Ethical Implementatn -lecture#4

Embed Size (px)

Citation preview

  • 8/7/2019 Ethical Implementatn -lecture#4

    1/22

    Lecture 4Lecture 4Ethical implications of ITEthical implications of IT

    AndAndModel of FirmModel of Firm

  • 8/7/2019 Ethical Implementatn -lecture#4

    2/22

    IntroductionIntroduction

    Ethics is a package guiding beliefs,Ethics is a package guiding beliefs,standards, or ideals that pervades anstandards, or ideals that pervades an

    individual or a group or communityindividual or a group or communityof people.of people.

  • 8/7/2019 Ethical Implementatn -lecture#4

    3/22

    How the Ethical Culture IsImposedHow the Ethical Culture IsImposed

    The top level management has toThe top level management has tolook into itlook into it

    Ethics ProgramEthics Program Tailored Corporate Codes: designingTailored Corporate Codes: designing

    own ethicsown ethics

  • 8/7/2019 Ethical Implementatn -lecture#4

    4/22

    Ethics and ITEthics and IT

    Computer EthicsComputer Ethics

    Analysis of nature and social impact ofAnalysis of nature and social impact ofcomputer technologycomputer technology

    Consist of two main activitiesConsist of two main activities1.1. Be alert to and aware of how the computer is affectingBe alert to and aware of how the computer is affecting

    the societythe society

    2.2. Make sure the technology is used in the right wayMake sure the technology is used in the right way

  • 8/7/2019 Ethical Implementatn -lecture#4

    5/22

    Reasons forImportance OfReasons forImportance Of

    Computer EthicsComputer Ethics Three main reasonsThree main reasons

    Logical Malleability: the ability toLogical Malleability: the ability tomake computer do what you wantmake computer do what you wantfrom it . Threat of people behind thefrom it . Threat of people behind thecomputercomputer

    Transformation Factor: can changeTransformation Factor: can changethe way we do things: email, Videothe way we do things: email, Videoconferencingconferencing

  • 8/7/2019 Ethical Implementatn -lecture#4

    6/22

    Invisibility Factor: the user is unableInvisibility Factor: the user is unableto see the calculationsto see the calculations

  • 8/7/2019 Ethical Implementatn -lecture#4

    7/22

    Social Rights and the ComputerSocial Rights and the Computer

    Rights to the computerRights to the computer

    Computer cannot be kept away fromComputer cannot be kept away from

    the society becausethe society because Right to Computer AccessRight to Computer Access

    Right to Computer SkillsRight to Computer Skills

    Right to Computer SpecialistsRight to Computer Specialists

    Right to Computer Decision MakingRight to Computer Decision Making

  • 8/7/2019 Ethical Implementatn -lecture#4

    8/22

    RightsTo InformationRightsTo Information

    Right to PrivacyRight to Privacy

    Right to AccuracyRight to Accuracy

    Right to PropertyRight to Property Right to AccessRight to Access

  • 8/7/2019 Ethical Implementatn -lecture#4

    9/22

    Codes Of EthicsCodes Of Ethics

    ACM code of professional conductACM code of professional conduct

    DPMA code of ethicsDPMA code of ethics

    ICCP code of EthicsICCP code of Ethics ITAA Code of EthicsITAA Code of Ethics

    Putting the Ethics Codes inPutting the Ethics Codes in

    PerspectivePerspective

  • 8/7/2019 Ethical Implementatn -lecture#4

    10/22

    Ethics and ITspecialistsEthics and ITspecialists

    Different scenario for different userDifferent scenario for different user

    Students have their own ethicsStudents have their own ethics

    Programmers have their own ethicsProgrammers have their own ethics

  • 8/7/2019 Ethical Implementatn -lecture#4

    11/22

    Ethics and CIOEthics and CIO

  • 8/7/2019 Ethical Implementatn -lecture#4

    12/22

    An Ethical planAn Ethical plan

    1.1. Formulate a code of conductFormulate a code of conduct

    2.2. Establish rules of ProcedureEstablish rules of Procedure

    3.3. Making clear the sanctionsMaking clear the sanctions

    4.4. Recognize ethical behaviorRecognize ethical behavior

    5.5. Promote computer lawsPromote computer laws

    6.6. Encourage the rehabilitation programEncourage the rehabilitation program

    7.7. Encourage participation in professional societiesEncourage participation in professional societies

    8.8. Set an exampleSet an example

  • 8/7/2019 Ethical Implementatn -lecture#4

    13/22

    System ModelSystem Model

    Four basic types of modelsFour basic types of models

    1.1. Physical modelsPhysical models2.2. Narrative modelsNarrative models

    3.3. Graphics modelsGraphics models

    4.4. Mathematical modelsMathematical models

  • 8/7/2019 Ethical Implementatn -lecture#4

    14/22

    Physical ModelPhysical Model

    Three dimensional modelThree dimensional model

    Used in shopping centresUsed in shopping centres

    Car prototypesCar prototypes

  • 8/7/2019 Ethical Implementatn -lecture#4

    15/22

    Narrative ModelsNarrative Models

    Used in business worldUsed in business world

    Used by speaking or writingUsed by speaking or writing

    the mostly usedthe mostly used

  • 8/7/2019 Ethical Implementatn -lecture#4

    16/22

    GraphicsmodelGraphicsmodel

    Used by animationUsed by animation

    Using symbolsUsing symbols

    LinesLines

  • 8/7/2019 Ethical Implementatn -lecture#4

    17/22

    Mathematical modelsMathematical models

    EquationsEquations

    FormulaeFormulae

  • 8/7/2019 Ethical Implementatn -lecture#4

    18/22

    Why do we use modelsWhy do we use models

    Facilitate UnderstandingFacilitate Understanding

    Facilitate CommunicationsFacilitate Communications

    Predict the futurePredict the future

  • 8/7/2019 Ethical Implementatn -lecture#4

    19/22

    The General systemmodelThe General systemmodel

    Open loop systemOpen loop system

    System with no feedbackSystem with no feedback

    Closed loop systemClosed loop system

    involves feedbackinvolves feedback

    Management ControlManagement Control

    Control the information and uses itControl the information and uses it

  • 8/7/2019 Ethical Implementatn -lecture#4

    20/22

    General systemmodelGeneral systemmodel

  • 8/7/2019 Ethical Implementatn -lecture#4

    21/22

    Uses ofGeneral systemmodelUses ofGeneral systemmodel

    A supermarketA supermarket

    Primary informationPrimary information

    Personal informationPersonal information Transformation processTransformation process-- openingopening

    cartonscartons

    Management ElementsManagement Elements StandardsStandards-- budgetsbudgets

  • 8/7/2019 Ethical Implementatn -lecture#4

    22/22

    WorkshopWorkshop

    Todays workshop will be doneTodays workshop will be doneindependentlyindependently

    Describe Your job, designation, theDescribe Your job, designation, theethical structure andethical structure and GSM ofGSM of any oneany oneprocedure at your work placeprocedure at your work place