Ethics in Information Technology, Fourth Edition
Chapter 2
Ethics for IT Workers and IT Users
1
Objectives
• As you read this chapter, consider the following
questions:
– What key characteristics distinguish a professional
from other kinds of workers, and is an IT worker
considered a professional?
– What factors are transforming the professional
services industry?
– What relationships must an IT worker manage, and
what key ethical issues can arise in each?
Ethics in Information Technology, Fourth Edition 2
Objectives (cont’d.)
– How do codes of ethics, professional organizations,
certification, and licensing affect the ethical behavior
of IT professionals?
– What is meant by compliance, and how does it help
promote the right behaviors and discourage
undesirable ones?
Ethics in Information Technology, Fourth Edition 3
IT Professionals
• Profession is a calling that requires:
– Specialized knowledge
– Long and intensive academic preparation
• Professionals:
– Require advanced training and experience
– Must exercise discretion and judgment in their work
– Their work cannot be standardized
– Contribute to society, participate in lifelong training,
assist other professionals
– Carry special rights and responsibilities
Ethics in Information Technology, Fourth Edition 4
Are IT Workers Professionals?
• Partial list of IT specialists
– Programmers
– Systems analysts
– Software engineers
– Database administrators
– Local area network (LAN) administrators
– Chief information officers (CIOs)
Ethics in Information Technology, Fourth Edition 5
Are IT Workers Professionals?
(cont’d.)
• Legal perspective
– IT workers do not meet legal definition of professional
• Not licensed by state or federal government
• Not liable for malpractice
Ethics in Information Technology, Fourth Edition 6
The Changing Professional Services
Industry
• IT workers are considered part of the professional
services industry
• Seven forces are changing professional services
– Client sophistication (able to drive hard bargains)
– Governance (due to major scandals)
– Connectivity (instant communications)
– Transparency (view work-in-progress in real-time)
– Modularization (able to outsource modules)
– Globalization (worldwide sourcing)
– Commoditization (for low-end services)
Ethics in Information Technology, Fourth Edition 7
Professional Relationships That Must
Be Managed
• IT workers involved in relationships with:
1. Employers
2. Clients
3. Suppliers
4. Other professionals
5. IT users
6. Society at large
Ethics in Information Technology, Fourth Edition 8
1. Relationships Between
IT Workers and Employers
• IT workers agree on many aspects of work
relationship before workers accept job offer
• Other aspects of work relationship defined in
company’s policy and procedure manual or code of
conduct
• Some aspects develop over time
• As steward of organization’s IT resources, IT
workers must set an example and enforce policies
regarding the ethical use of IT in:
Ethics in Information Technology, Fourth Edition 9
Relationships Between
IT Workers and Employers
• Software piracy
– Act of illegally making copies of software or enabling
access to software to which they are not entitled
– Area in which IT workers can be tempted to violate laws
and policies
– The Business Software Alliance (BSA) is a trade
group representing the world’s largest software and
hardware manufacturers; mission is to stop the
unauthorized copying of software
– Thousands of cases prosecuted each year
Ethics in Information Technology, Fourth Edition 10
Ethics in Information Technology, Fourth Edition 11
Relationships Between
IT Workers and Employers (cont’d.)
http://www.bsa.org/country/BSA%20and%20Members/Our%20Members.aspx
Ethics in Information Technology, Fourth Edition 12
Worldwide and policy council members of Business Software Alliance (BSA)
Relationships Between
IT Workers and Employers (cont’d.)
• IT workers must set an example and enforce
policies regarding the ethical use of IT in: (cont’d.)
– Trade secrets
• Business information generally unknown to public
• Company takes actions to keep confidential
• Require cost or effort to develop
• Have some degree of uniqueness or novelty
– Whistle-blowing
• Employee attracts attention to a negligent, illegal,
unethical, abusive, or dangerous act that threatens
the public interest
Ethics in Information Technology, Fourth Edition 13
2. Relationships Between
IT Workers and Clients
• IT worker provides:
– Hardware, software, or services at a certain cost and
within a given time frame
• Client provides:
– Compensation
– Access to key contacts
– Work space
• Relationship is usually documented in
contractual terms
Ethics in Information Technology, Fourth Edition 14
Relationships Between
IT Workers and Clients (cont’d.)
• Client makes decisions about a project based on
information, alternatives, and recommendations
provided by the IT worker
• Client trusts IT worker to act in client’s best interests
• IT worker trusts that client will provide relevant
information, listen to and understand what the IT
worker says, ask questions to understand impact of
key decisions, and use the information to make wise
choices
Ethics in Information Technology, Fourth Edition 15
Relationships Between
IT Workers and Clients (cont’d.)
• Ethical problems arise if a company recommends its
own products and services to remedy problems they
have detected
– Creates a conflict of interest
• Problems arise during a project if IT workers are
unable to provide full and accurate reporting of a
project’s status
– Finger pointing and heated discussions can ensue
Ethics in Information Technology, Fourth Edition 16
Relationships Between
IT Workers and Clients (cont’d.)
• Fraud
– Crime of obtaining goods, services, or property
through deception or trickery
• Misrepresentation
– Misstatement or incomplete statement of material fact
– If misrepresentation causes a party to enter into a
contract, that party may have the right to cancel
contract or seek reimbursement for damages
Ethics in Information Technology, Fourth Edition 17
Relationships Between
IT Workers and Clients (cont’d.)
• Breach of contract
– One party fails to meet the terms of a contract
– When there is material breach of contract:
• The non-breaching party may rescind the contract,
seek restitution of any compensation paid to the
breaching party, and be discharged from any
further performance under the contract
• IT projects are joint efforts in which vendors and
customers work together
– When there are problems, it is difficult to assign who
is at fault
Ethics in Information Technology, Fourth Edition 18
3. Relationships Between
IT Workers and Suppliers
• Develop good working relationships with suppliers:
– To encourage flow of useful information and ideas to
develop innovative and cost-effective ways of using
the supplier in ways that the IT worker may not have
considered
– By dealing fairly with them
– By not making unreasonable demands
Ethics in Information Technology, Fourth Edition 19
Relationships Between
IT Workers and Suppliers (cont’d.)
• Bribery
– Providing money, property, or favors to obtain a
business advantage
– U.S. Foreign Corrupt Practices Act (FCPA): crime to
bribe a foreign official, a foreign political party official,
or a candidate for foreign political office
– At what point does a gift become a bribe?
– No gift should be hidden
– Perceptions of donor and recipient can differ
– United Nations Convention Against Corruption is a
global treaty to fight bribery and corruption
Ethics in Information Technology, Fourth Edition 20
Ethics in Information Technology, Fourth Edition 21
Relationships Between
IT Workers and Suppliers (cont’d.)
4. Relationships Between
IT Workers and Other Professionals
• Professionals feel a degree of loyalty to other
members of their profession
• Professionals owe each other adherence to their
profession’s code of conduct
• Ethical problems among the IT profession
– Résumé inflation on 30% of U.S. job applications
– Inappropriate sharing of corporate information
• Information might be sold intentionally or shared
informally with those who have no need to know
Ethics in Information Technology, Fourth Edition 22
5. Relationships Between
IT Workers and IT Users
• IT user: person using a hardware or software
product
• IT workers’ duties
– Understand users’ needs and capabilities
– Deliver products and services that meet those needs
– Establish environment that supports ethical behavior:
• To discourages software piracy
• To minimize inappropriate use of corporate
computing resources
• To avoid inappropriate sharing of information
Ethics in Information Technology, Fourth Edition 23
6. Relationships Between
IT Workers and Society
• Society expects members of a profession:
– To provide significant benefits
– To not cause harm through their actions
• Actions of an IT worker can affect society
• Professional organizations provide codes of ethics
to guide IT workers’ actions
Ethics in Information Technology, Fourth Edition 24
Professional Codes of Ethics
• State the principles and core values that are
essential to the work of an occupational group
• Most codes of ethics include:
– What the organization aspires to become
– Rules and principles by which members of the
organization are expected to abide
• Many codes also include commitment to continuing
education for those who practice the profession
Ethics in Information Technology, Fourth Edition 25
Professional Codes of Ethics
(cont’d.)
• Following a professional code of ethics can produce
benefits for the individual, the profession, and
society as a whole
– Ethical decision making
– High standards of practice and ethical behavior
– Trust and respect from general public
– Evaluation benchmark for self-assessment
Ethics in Information Technology, Fourth Edition 26
Professional Organizations
• No universal code of ethics for IT professionals
• No single, formal organization of IT professionals
has emerged as preeminent
• Five of the most prominent organizations include:
– Association for Computing Machinery (ACM)
– Institute of Electrical and Electronics Engineers
Computer Society (IEEE-CS)
– Association of IT Professionals (AITP)
– SysAdmin, Audit, Network, Security (SANS) Institute
Ethics in Information Technology, Fourth Edition 27
Certification
• Indicates that a professional possesses a particular
set of skills, knowledge, or abilities in the opinion of
the certifying organization
• Can also apply to products
• Generally voluntary
• May or may not require adherence to a code of
ethics
• Employers view as benchmark of knowledge
• Opinions are divided on value of certification
Ethics in Information Technology, Fourth Edition 28
Certification (cont’d.)
• Vendor certifications
– Some certifications substantially improve IT workers’
salaries and career prospects
– Relevant for narrowly defined roles or certain aspects
of broader roles
– Require passing a written exam, or in some cases, a
hands-on lab to demonstrate skills and knowledge
– Can take years to obtain necessary experience
– Training can be expensive
Ethics in Information Technology, Fourth Edition 29
Certification (cont’d.)
• Industry association certifications
– Require a higher level of experience and a broader
perspective than vendor certifications
– Must sit for and pass written exam
– May need to pay annual renewal fee, earn continuing
education credits, and/or pass renewal test
– Lag in developing tests that cover new technologies
– Are moving from purely technical content to a broader
mix of technical, business, and behavioral
competencies
Ethics in Information Technology, Fourth Edition 30
Government Licensing
• License is a government-issued permission to
engage in an activity or operate a business
• Generally administered at the state level in the
United States
• Often requires that recipient pass a test
• Some professionals must be licensed – doctors,
lawyers, CPAs, medical and day care providers,
engineers
• One goal: protect public safety
Ethics in Information Technology, Fourth Edition 31
Government Licensing (cont’d.)
• Case for licensing IT workers
– Encourages following highest standards of profession
– Encourages practicing a code of ethics
– Violators would be punished
• Without licensing, there are no requirements for
heightened care and no concept of professional
malpractice
Ethics in Information Technology, Fourth Edition 32
Government Licensing (cont’d.)
• Issues associated with government licensing of IT
workers
– There are few licensing programs for IT professionals
• No universally accepted core body of knowledge
• Unclear who should manage content and
administration of licensing exams
• No administrative body to accredit professional
education programs
• No administrative body to assess and ensure
competence of individual workers
Ethics in Information Technology, Fourth Edition 33
IT Professional Malpractice
• Negligence: not doing something that a reasonable
person would do, or doing something that a
reasonable person would not do
• Duty of care: obligation to protect people against
any unreasonable harm or risk
– Reasonable person standard
– Reasonable professional standard
• Professional malpractice: professionals who
breach the duty of care are liable for injuries that
their negligence causes
Ethics in Information Technology, Fourth Edition 34
IT Users
• Employees’ ethical use of IT is an area of growing
concern because of increased access to:
– Personal computers
– Corporate information systems and data
– The Internet
Ethics in Information Technology, Fourth Edition 35
Common Ethical Issues for IT Users
• Software piracy
• Inappropriate use of computing resources
– Erodes productivity and wastes time
– Could lead to lawsuits
• Inappropriate sharing of information, including:
– Every organization stores vast amounts of private or
confidential data
• Private data (employees and customers)
• Confidential information (company and operations)
Ethics in Information Technology, Fourth Edition 36
Supporting the Ethical Practices of
IT Users
• Policies that protect against abuses:
– Set forth general rights and responsibilities of users
– Create boundaries of acceptable behavior
– Enable management to punish violators
• Policy components include:
– Establishing guidelines for use of company software
– Defining appropriate use of IT resources
– Structuring information systems to protect data and
information
– Installing and maintaining a corporate firewall
Ethics in Information Technology, Fourth Edition 37
Supporting the Ethical Practices of
IT Users (cont’d.)
Ethics in Information Technology, Fourth Edition 38
Ethics in Information Technology, Fourth Edition 39
Compliance
• To be in accordance with established policies,
guidelines, specifications, and legislation
– Sarbanes-Oxley – established requirements for
internal controls
– HIPAA – ensures security and privacy of employee
healthcare data
– Failure to be in conformance can lead to criminal or
civil penalties and also lawsuits
Ethics in Information Technology, Fourth Edition 40
Compliance (cont’d.)
• Major challenge to comply with multiple government
and industry regulations that are sometimes in
conflict
• To meet this challenge:
– Implement software to track and record compliance
actions
– Hire management consultants for advice and training
– Create Chief Compliance Officer position
Ethics in Information Technology, Fourth Edition 41
Compliance (cont’d.)
• Audit committee is subset of the board of directors,
with oversight for the following activities:
– Quality and integrity of accounting and reporting
practices and controls
– Compliance with legal and regulatory requirements
– Qualifications, independence, and performance of
organization’s independent auditor
– Performance of company’s internal audit team
Ethics in Information Technology, Fourth Edition 42
Compliance (cont’d.)
• Internal audit committee responsibilities:
– Determine that internal systems and controls are
adequate and effective
– Verify existence of company assets and maintain
proper safeguards over their protection
– Measure the organization’s compliance with its own
policies and procedures
– Insure that institutional policies and procedures,
appropriate laws, and good practices are followed
– Evaluate adequacy and reliability of information
available for management decision making
Ethics in Information Technology, Fourth Edition 43
Summary
• Professionals
– Require advanced training and experience
– Must exercise discretion and judgment in their work
– Their work cannot be standardized
• From a legal standpoint, a professional:
– Has passed the state licensing requirements
– Has earned the right to practice in a state(s)
• IT professionals have many different relationships
– Each with its own ethical issues and potential
problems
Ethics in Information Technology, Fourth Edition 44
Summary (cont’d.)
• Professional code of ethics
– States the principles and core values essential to the
work of an occupational group
– Serves as a guideline for ethical decision making
– Promotes high standards of practice and behavior
– Enhances trust and respect from the general public
– Provides an evaluation benchmark
• Licensing and certification of IT professionals
– Would increase the reliability and effectiveness of
information systems
– Raises many issues
Ethics in Information Technology, Fourth Edition 45
Summary (cont’d.)
• IT-related professional organizations have
developed their code of ethics that:
– Outlines what the organization aspires to become
– Lists rules and principles for members
– Includes a commitment to continuing education for
those who practice the profession
• Audit committee and internal audit team have a
major role in ensuring that both the IT organization
and IT users are in compliance with guidelines and
various legal and regulatory practices
Ethics in Information Technology, Fourth Edition 46

More Related Content

PPT
ethcpp02.ppt
PPT
2_updated.ppt
PPT
9781111534127 ppt ch02
PPT
9781111534127 ppt ch02
PDF
Chapter 2_dp-pertemuan 2&3
PPTX
Week 4.pptx
PPT
IT Professional Ethics, Moral and Cu.ppt
PPT
Professional Ethics of IT
ethcpp02.ppt
2_updated.ppt
9781111534127 ppt ch02
9781111534127 ppt ch02
Chapter 2_dp-pertemuan 2&3
Week 4.pptx
IT Professional Ethics, Moral and Cu.ppt
Professional Ethics of IT

Similar to Chapter 2 Ethics for IT Workers and IT Users.ppt (20)

PPTX
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
DOCX
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
DOCX
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
PDF
20CS024 Ethics in Information Technology
PPT
Ethics for it professionals and it users
PPT
ethcpp10.ppt
PPT
ethic01.ppt
PPT
01.ppt
PPT
Chapter 1 - Ethics for Information Technology Professionals.ppt
PPTX
Lesson 2: Ethical Codes for Social and Prof Issues.pptx
PDF
Chapter 1_dp-pertemuan 1
PPT
01-overview.overview.overview.overview.overview.ppt
PPT
01-overview.overview.overview.overview.overview.ppt
PPTX
Chapter 1 powerpoint
PDF
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
PPT
9781111534127 ppt ch01
PPT
PPT
ethcpp01 (1).ppt
PDF
Chp 04 ethics and proffesions (shared) ----
PPT
Ethics.ppt
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
20CS024 Ethics in Information Technology
Ethics for it professionals and it users
ethcpp10.ppt
ethic01.ppt
01.ppt
Chapter 1 - Ethics for Information Technology Professionals.ppt
Lesson 2: Ethical Codes for Social and Prof Issues.pptx
Chapter 1_dp-pertemuan 1
01-overview.overview.overview.overview.overview.ppt
01-overview.overview.overview.overview.overview.ppt
Chapter 1 powerpoint
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
9781111534127 ppt ch01
ethcpp01 (1).ppt
Chp 04 ethics and proffesions (shared) ----
Ethics.ppt
Ad

Recently uploaded (20)

PDF
Unlock new opportunities with location data.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Modernising the Digital Integration Hub
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
August Patch Tuesday
PDF
Five Habits of High-Impact Board Members
PPTX
The various Industrial Revolutions .pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Zenith AI: Advanced Artificial Intelligence
Unlock new opportunities with location data.pdf
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Module 1.ppt Iot fundamentals and Architecture
Web Crawler for Trend Tracking Gen Z Insights.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Modernising the Digital Integration Hub
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
August Patch Tuesday
Five Habits of High-Impact Board Members
The various Industrial Revolutions .pptx
Tartificialntelligence_presentation.pptx
Developing a website for English-speaking practice to English as a foreign la...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
CloudStack 4.21: First Look Webinar slides
Zenith AI: Advanced Artificial Intelligence
Ad

Chapter 2 Ethics for IT Workers and IT Users.ppt

  • 1. Ethics in Information Technology, Fourth Edition Chapter 2 Ethics for IT Workers and IT Users 1
  • 2. Objectives • As you read this chapter, consider the following questions: – What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional? – What factors are transforming the professional services industry? – What relationships must an IT worker manage, and what key ethical issues can arise in each? Ethics in Information Technology, Fourth Edition 2
  • 3. Objectives (cont’d.) – How do codes of ethics, professional organizations, certification, and licensing affect the ethical behavior of IT professionals? – What is meant by compliance, and how does it help promote the right behaviors and discourage undesirable ones? Ethics in Information Technology, Fourth Edition 3
  • 4. IT Professionals • Profession is a calling that requires: – Specialized knowledge – Long and intensive academic preparation • Professionals: – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized – Contribute to society, participate in lifelong training, assist other professionals – Carry special rights and responsibilities Ethics in Information Technology, Fourth Edition 4
  • 5. Are IT Workers Professionals? • Partial list of IT specialists – Programmers – Systems analysts – Software engineers – Database administrators – Local area network (LAN) administrators – Chief information officers (CIOs) Ethics in Information Technology, Fourth Edition 5
  • 6. Are IT Workers Professionals? (cont’d.) • Legal perspective – IT workers do not meet legal definition of professional • Not licensed by state or federal government • Not liable for malpractice Ethics in Information Technology, Fourth Edition 6
  • 7. The Changing Professional Services Industry • IT workers are considered part of the professional services industry • Seven forces are changing professional services – Client sophistication (able to drive hard bargains) – Governance (due to major scandals) – Connectivity (instant communications) – Transparency (view work-in-progress in real-time) – Modularization (able to outsource modules) – Globalization (worldwide sourcing) – Commoditization (for low-end services) Ethics in Information Technology, Fourth Edition 7
  • 8. Professional Relationships That Must Be Managed • IT workers involved in relationships with: 1. Employers 2. Clients 3. Suppliers 4. Other professionals 5. IT users 6. Society at large Ethics in Information Technology, Fourth Edition 8
  • 9. 1. Relationships Between IT Workers and Employers • IT workers agree on many aspects of work relationship before workers accept job offer • Other aspects of work relationship defined in company’s policy and procedure manual or code of conduct • Some aspects develop over time • As steward of organization’s IT resources, IT workers must set an example and enforce policies regarding the ethical use of IT in: Ethics in Information Technology, Fourth Edition 9
  • 10. Relationships Between IT Workers and Employers • Software piracy – Act of illegally making copies of software or enabling access to software to which they are not entitled – Area in which IT workers can be tempted to violate laws and policies – The Business Software Alliance (BSA) is a trade group representing the world’s largest software and hardware manufacturers; mission is to stop the unauthorized copying of software – Thousands of cases prosecuted each year Ethics in Information Technology, Fourth Edition 10
  • 11. Ethics in Information Technology, Fourth Edition 11 Relationships Between IT Workers and Employers (cont’d.) http://www.bsa.org/country/BSA%20and%20Members/Our%20Members.aspx
  • 12. Ethics in Information Technology, Fourth Edition 12 Worldwide and policy council members of Business Software Alliance (BSA)
  • 13. Relationships Between IT Workers and Employers (cont’d.) • IT workers must set an example and enforce policies regarding the ethical use of IT in: (cont’d.) – Trade secrets • Business information generally unknown to public • Company takes actions to keep confidential • Require cost or effort to develop • Have some degree of uniqueness or novelty – Whistle-blowing • Employee attracts attention to a negligent, illegal, unethical, abusive, or dangerous act that threatens the public interest Ethics in Information Technology, Fourth Edition 13
  • 14. 2. Relationships Between IT Workers and Clients • IT worker provides: – Hardware, software, or services at a certain cost and within a given time frame • Client provides: – Compensation – Access to key contacts – Work space • Relationship is usually documented in contractual terms Ethics in Information Technology, Fourth Edition 14
  • 15. Relationships Between IT Workers and Clients (cont’d.) • Client makes decisions about a project based on information, alternatives, and recommendations provided by the IT worker • Client trusts IT worker to act in client’s best interests • IT worker trusts that client will provide relevant information, listen to and understand what the IT worker says, ask questions to understand impact of key decisions, and use the information to make wise choices Ethics in Information Technology, Fourth Edition 15
  • 16. Relationships Between IT Workers and Clients (cont’d.) • Ethical problems arise if a company recommends its own products and services to remedy problems they have detected – Creates a conflict of interest • Problems arise during a project if IT workers are unable to provide full and accurate reporting of a project’s status – Finger pointing and heated discussions can ensue Ethics in Information Technology, Fourth Edition 16
  • 17. Relationships Between IT Workers and Clients (cont’d.) • Fraud – Crime of obtaining goods, services, or property through deception or trickery • Misrepresentation – Misstatement or incomplete statement of material fact – If misrepresentation causes a party to enter into a contract, that party may have the right to cancel contract or seek reimbursement for damages Ethics in Information Technology, Fourth Edition 17
  • 18. Relationships Between IT Workers and Clients (cont’d.) • Breach of contract – One party fails to meet the terms of a contract – When there is material breach of contract: • The non-breaching party may rescind the contract, seek restitution of any compensation paid to the breaching party, and be discharged from any further performance under the contract • IT projects are joint efforts in which vendors and customers work together – When there are problems, it is difficult to assign who is at fault Ethics in Information Technology, Fourth Edition 18
  • 19. 3. Relationships Between IT Workers and Suppliers • Develop good working relationships with suppliers: – To encourage flow of useful information and ideas to develop innovative and cost-effective ways of using the supplier in ways that the IT worker may not have considered – By dealing fairly with them – By not making unreasonable demands Ethics in Information Technology, Fourth Edition 19
  • 20. Relationships Between IT Workers and Suppliers (cont’d.) • Bribery – Providing money, property, or favors to obtain a business advantage – U.S. Foreign Corrupt Practices Act (FCPA): crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office – At what point does a gift become a bribe? – No gift should be hidden – Perceptions of donor and recipient can differ – United Nations Convention Against Corruption is a global treaty to fight bribery and corruption Ethics in Information Technology, Fourth Edition 20
  • 21. Ethics in Information Technology, Fourth Edition 21 Relationships Between IT Workers and Suppliers (cont’d.)
  • 22. 4. Relationships Between IT Workers and Other Professionals • Professionals feel a degree of loyalty to other members of their profession • Professionals owe each other adherence to their profession’s code of conduct • Ethical problems among the IT profession – Résumé inflation on 30% of U.S. job applications – Inappropriate sharing of corporate information • Information might be sold intentionally or shared informally with those who have no need to know Ethics in Information Technology, Fourth Edition 22
  • 23. 5. Relationships Between IT Workers and IT Users • IT user: person using a hardware or software product • IT workers’ duties – Understand users’ needs and capabilities – Deliver products and services that meet those needs – Establish environment that supports ethical behavior: • To discourages software piracy • To minimize inappropriate use of corporate computing resources • To avoid inappropriate sharing of information Ethics in Information Technology, Fourth Edition 23
  • 24. 6. Relationships Between IT Workers and Society • Society expects members of a profession: – To provide significant benefits – To not cause harm through their actions • Actions of an IT worker can affect society • Professional organizations provide codes of ethics to guide IT workers’ actions Ethics in Information Technology, Fourth Edition 24
  • 25. Professional Codes of Ethics • State the principles and core values that are essential to the work of an occupational group • Most codes of ethics include: – What the organization aspires to become – Rules and principles by which members of the organization are expected to abide • Many codes also include commitment to continuing education for those who practice the profession Ethics in Information Technology, Fourth Edition 25
  • 26. Professional Codes of Ethics (cont’d.) • Following a professional code of ethics can produce benefits for the individual, the profession, and society as a whole – Ethical decision making – High standards of practice and ethical behavior – Trust and respect from general public – Evaluation benchmark for self-assessment Ethics in Information Technology, Fourth Edition 26
  • 27. Professional Organizations • No universal code of ethics for IT professionals • No single, formal organization of IT professionals has emerged as preeminent • Five of the most prominent organizations include: – Association for Computing Machinery (ACM) – Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS) – Association of IT Professionals (AITP) – SysAdmin, Audit, Network, Security (SANS) Institute Ethics in Information Technology, Fourth Edition 27
  • 28. Certification • Indicates that a professional possesses a particular set of skills, knowledge, or abilities in the opinion of the certifying organization • Can also apply to products • Generally voluntary • May or may not require adherence to a code of ethics • Employers view as benchmark of knowledge • Opinions are divided on value of certification Ethics in Information Technology, Fourth Edition 28
  • 29. Certification (cont’d.) • Vendor certifications – Some certifications substantially improve IT workers’ salaries and career prospects – Relevant for narrowly defined roles or certain aspects of broader roles – Require passing a written exam, or in some cases, a hands-on lab to demonstrate skills and knowledge – Can take years to obtain necessary experience – Training can be expensive Ethics in Information Technology, Fourth Edition 29
  • 30. Certification (cont’d.) • Industry association certifications – Require a higher level of experience and a broader perspective than vendor certifications – Must sit for and pass written exam – May need to pay annual renewal fee, earn continuing education credits, and/or pass renewal test – Lag in developing tests that cover new technologies – Are moving from purely technical content to a broader mix of technical, business, and behavioral competencies Ethics in Information Technology, Fourth Edition 30
  • 31. Government Licensing • License is a government-issued permission to engage in an activity or operate a business • Generally administered at the state level in the United States • Often requires that recipient pass a test • Some professionals must be licensed – doctors, lawyers, CPAs, medical and day care providers, engineers • One goal: protect public safety Ethics in Information Technology, Fourth Edition 31
  • 32. Government Licensing (cont’d.) • Case for licensing IT workers – Encourages following highest standards of profession – Encourages practicing a code of ethics – Violators would be punished • Without licensing, there are no requirements for heightened care and no concept of professional malpractice Ethics in Information Technology, Fourth Edition 32
  • 33. Government Licensing (cont’d.) • Issues associated with government licensing of IT workers – There are few licensing programs for IT professionals • No universally accepted core body of knowledge • Unclear who should manage content and administration of licensing exams • No administrative body to accredit professional education programs • No administrative body to assess and ensure competence of individual workers Ethics in Information Technology, Fourth Edition 33
  • 34. IT Professional Malpractice • Negligence: not doing something that a reasonable person would do, or doing something that a reasonable person would not do • Duty of care: obligation to protect people against any unreasonable harm or risk – Reasonable person standard – Reasonable professional standard • Professional malpractice: professionals who breach the duty of care are liable for injuries that their negligence causes Ethics in Information Technology, Fourth Edition 34
  • 35. IT Users • Employees’ ethical use of IT is an area of growing concern because of increased access to: – Personal computers – Corporate information systems and data – The Internet Ethics in Information Technology, Fourth Edition 35
  • 36. Common Ethical Issues for IT Users • Software piracy • Inappropriate use of computing resources – Erodes productivity and wastes time – Could lead to lawsuits • Inappropriate sharing of information, including: – Every organization stores vast amounts of private or confidential data • Private data (employees and customers) • Confidential information (company and operations) Ethics in Information Technology, Fourth Edition 36
  • 37. Supporting the Ethical Practices of IT Users • Policies that protect against abuses: – Set forth general rights and responsibilities of users – Create boundaries of acceptable behavior – Enable management to punish violators • Policy components include: – Establishing guidelines for use of company software – Defining appropriate use of IT resources – Structuring information systems to protect data and information – Installing and maintaining a corporate firewall Ethics in Information Technology, Fourth Edition 37
  • 38. Supporting the Ethical Practices of IT Users (cont’d.) Ethics in Information Technology, Fourth Edition 38
  • 39. Ethics in Information Technology, Fourth Edition 39
  • 40. Compliance • To be in accordance with established policies, guidelines, specifications, and legislation – Sarbanes-Oxley – established requirements for internal controls – HIPAA – ensures security and privacy of employee healthcare data – Failure to be in conformance can lead to criminal or civil penalties and also lawsuits Ethics in Information Technology, Fourth Edition 40
  • 41. Compliance (cont’d.) • Major challenge to comply with multiple government and industry regulations that are sometimes in conflict • To meet this challenge: – Implement software to track and record compliance actions – Hire management consultants for advice and training – Create Chief Compliance Officer position Ethics in Information Technology, Fourth Edition 41
  • 42. Compliance (cont’d.) • Audit committee is subset of the board of directors, with oversight for the following activities: – Quality and integrity of accounting and reporting practices and controls – Compliance with legal and regulatory requirements – Qualifications, independence, and performance of organization’s independent auditor – Performance of company’s internal audit team Ethics in Information Technology, Fourth Edition 42
  • 43. Compliance (cont’d.) • Internal audit committee responsibilities: – Determine that internal systems and controls are adequate and effective – Verify existence of company assets and maintain proper safeguards over their protection – Measure the organization’s compliance with its own policies and procedures – Insure that institutional policies and procedures, appropriate laws, and good practices are followed – Evaluate adequacy and reliability of information available for management decision making Ethics in Information Technology, Fourth Edition 43
  • 44. Summary • Professionals – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized • From a legal standpoint, a professional: – Has passed the state licensing requirements – Has earned the right to practice in a state(s) • IT professionals have many different relationships – Each with its own ethical issues and potential problems Ethics in Information Technology, Fourth Edition 44
  • 45. Summary (cont’d.) • Professional code of ethics – States the principles and core values essential to the work of an occupational group – Serves as a guideline for ethical decision making – Promotes high standards of practice and behavior – Enhances trust and respect from the general public – Provides an evaluation benchmark • Licensing and certification of IT professionals – Would increase the reliability and effectiveness of information systems – Raises many issues Ethics in Information Technology, Fourth Edition 45
  • 46. Summary (cont’d.) • IT-related professional organizations have developed their code of ethics that: – Outlines what the organization aspires to become – Lists rules and principles for members – Includes a commitment to continuing education for those who practice the profession • Audit committee and internal audit team have a major role in ensuring that both the IT organization and IT users are in compliance with guidelines and various legal and regulatory practices Ethics in Information Technology, Fourth Edition 46

Editor's Notes

  • #2: professional : مهني distinguish : تميز factors : العوامل transforming تحويل arise : نشأ , ظهر
  • #3: Compliance: الامتثال
  • #6: Legal perspective: منظور قانوني
  • #7: The Changing Professional Services Industry: Forces: Sophistication: تطور Bargains: الصفقات Governance: الحكم, Scandals : فضائح Connectivity : الاتصال // instant communications : الاتصالات الفورية Transparency : شفافية Modularization : تقنينها, البنيوية // able to outsource modules: Globalization : العولمة , عالمي Commoditization : سلع استهلاكية
  • #8: Society at large: المجتمع ككل
  • #9: accept : قبل , وافق aspects : الجوانب, النواحي code of conduct: مدونة لقواعد السلوك steward : منظم
  • #10: Piracy: قرصنة, Entitled: المعنون, بعنوان tempted : يغري, اغراء violate : انتهاك Alliance : تحالف Trade: التجارة // trade group:مجموعة تجارية representing : تمثل prosecuted : محاكمة
  • #11: www.bsa.org/country/BSA%20and%20Members/Our%20Members.aspx Worldwide and policy council members of Business Software Alliance (BSA)
  • #13: Trade secrets:الأسرار التجارة uniqueness : تميز // novelty: إبداع attracts : يجذب // negligent: مهمل // illegal: غير شرعي// abusive: متعسف, مؤذ جسديا, بذيء threatens : يهدد // interest: مصلحة
  • #14: Compensation: تعويضات, الراتب Access to key contacts: الوصول إلى جهات الاتصال الرئيسية Work space: مكان العمل
  • #18: Breach of contract : الإخلال بالعقد One party fails : فشل طرف واحد non-breaching: غير المخل // rescind : فسخ // restitution :تعويض //compensation : تعويضات discharged : غير مكلف further performance: مزيد من الأداء vendors : البائعين assign : حدد
  • #19: encourage : شجع // innovative : مبتكرة //considered: يعتبر unreasonable : غير معقول // demands:مطالب
  • #20: Bribery: رشوة // property: ممتلكات// favors : تفضل Perceptions : المفاهيم// donor :المانح// Convention :اتفاقية// Corruption :فساد// treaty :معاهدة
  • #21: Obligation:التزام Favorably:بشكل إيجابي:
  • #22: owe : ندين //adherence : التزام //inflation : التضخم Inappropriate :غير ملائم //sold intentionally :تباع عمدا//
  • #23: inappropriate : غير ملائم
  • #24: significant :هام //
  • #25: occupational مهني // aspires :يطمح abide :التزم , التقيد
  • #27: universal : عالمي //emerged : ظهرت // preeminent: بارزة // prominent :شهير
  • #28: Voluntary: طوعي // adherence التزام //benchmark : مؤشر
  • #29: substantially :جوهريا, بصورة ملحوظة // narrowly : بصورة محدودة
  • #32: Violators : المخالفين professional malpractice: سوء الممارسة المهنية Malpractice: تزوير
  • #33: Issues associated : القضايا المرتبطة
  • #34: IT Professional Malpractice : Negligence الإهمال: reasonable : معقول Duty of care: واجب الرعاية obligation : التزام , واجب Professional malpractice: سوء الممارسة المهنية: breach : خرق , مخالفة
  • #35: Corporate:
  • #36: Erodes : يضعف Lawsuits: الدعاوى القضائية vast : كبير , ضخم
  • #37: Abuses: انتهاكات Violators: المخالفين
  • #38: Temps: المؤقتين:
  • #39: Pirated software:البرمجيات المقرصنة: Wiretapping:التنصت Eavesdropping: التنصت: Surveillance: المراقبة: adherence
  • #40: Compliance: Legislation تشريع , القانون
  • #42: committee لجنة