SlideShare a Scribd company logo
1 of 27
Download to read offline
1
Social and Ethical
Consideration
of IT Use
Abdisalam Issa-Salwe
Thames Valley University
Abdisalam Issa-Salwe, Thames Valley University
2
Topic list
 Ethics and IT use
 Social, political issues raised by
information systems
 Data protection
 Moral dimensions of information
society
Abdisalam Issa-Salwe, Thames Valley University
3
IT Dilemma
 Computing technology is the most
powerful and flexible technology
ever devised.
 It is changing everything - where
and how we work, learn, shop, eat,
vote, receive medical care, spend
free time, make war and friends.
Abdisalam Issa-Salwe, Thames Valley University
4
IT Dilemma (cont…)
 The information revolution has
become a tidal wave that threatens
to engulf and change all that
humans value.
 Governments, organisations and
individual citizens therefore would
make a grave mistake if they view the
computer revolution as "merely
technological".
 It is fundamentally social and ethical.
Abdisalam Issa-Salwe, Thames Valley University
5
IT Dilemma (cont…)
 IT revolution widens to satisfy human
thirst for knowledge and the desire to be
the dominant species on the globe and in
the universe.
 The newly-found powers of computing
come at a price - dependence.
 Information is now the life blood of
society and its organisations, and our
dependence grows daily with the advance
of the global information net and
multimedia
Abdisalam Issa-Salwe, Thames Valley University
6
IT dilemma (cont…)
 Utilising new technology, needs
implementing better security.
 Digital technology as a double-edge
sword that has many benefits but also
presents ethical dilemmas.
 Information can be gathered,
manipulated and disseminated more
quickly now than ever in our history.
Abdisalam Issa-Salwe, Thames Valley University
7
Data protection principles
 Personal data is information about a
living individual, including
expression of opinion about him or
her.
 Data about organisation is not
personal data
 Data users are organisation or
individuals who control personal
data and the use of personal data
 A data subject is an individual who
is the subject of personal data
Abdisalam Issa-Salwe, Thames Valley University
8
Ethics
 Principles of right and wrong
 Can be used by individuals acting as
free moral agents to make choices
to guide their behaviour
 Understanding the moral risks of
new technology
 Establishing corporate ethics
policies that include information
systems issues
Abdisalam Issa-Salwe, Thames Valley University
9
Ethics (cont…)
 The dynamics connecting ethical,
social, and political issues
 Identifies the moral dimensions of
the “information society”, across
individual, social, and political levels
of action
 Information:
 the new life-blood of society, empowers
those who have it;
 but it also disenfranchises those who
do not
Abdisalam Issa-Salwe, Thames Valley University
10
Moral Dimensions
 Information rights and obligations
 Property rights
 Accountability and control
 System quality
 Quality of life
Abdisalam Issa-Salwe, Thames Valley University
11
ETHICAL, SOCIAL & POLITICAL ISSUES
INDIVIDUAL
SOCIETY
POLITY
ETHICAL ISSUES
SOCIAL ISSUES
POLITICAL ISSUES
QUALITY OF LIFE
INFORMATION
RIGHTS &
OBLIGATIONS
PROPERTY
RIGHTS &
OBLIGATIONS
ACCOUNTABILITY
& CONTROL
SYSTEM
QUALITY
INFORMATION
&
TECHNOLOGY
Abdisalam Issa-Salwe, Thames Valley University
12
Basic concepts
 Responsibility: accepting costs,
duties, obligations for decisions
 Accountability: assessing
responsibilities for decisions &
actions
 Liability: must pay for legal
damages
 Due process: insures laws are
applied properly
Abdisalam Issa-Salwe, Thames Valley University
13
Edward F. Gehringer
Abdisalam Issa-Salwe, Thames Valley University
14
Privacy and data protection
 Privacy:
 The right of the individual to control
the use of information about him or
her, including information on financial
status, health and lifestyle (I.e. prevent
unauthorised disclosure).
Abdisalam Issa-Salwe, Thames Valley University
15
Information rights
 The right of the individual to control
the use of information about him or
her, including information on
financial status, health and lifestyle
(i.e. prevent unauthorised
disclosure).
 Fair information practices: Set of
principles governing the collection
and use of information on the basis
of U.S. and European privacy laws
Abdisalam Issa-Salwe, Thames Valley University
16
Privacy protection tools
Abdisalam Issa-Salwe, Thames Valley University
17
Property rights
 Intellectual property: Intangible creations
protected by law
 Trade secret: Intellectual work or product
belonging to business, not in public
domain
 Copyright: Statutory grant protecting
intellectual property from getting copied
for 28 years
 Patents: Legal document granting the
owner an exclusive monopoly on the
ideas behind an invention for 20 years
Abdisalam Issa-Salwe, Thames Valley University
18
Property rights (cont…)
 Ethical issues: Production of
intellectual property
 Social issues: Current intellectual
property laws breaking down
 Political issues: Creation of new
property protection measures
Abdisalam Issa-Salwe, Thames Valley University
19
Property rights (cont…)
 Computer crime: Commission of
illegal acts through the use of a
computer or against a computer
system
 Computer abuse: Commission of
acts involving a computer that may
not be illegal but are considered
unethical
Abdisalam Issa-Salwe, Thames Valley University
20
Data Protection Act 1998
 The Data Protection Act 1998
regulates how and when
information relating to individuals
may be obtained, used and
disclosed.
 Makes new provision for the
regulation of the processing of
information relating to individuals,
including the obtaining, holding, use
or disclosure of such information.
Abdisalam Issa-Salwe, Thames Valley University
21
Data Protection Act 1998 (cont…)
In this Act, unless the context otherwise requires
- "data" means information which
(a) is being processed by means of equipment
operating automatically in response to
instructions given for that purpose,
(b) is recorded with the intention that it should
be processed by means of such equipment,
(c) is recorded as part of a relevant filing
system or with the intention that it should form
part of a relevant filing system, or
(d) does not fall within paragraph (a), (b) or
(c) but forms part of an accessible record as
defined by section 68
Abdisalam Issa-Salwe, Thames Valley University
22
Data Protection Act 1998 (cont…)
 The Act also allows individuals
access to personal data relating to
them, to challenge misuse of it and
to seek redress.
 Enforcement of the Act is through
the Information Commissioner
Abdisalam Issa-Salwe, Thames Valley University
23
Data Protection Act 1998 (cont…)
 The Act places a duty on any person
or organisation that holds personal
information about living individuals
on computer or in certain manual
data systems (or has such
information processed on computer
by others)
 Comply with the eight data
protection principles and to notify
the Commissioner about the
processing carried out.
Abdisalam Issa-Salwe, Thames Valley University
24
Data Protection Act 1998 (cont…)
The Act principles require personal data to be:
 fairly and lawfully obtained;
 held only for specific and lawful purposes and not
processed in any manner incompatible with those
purposes;
 adequate, relevant and not excessive for those
purposes;
 accurate and where necessary kept up-to-date,
not kept for longer than necessary;
 processed in accordance with the rights of the
person to whom the data refers;
 kept securely to ensure data is not lost, disposed
of or misused;
 not transferred out of the European Economic
Area unless the destination has an adequate level
of data protection.
Abdisalam Issa-Salwe, Thames Valley University
25
Data Protection Act 1998 (cont…)
 Data controller means, subject to subsection (4), a
person who (either alone or jointly or in common with
other persons) determines the purposes for which and
the manner in which any personal data are, or are to
be, processed;
 Data processor, in relation to personal data, means any
person (other than an employee of the data controller)
who processes the data on behalf of the data controller;
 Data subject means an individual who is the subject of
personal data;
 Personal data means data which relate to a living
individual who can be identified –
(a) from those data, or
(b) from those data and other information which is in the
possession of, or is likely to come into the possession of,
the data controller
Abdisalam Issa-Salwe, Thames Valley University
26
Data Protection Act 1998 (cont…)
 Sensitive personal data: "sensitive personal
data" means personal data consisting of
information as to
(a) the racial or ethnic origin of the data subject,
(b) his political opinions,
(c) his religious beliefs or other beliefs of a similar nature,
(d) whether he is a member of a trade union
(e) his physical or mental health or condition,
(f) his sexual life,
(g) the commission or alleged commission by him of any
offence, or
(h) any proceedings for any offence committed or alleged to
have been committed by him, the disposal of such
proceedings or the sentence of any court in such proceedings.
Abdisalam Issa-Salwe, Thames Valley University
27
Task
Find out from the Internet
how organisations are
committed to protecting
privacy information.
Discuss

More Related Content

What's hot

Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPTrilateral Research
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE-Journal ICT4D
 

What's hot (20)

Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data protection act
Data protection act Data protection act
Data protection act
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Information governance
Information governanceInformation governance
Information governance
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 

Similar to Lecture7(ethics&it use)

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesGiannisBasa
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalSofie van der Meulen
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy lawblogzilla
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 

Similar to Lecture7(ethics&it use) (20)

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
VIAF GDPR
VIAF GDPRVIAF GDPR
VIAF GDPR
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 

More from Taibah University, College of Computer Science & Engineering

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 

Recently uploaded

Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 

Recently uploaded (20)

Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 

Lecture7(ethics&it use)

  • 1. 1 Social and Ethical Consideration of IT Use Abdisalam Issa-Salwe Thames Valley University
  • 2. Abdisalam Issa-Salwe, Thames Valley University 2 Topic list  Ethics and IT use  Social, political issues raised by information systems  Data protection  Moral dimensions of information society
  • 3. Abdisalam Issa-Salwe, Thames Valley University 3 IT Dilemma  Computing technology is the most powerful and flexible technology ever devised.  It is changing everything - where and how we work, learn, shop, eat, vote, receive medical care, spend free time, make war and friends.
  • 4. Abdisalam Issa-Salwe, Thames Valley University 4 IT Dilemma (cont…)  The information revolution has become a tidal wave that threatens to engulf and change all that humans value.  Governments, organisations and individual citizens therefore would make a grave mistake if they view the computer revolution as "merely technological".  It is fundamentally social and ethical.
  • 5. Abdisalam Issa-Salwe, Thames Valley University 5 IT Dilemma (cont…)  IT revolution widens to satisfy human thirst for knowledge and the desire to be the dominant species on the globe and in the universe.  The newly-found powers of computing come at a price - dependence.  Information is now the life blood of society and its organisations, and our dependence grows daily with the advance of the global information net and multimedia
  • 6. Abdisalam Issa-Salwe, Thames Valley University 6 IT dilemma (cont…)  Utilising new technology, needs implementing better security.  Digital technology as a double-edge sword that has many benefits but also presents ethical dilemmas.  Information can be gathered, manipulated and disseminated more quickly now than ever in our history.
  • 7. Abdisalam Issa-Salwe, Thames Valley University 7 Data protection principles  Personal data is information about a living individual, including expression of opinion about him or her.  Data about organisation is not personal data  Data users are organisation or individuals who control personal data and the use of personal data  A data subject is an individual who is the subject of personal data
  • 8. Abdisalam Issa-Salwe, Thames Valley University 8 Ethics  Principles of right and wrong  Can be used by individuals acting as free moral agents to make choices to guide their behaviour  Understanding the moral risks of new technology  Establishing corporate ethics policies that include information systems issues
  • 9. Abdisalam Issa-Salwe, Thames Valley University 9 Ethics (cont…)  The dynamics connecting ethical, social, and political issues  Identifies the moral dimensions of the “information society”, across individual, social, and political levels of action  Information:  the new life-blood of society, empowers those who have it;  but it also disenfranchises those who do not
  • 10. Abdisalam Issa-Salwe, Thames Valley University 10 Moral Dimensions  Information rights and obligations  Property rights  Accountability and control  System quality  Quality of life
  • 11. Abdisalam Issa-Salwe, Thames Valley University 11 ETHICAL, SOCIAL & POLITICAL ISSUES INDIVIDUAL SOCIETY POLITY ETHICAL ISSUES SOCIAL ISSUES POLITICAL ISSUES QUALITY OF LIFE INFORMATION RIGHTS & OBLIGATIONS PROPERTY RIGHTS & OBLIGATIONS ACCOUNTABILITY & CONTROL SYSTEM QUALITY INFORMATION & TECHNOLOGY
  • 12. Abdisalam Issa-Salwe, Thames Valley University 12 Basic concepts  Responsibility: accepting costs, duties, obligations for decisions  Accountability: assessing responsibilities for decisions & actions  Liability: must pay for legal damages  Due process: insures laws are applied properly
  • 13. Abdisalam Issa-Salwe, Thames Valley University 13 Edward F. Gehringer
  • 14. Abdisalam Issa-Salwe, Thames Valley University 14 Privacy and data protection  Privacy:  The right of the individual to control the use of information about him or her, including information on financial status, health and lifestyle (I.e. prevent unauthorised disclosure).
  • 15. Abdisalam Issa-Salwe, Thames Valley University 15 Information rights  The right of the individual to control the use of information about him or her, including information on financial status, health and lifestyle (i.e. prevent unauthorised disclosure).  Fair information practices: Set of principles governing the collection and use of information on the basis of U.S. and European privacy laws
  • 16. Abdisalam Issa-Salwe, Thames Valley University 16 Privacy protection tools
  • 17. Abdisalam Issa-Salwe, Thames Valley University 17 Property rights  Intellectual property: Intangible creations protected by law  Trade secret: Intellectual work or product belonging to business, not in public domain  Copyright: Statutory grant protecting intellectual property from getting copied for 28 years  Patents: Legal document granting the owner an exclusive monopoly on the ideas behind an invention for 20 years
  • 18. Abdisalam Issa-Salwe, Thames Valley University 18 Property rights (cont…)  Ethical issues: Production of intellectual property  Social issues: Current intellectual property laws breaking down  Political issues: Creation of new property protection measures
  • 19. Abdisalam Issa-Salwe, Thames Valley University 19 Property rights (cont…)  Computer crime: Commission of illegal acts through the use of a computer or against a computer system  Computer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical
  • 20. Abdisalam Issa-Salwe, Thames Valley University 20 Data Protection Act 1998  The Data Protection Act 1998 regulates how and when information relating to individuals may be obtained, used and disclosed.  Makes new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information.
  • 21. Abdisalam Issa-Salwe, Thames Valley University 21 Data Protection Act 1998 (cont…) In this Act, unless the context otherwise requires - "data" means information which (a) is being processed by means of equipment operating automatically in response to instructions given for that purpose, (b) is recorded with the intention that it should be processed by means of such equipment, (c) is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, or (d) does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68
  • 22. Abdisalam Issa-Salwe, Thames Valley University 22 Data Protection Act 1998 (cont…)  The Act also allows individuals access to personal data relating to them, to challenge misuse of it and to seek redress.  Enforcement of the Act is through the Information Commissioner
  • 23. Abdisalam Issa-Salwe, Thames Valley University 23 Data Protection Act 1998 (cont…)  The Act places a duty on any person or organisation that holds personal information about living individuals on computer or in certain manual data systems (or has such information processed on computer by others)  Comply with the eight data protection principles and to notify the Commissioner about the processing carried out.
  • 24. Abdisalam Issa-Salwe, Thames Valley University 24 Data Protection Act 1998 (cont…) The Act principles require personal data to be:  fairly and lawfully obtained;  held only for specific and lawful purposes and not processed in any manner incompatible with those purposes;  adequate, relevant and not excessive for those purposes;  accurate and where necessary kept up-to-date, not kept for longer than necessary;  processed in accordance with the rights of the person to whom the data refers;  kept securely to ensure data is not lost, disposed of or misused;  not transferred out of the European Economic Area unless the destination has an adequate level of data protection.
  • 25. Abdisalam Issa-Salwe, Thames Valley University 25 Data Protection Act 1998 (cont…)  Data controller means, subject to subsection (4), a person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal data are, or are to be, processed;  Data processor, in relation to personal data, means any person (other than an employee of the data controller) who processes the data on behalf of the data controller;  Data subject means an individual who is the subject of personal data;  Personal data means data which relate to a living individual who can be identified – (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller
  • 26. Abdisalam Issa-Salwe, Thames Valley University 26 Data Protection Act 1998 (cont…)  Sensitive personal data: "sensitive personal data" means personal data consisting of information as to (a) the racial or ethnic origin of the data subject, (b) his political opinions, (c) his religious beliefs or other beliefs of a similar nature, (d) whether he is a member of a trade union (e) his physical or mental health or condition, (f) his sexual life, (g) the commission or alleged commission by him of any offence, or (h) any proceedings for any offence committed or alleged to have been committed by him, the disposal of such proceedings or the sentence of any court in such proceedings.
  • 27. Abdisalam Issa-Salwe, Thames Valley University 27 Task Find out from the Internet how organisations are committed to protecting privacy information. Discuss