subeer Nadgonde -PMP

Errors failures and risks


Increasing reliability and safety of systems: Basic Issues Design and development problems System management and usage problems Misrepresentation, hiding problems and inadequate response to reported problems Re-use of software without sufficiently understanding the code and testing it Failure to update or maintain a database

Professional techniques for preventing issues: Importance of good software engineering and professional responsibility User interfaces and human factors Feedback Should behave as an experienced user expects Testing Include real world testing with real users

-Subeer Nadgonde -PMP

Errors failures and risks


Law, Regulation and Markets: Criminal and civil penalties Provide incentives to produce good systems, but shouldn't inhibit innovation Warranties for consumer software Most are sold as-is Regulation for safety-critical applications Professional licensing Taking responsibility

Risk and Progress

Many new technologies were not very safe when they were first developed We develop and improve new technologies in response to accidents and disasters We should compare the risks of using computers with the risks of other methods and the benefits to be gained
-Subeer Nadgonde -PMP

You might also like