SlideShare una empresa de Scribd logo
1 de 36
Ethics in Information Technology, Second Edition Chapter 2 Ethics for IT Professionals and IT Users Ethics in Information Technology, Second Edition
Objectives ,[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Objectives (continued) ,[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
IT Professionals ,[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Are IT Workers Professionals? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Are IT Workers Professionals? (continued) ,[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Professional Relationships That Must Be Managed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Employers ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Members of Business Software Alliance (as of July 2005) Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Employers (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Clients ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Clients (continued) ,[object Object],[object Object],Ethics in Information Technology, Second Edition
Legal Overview:  Fraud, Misrepresentation,  and Breach of Contract ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Legal Overview:  Fraud, Misrepresentation, and  Breach of Contract (continued) ,[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Suppliers ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Suppliers (continued) ,[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Distinguishing Between a Bribe and a Gift Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Other Professionals ,[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and IT Users ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Relationships Between IT Professionals and Society ,[object Object],Ethics in Information Technology, Second Edition
The Ethical Behavior of IT Professionals ,[object Object],Ethics in Information Technology, Second Edition
Professional Codes of Ethics ,[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Professional Codes of Ethics (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Professional Organizations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Certification ,[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Certification (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Certification (continued) ,[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Government Licensing ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Government Licensing (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
IT Professional Malpractice ,[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
IT Users ,[object Object],Ethics in Information Technology, Second Edition
Common Ethical Issues for IT Users ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Supporting the Ethical Practices of IT Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Manager’s Checklist of Items to Consider when Establishing an IT Usage Policy Ethics in Information Technology, Second Edition
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Ethics in Information Technology, Second Edition

Más contenido relacionado

La actualidad más candente

Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxFroilan Cantillo
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 

La actualidad más candente (20)

Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
12 security policies
12 security policies12 security policies
12 security policies
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 

Destacado

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Are Personal Ethics Enough
Are Personal Ethics EnoughAre Personal Ethics Enough
Are Personal Ethics Enoughjim
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11stanbridge
 
Role of Ethics in Personal Finance
Role of Ethics in Personal FinanceRole of Ethics in Personal Finance
Role of Ethics in Personal FinanceAnamika Pundir
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Nawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeShibbir Shimanto
 

Destacado (20)

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Are Personal Ethics Enough
Are Personal Ethics EnoughAre Personal Ethics Enough
Are Personal Ethics Enough
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11
 
IRBsearch | GLBA data
IRBsearch | GLBA dataIRBsearch | GLBA data
IRBsearch | GLBA data
 
Role of Ethics in Personal Finance
Role of Ethics in Personal FinanceRole of Ethics in Personal Finance
Role of Ethics in Personal Finance
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of Life
 

Similar a Ethic02

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineeringjndatirwa
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docxdrennanmicah
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 
The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)JISC.AM
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxnormanibarber20063
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesRichard Dioteles
 

Similar a Ethic02 (20)

2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
Chapter 2_dp-pertemuan 2&3
 Chapter 2_dp-pertemuan 2&3 Chapter 2_dp-pertemuan 2&3
Chapter 2_dp-pertemuan 2&3
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 
Ict governance
Ict governanceIct governance
Ict governance
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.ppt
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Review questions
Review questionsReview questions
Review questions
 
The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)
 
Tl vi a
Tl vi aTl vi a
Tl vi a
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docx
 
Communication & Planning.pptx
Communication & Planning.pptxCommunication & Planning.pptx
Communication & Planning.pptx
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
 

Más de Larcyneil Pascual

Introduction to reading by sir larcyneilpascual, maed
Introduction to reading by sir larcyneilpascual, maedIntroduction to reading by sir larcyneilpascual, maed
Introduction to reading by sir larcyneilpascual, maedLarcyneil Pascual
 
Part 1 facilitating learning intro
Part 1 facilitating learning introPart 1 facilitating learning intro
Part 1 facilitating learning introLarcyneil Pascual
 
Introduction to Facilitating Human Learning
Introduction to Facilitating Human LearningIntroduction to Facilitating Human Learning
Introduction to Facilitating Human LearningLarcyneil Pascual
 
English for Specific Purposes (ESP)
English for Specific Purposes (ESP)English for Specific Purposes (ESP)
English for Specific Purposes (ESP)Larcyneil Pascual
 

Más de Larcyneil Pascual (7)

Introduction to reading by sir larcyneilpascual, maed
Introduction to reading by sir larcyneilpascual, maedIntroduction to reading by sir larcyneilpascual, maed
Introduction to reading by sir larcyneilpascual, maed
 
Part 1 facilitating learning intro
Part 1 facilitating learning introPart 1 facilitating learning intro
Part 1 facilitating learning intro
 
Introduction to Facilitating Human Learning
Introduction to Facilitating Human LearningIntroduction to Facilitating Human Learning
Introduction to Facilitating Human Learning
 
English for Specific Purposes (ESP)
English for Specific Purposes (ESP)English for Specific Purposes (ESP)
English for Specific Purposes (ESP)
 
Northlin1
Northlin1Northlin1
Northlin1
 
Northlink
NorthlinkNorthlink
Northlink
 
Panunumpa ng mga hurado
Panunumpa ng mga huradoPanunumpa ng mga hurado
Panunumpa ng mga hurado
 

Ethic02

  • 1. Ethics in Information Technology, Second Edition Chapter 2 Ethics for IT Professionals and IT Users Ethics in Information Technology, Second Edition
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Members of Business Software Alliance (as of July 2005) Ethics in Information Technology, Second Edition
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Distinguishing Between a Bribe and a Gift Ethics in Information Technology, Second Edition
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Manager’s Checklist of Items to Consider when Establishing an IT Usage Policy Ethics in Information Technology, Second Edition
  • 35.
  • 36.