You are on page 1of 17

Binisha Bhattarai

Steffen Marc Frderer


Edward Chantler
Haruna Umar Adoga
Fig. 1
Ethical Dilemmas in IT

19/12/2014

Privacy
Due care
and
diligence

Confidentiality

Ethical
Dilemmas

Professional
standards and
development

Technology awareness

Security
Clipart: Fig. 2

Ethical Dilemmas in IT

19/12/2014

Fig. 3

Care in design before deployments to avoid


preventable accidents or system malfunctions.
Proper care in highly sensitive applications (e.g.
healthcare, financial, Avionics etc.)

Ethical Dilemmas in IT

19/12/2014

NASA Space shuttle challenger explosion (avionics and IT)


Loss of all 7 crew members and the space craft
Adhering to professional code of conduct at all times

BCS (UK) code of conduct section 1a

Fig. 4

Ethical Dilemmas in IT

19/12/2014

BCS code of conduct section 2c

Fig. 5

Professionals are advised to only do work which


they have sufficient competence.

Keep to standards when implementing


technology.
TIA 942 standard for data centers

IT Industry certifications and training from


vendors.
Oracle, Cisco Systems, Juniper, Microsoft,
CompTIA etc..

Ethical Dilemmas in IT

19/12/2014

ITIL framework
developed by the UK government and recognized
globally
IT service management
Not organization specific

Fig. 6
Ethical Dilemmas in IT

19/12/2014

What is Personal Data?


Did you know 70 per cent of data breaches in the UK go unreported? BCS
(2014)
Identity Theft is a growing and costly problem.
Ethical Dilemma Giving private information to third party companies &
consultants.
Great article: Get it in Writing BCS (2008) Have it all on paper, dont rely
on the law.

Data Protection Act 1998 The 8 Principals on


Personal Data
1.

Shall be processed fairly and lawfully

2.

Shall be obtained only for one or more specified


and lawful purposes

3.

Shall be adequate, relevant and not excessive

4.

Shall be accurate

5.

Shall not be kept for longer than is necessary

6.

Shall be processed in accordance with the rights


of the individual

7.

Shall be protected against unauthorized or


unlawful processing

8.

Shall not be transferred to a country or territory


outside the EU unless adequate level of protection

Fig. 7
Ethical Dilemmas in IT

19/12/2014

Ethical Dilemma - What if your job was


programming a Image Hosting Service for
a client?

Exact Address
Name (Phone Book)
Tel. Number (Phone Book)
Cars they Own
Color of Cars
Financial Status

Ethical Dilemmas in IT

Screenshots:
Fig. 8
19/12/2014

Fig. 9

Sony Hack 2014


After sifting through almost 40GB of leaked internal data, one thing is clear: Sony Pictures
appears to have suffered the most embarrassing and all-encompassing hack of internal
corporate data ever made public. Gara (2014)
Ethical Dilemma - Security vs. usability
Firewalls Access and Ease of Work
Captchas Prove you are human
Ethical Dilemma - Security vs. Cost
Windows XP
Upgrading Systems, Maintaing Systems,
Sec. Auditing
Computer Misuse Act 1990

Unauthorised access to computer material.

Unauthorised access with intent to commit or facilitate


commission of further offences.

Unauthorised acts with intent to impair, or with


recklessness as to impairing, operation of computer,
etc.

(Brief Summary, Details:


http://www.legislation.gov.uk/ukpga/1990/18

Fig. 10

For up to date Security news:


http://www.krebsonsecurity.com
Ethical Dilemmas in IT

19/12/2014

Definition
Confidentiality Agreement

I CANT TELL
ANYONE
WHAT I
KNOW

Obligations
Exceptions to Confidentiality
Return of Confidential Information
Duration

Issues

Trade secrecy
Mark Papermaster moving from IBM to Apple computer in 2008

Whistle-blowing

o Edward Snowden - American computer

Fig. 11

professional who leaked classified information from the National


Security Agency (NSA)

Responsibility Of an IT Professional
Ethical Dilemmas in IT

19/12/2014

10

Russia-hacked-webcam-scandal
Cyber bullying
Responsibilities
Technology Developer
Technology Users

What End Users Need to Know ?

Online Privacy & Safety Tips


Email
Passwords
Social Networks
Online Accounts
Safe Web Browsing

Fig. 12

Fig. 13

Ethical Dilemmas in IT

19/12/2014

11

Fig. 14

Fig. 15

Ethical Dilemmas in IT

19/12/2014

12

Association of Certified Fraud Examiners (2014) Image on ethics. Available from:


http://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethicsand-compliance.jpg [Accessed 29th November, 2014]
BHANJA, KISHOR (2013). Ethics for IT Professionals and IT Users. [PowerPoint Slides].
http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users16436414> [Accessed 25th Nov, 2014]
British Computer Society (2008). Get it in writing. Available from:
http://www.bcs.org/content/conWebDoc/20220. [Accessed 11th Dec 2014.]
British Computer Society (2014), BCS code of conduct. Available from:
http://www.bcs.org/upload/pdf/conduct.pdf [Accessed on 15th November, 2014]
British Computer Society (2014). Securing your identity - It's in your DNA. Available from:
http://www.bcs.org/content/conWebDoc/53391. [Accessed 11th Dec 2014.]
Colossal Security (2014) Image on protection. Available from:
http://www.colossalsecurity.co.uk/services/close-protection/ [Accessed 5th December, 2014 ]

Ethical Dilemmas in IT

19/12/2014

13

Gara, T. (2014). A Look Through The Sony Pictures Data Hack. Available from:
http://www.buzzfeed.com/tomgara/sony-hack. [Accessed 11th Dec 2014.]
Institute of family Practice (2014) Image on professional development. Available from:
http://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-developmentcourses.jpg [Accessed 20th November, 2014]
IBM v. Papermaster (2008). Available from: http://en.wikipedia.org/wiki/IBM_v._Papermaster
[Accessed 16th Dec 2014]
Kreiner, J, Flores, A, Krishnamurthy, S. (2004) Ethical Issues Facing Engineers and their
Profession. International Conference on Engineering Education and Research "Progress
through Partnership VSB-TUO, Ostrava, ISSN 1562-3580.
McCullagh, D. (2006). AOL's disturbing glimpse into users' lives. Available from:
http://news.cnet.com/2100-1030_3-6103098.html. [Accessed 11th Dec 2014.]
Microsoft Dynamics AX Community (2014) Question Image. Available from:
http://www.fluidunion.com/ax2012/GotQuestions.png [Accessed 7th December, 2014]
NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of
things'-(2013) Available from:https://www.youtube.com/watch?v=5yB3n9fu-rM [Accessed
22nd Nov, 2014]

Ethical Dilemmas in IT

19/12/2014

14

Sample_NDA. Available from: http://www.hbs.edu/entrepreneurship/pdf/Sample_NDA.pdf


[Accessed 27th Nov, 2014]
Staff and Volunteers maintain strict confidentiality outside the charity. Available from:
http://thedreadnought.co.uk/history/ [Accessed 21st Nov, 2014]
Social Networking Tips (2012). Available from:
http://nnedv.org/downloads/SafetyNet/OVW/NNEDV_SocialNetworkingTips.pdf [Accessed
27th Nov, 2014]
SIMON THOMSEN (2014). Thousands Of Hacked Webcams Are Streaming On A Russian
Website. Available from: http://uk.businessinsider.com/russia-hacked-webcam-scandal2014-11 [Accessed 15th Dec 2014]
Video Cameras(2011). Available from:
http://nnedv.org/downloads/SafetyNet/OVW/NNEDV_VideoCameras_2011.pdf [Accessed 27th
Nov, 2014]
ZUBER, IVANA. (2014). Professional Ethics: Blow The Whistle Or Look The Other Way? Available
from: http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blowthe-whistle-or-look-the-other-way/ [Accessed 21st Nov, 2014]

Ethical Dilemmas in IT

19/12/2014

15

Fig. 1 Association of Certified Fraud Examiners (2014) . . Available from:

http://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpg[Accessed 29th November,


2014]

Fig.
Fig.
Fig.
Fig.

2 Clker.com. (2014). Clipart. Available from: Clker.com. [Accessed 11th Dec 2014.]
3Colossal Security (2014) Available from: http://www.colossalsecurity.co.uk/services/close-protection/ [Accessed 5th December, 2014 ]
4 The British Computer Society (2014), Available from: http://www.bcs.org [Accessed on 15th November, 2014]
5 Institute of family Practice (2014) Available from: http://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-

development-courses.jpg [Accessed 20th November, 2014]

Fig. 6 The ITIL Toolkit, Available from: http://toolkit.itsm.tv [Accessed on 18th December, 2014]
Fig. 7 Javalin (2014). A New Identity Fraud Victim Every Two Seconds. Available from:
https://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-toLatest-Javelin-Strategy-Research-Study/d,pressRoomDetail [Accessed 11th Dec 2014]
Fig. 8 Google Images (2014) Screen Shots. (2014). Available from: google.com & google.com/maps. [Accessed 11th Dec 2014]
Fig. 9 Adams, J. (2013). IT Security For IP Security. Available from:
http://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-security. [Accessed 11th Dec 2014]
Fig. 10 Business Insider. (2014). The Worst Data Breaches of all Time. Available from: http://www.businessinsider.com.au/chartof-the-day-the-worst-organizational-data-breaches-ever-2014-8. [Accessed 11th Dec 2014]
Fig. 11 STAFF AND VOLUNTEERS MAINTAIN STRICT CONFIDENTIALITY OUTSIDE THE CHARITY. Available from:
http://thedreadnought.co.uk/history/ [Accessed 21st Nov, 2014]

Cyber bullying. Available from: https://www.pinterest.com/pin/148055906475646661/


[Accessed 22nd Nov, 2014]
Fig. 12

Fig. 13 CCTV WARNING SIGN. Available from: http://www.solonsecurity.co.uk/product_info.php?product_id=170&cat=43


[Accessed 22nd Nov, 2014]
Fig. 14 The most common social media tools for cyber bullies (2013). Captain Manchester visits schools to raise awareness of
anti-bullying. Available from: http://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying13044.html [Accessed 11th Dec 2014]
Fig. 15 Cyber bullying UK (2013). Cyber Bullying Statistics. Available from: http://www.cyberpesten.be/info/cyber-bullyingstatistics [Accessed 15th Dec 2014]
Fig. 16

Ethical Dilemmas in IT

19/12/2014

16

Fig. 16

Ethical Dilemmas in IT

19/12/2014

17

You might also like