Description of this paper

Loading

I need 1 essay $50 5-7 page paper double space APA format 8-(Answered)

Description

Step-by-step Instant Solution


Question

I need?1 essay

$50

5-7 page paper

double space

APA format

8 references

introduction to the conclusion must be 3-5 pages

Essay from one of the following:

Chapter 1 - Case 1 or Case 2 or Case 3, OR Chapter 2 - Case 1 or Case 2 or Case 3 OR Chapters 3 - Cases 1 or 2 or 3 OR Chapter 4 - Cases 1or 2 or 3

Chapter 5 - Cases 1 or 2 or 3 OR Chapter 6 - Cases 1 or 2 or 3 OR Chapter 7 - Cases 1 or 2 or 3 OR Chapter 8 - Cases 1 or 2 or 3, OR Chapter 9 - Cases 1 or 2 or 3, OR Chapter 10 - Cases 1 or 2 or 3.??


attached is the textbook???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????


ETHICS IN INFORMATION

 

TECHNOLOGY

 

Fifth Edition

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

ETHICS IN INFORMATION

 

TECHNOLOGY

 

Fifth Edition

 


 

George W. Reynolds

 

Strayer University

 


 

Australia ? Brazil ? Mexico ? Singapore ? United Kingdom ? United States

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

This is an electronic version of the print textbook. Due to electronic rights restrictions,

 

some third party content may be suppressed. Editorial review has deemed that any suppressed

 

content does not materially affect the overall learning experience. The publisher reserves the right

 

to remove content from this title at any time if subsequent rights restrictions require it. For

 

valuable information on pricing, previous editions, changes to current editions, and alternate

 

formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for

 

materials in your areas of interest.

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

Ethics in Information Technology,

 

Fifth Edition

 

George W. Reynolds

 

Product Director: Joe Sabatino

 

Product Manager: Clara Goosman

 

Senior Content Developer: Kate Mason

 

Product Assistant: Brad Sullender

 

Senior Rights Acquisitions Specialist:

 

Christine Myaskovsky

 

Senior Brand Manager: Robin LeFevre

 

Art and Cover Direction, Production

 

Management, and Composition: PreMediaGlobal

 

Associate Market Development Manager:

 

Roy Rosa

 

Marketing Coordinator: Christopher Walz

 

Senior Media Developer: Mike Jackson

 

Manufacturing Planner: Ron Montgomery

 

Cover Images: ? Paul Price/Ikon Images/

 

Getty Images.

 


 

? 2015 Cengage Learning

 

WCN: 02-200-203

 


 

ALL RIGHTS RESERVED. No part of this work covered by the

 

copyright herein may be reproduced, transmitted, stored or used

 

in any form or by any means?graphic, electronic, or mechanical,

 

including but not limited to photocopying, recording, scanning,

 

digitizing, taping, Web distribution, information networks, or

 

information storage and retrieval systems, except as permitted under

 

Section 107 or 108 of the 1976 United States Copyright Act?without

 

the prior written permission of the publisher.

 

For product information and technology assistance, contact us at

 

Cengage Learning Customer & Sales Support, 1-800-354-9706.

 

For permission to use material from this text or product, submit all

 

requests online at www.cengage.com/permissions.

 

Further permissions questions can be e-mailed to

 

permissionrequest@cengage.com.

 


 

Some of the product names and company names used in this

 

book have been used for identification purposes only and may

 

be trademarks or registered trademarks of their respective

 

manufacturers and sellers.

 

Library of Congress Control Number: 2013945101

 

ISBN-13: 978-1-285-19715-9

 

ISBN-10: 1-285-19715-1

 

Instructor Edition:

 

ISBN-13: 978-1-285-19718-0

 

ISBN-10: 1-285-19718-6

 

Cengage Learning

 

20 Channel Center Street

 

Boston, MA 02210

 

USA

 

Microsoft and the Office logo are either registered trademarks or trademarks of

 

Microsoft Corporation in the United States and/or other countries. Cengage

 

Learning is an independent entity from the Microsoft Corporation, and not

 

affiliated with Microsoft in any manner.

 

iPhone, iPad, and iPod are registered trademarks of Apple Inc.

 

Cengage Learning reserves the right to revise this publication and make changes

 

from time to time in its content without notice.

 

Cengage Learning is a leading provider of customized learning solutions with

 

office locations around the globe, including Singapore, the United Kingdom,

 

Australia, Mexico, Brazil, and Japan. Locate your local office at:

 

www.cengage.com/global

 

Cengage Learning products are represented in Canada by Nelson Education, Ltd.

 

To learn more about Cengage Learning, visit www.cengage.com

 

Purchase any of our products at your local college store or at our preferred

 

online store: www.cengagebrain.com

 


 

Printed in the United States of America

 

1 2 3 4 5 6 7 17 16 15 14 13

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

BRIEF CONTENTS

 

Preface

 

Chapter

 


 

1

 


 

An Overview of Ethics

 


 

xiii

 

1

 


 

Chapter

 


 

2

 


 

Ethics for IT Workers and IT Users

 


 

41

 


 

Chapter

 


 

3

 


 

Computer and Internet Crime

 


 

81

 


 

Chapter

 


 

4

 


 

Privacy

 


 

131

 


 

Chapter

 


 

5

 


 

Freedom of Expression

 


 

179

 


 

Chapter

 


 

6

 


 

Intellectual Property

 


 

217

 


 

Chapter

 


 

7

 


 

Software Development

 


 

261

 


 

Chapter

 


 

8

 


 

The Impact of Information Technology on Productivity

 

and Quality of Life

 


 

297

 


 

Social Networking

 


 

335

 


 

Chapter 10

 


 

Ethics of IT Organizations

 


 

369

 


 

Appendix A

 


 

A Brief Introduction to Morality

 


 

411

 


 

Appendix B

 


 

Answers to Self-Assessment Questions

 


 

427

 


 

Chapter

 


 

9

 


 

Glossary

 


 

429

 


 

Index

 


 

441

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

TABLE OF CONTENTS

 

Preface

 

Chapter 1 An Overview of Ethics

 

Vignette

 

Cisco Chairman and CEO Advocates Ethical Behavior

 

What Is Ethics?

 

Definition of Ethics

 

The Importance of Integrity

 

The Difference Between Morals, Ethics, and Laws

 

Ethics in the Business World

 

Corporate Social Responsibility

 

Why Fostering Corporate Social Responsibility

 

and Good Business Ethics Is Important

 

Improving Corporate Ethics

 

Creating an Ethical Work Environment

 

Including Ethical Considerations in Decision Making

 

Develop a Problem Statement

 

Identify Alternatives

 

Evaluate and Choose an Alternative

 

Implement the Decision

 

Evaluate the Results

 

Ethics in Information Technology

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 2 Ethics for IT Workers and IT Users

 

Vignette

 

New York City Payroll Project Riddled with Fraud

 

IT Professionals

 

Are IT Workers Professionals?

 

Professional Relationships That Must Be Managed

 

Professional Codes of Ethics

 

Professional Organizations

 

Certification

 


 

xiii

 

1

 

1

 

1

 

3

 

3

 

4

 

5

 

5

 

8

 

8

 

12

 

18

 

20

 

21

 

21

 

22

 

24

 

24

 

24

 

26

 

27

 

27

 

28

 

29

 

31

 

35

 


 

41

 

41

 

41

 

43

 

44

 

44

 

54

 

55

 

57

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

Government Licensing

 

IT Professional Malpractice

 

IT Users

 

Common Ethical Issues for IT Users

 

Supporting the Ethical Practices of IT Users

 

Compliance

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 3 Computer and Internet Crime

 

Vignette

 

The Reveton Ransomware Attacks

 

IT Security Incidents: A Major Concern

 

Why Computer Incidents Are So Prevalent

 

Types of Exploits

 

Types of Perpetrators

 

Federal Laws for Prosecuting Computer Attacks

 

Implementing Trustworthy Computing

 

Risk Assessment

 

Establishing a Security Policy

 

Educating Employees and Contract Workers

 

Prevention

 

Detection

 

Response

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 4 Privacy

 

Vignette

 

What Is the National Security Agency (NSA) Up To?

 

Privacy Protection and the Law

 

Information Privacy

 

Privacy Laws, Applications, and Court Rulings

 

Key Privacy and Anonymity Issues

 

Data Breaches

 

Electronic Discovery

 

Consumer Profiling

 


 

viii

 


 

58

 

60

 

61

 

61

 

63

 

64

 

67

 

68

 

68

 

69

 

70

 

72

 

76

 


 

81

 

81

 

81

 

84

 

84

 

88

 

95

 

99

 

100

 

102

 

104

 

105

 

105

 

110

 

110

 

115

 

116

 

116

 

118

 

118

 

120

 

125

 


 

131

 

131

 

131

 

133

 

135

 

135

 

151

 

151

 

153

 

154

 


 

Table of Contents

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

Workplace Monitoring

 

Advanced Surveillance Technology

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 5 Freedom of Expression

 

Vignette

 

Reputation Changer, Online Reputation Management Company

 

First Amendment Rights

 

Obscene Speech

 

Defamation

 

Freedom of Expression: Key Issues

 

Controlling Access to Information on the Internet

 

Strategic Lawsuit Against Public Participation (SLAPP)

 

Anonymity on the Internet

 

Hate Speech

 

Pornography

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 6 Intellectual Property

 

Vignette

 

Sinovel Steals Millions in Trade Secrets from American Superconductor

 

What Is Intellectual Property?

 

Copyrights

 

Copyright Term

 

Eligible Works

 

Fair Use Doctrine

 

Software Copyright Protection

 

The Prioritizing Resources and Organization for Intellectual Property

 

(PRO-IP) Act of 2008

 

General Agreement on Tariffs and Trade (GATT)

 

The WTO and the WTO TRIPS Agreement (1994)

 

The World Intellectual Property Organization (WIPO) Copyright

 

Treaty (1996)

 

The Digital Millennium Copyright Act (1998)

 


 

155

 

157

 

160

 

162

 

163

 

164

 

165

 

167

 

171

 


 

179

 

179

 

179

 

181

 

183

 

183

 

184

 

184

 

189

 

190

 

193

 

194

 

199

 

200

 

201

 

202

 

203

 

205

 

209

 


 

217

 

217

 

217

 

220

 

221

 

221

 

222

 

222

 

223

 

224

 

224

 

224

 

225

 

225

 


 

Table of Contents

 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

ix

 


 

Patents

 

Leahy-Smith America Invents Act (2011)

 

Software Patents

 

Cross-Licensing Agreements

 

Trade Secrets

 

Trade Secret Laws

 

Employees and Trade Secrets

 

Key Intellectual Property Issues

 

Plagiarism

 

Reverse Engineering

 

Open Source Code

 

Competitive Intelligence

 

Trademark Infringement

 

Cybersquatting

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 7 Software Development

 

Vignette

 

Stock Markets Susceptible to Software Glitches

 

Strategies for Engineering Quality Software

 

The Importance of Software Quality

 

Software Product Liability

 

Software Development Process

 

Capability Maturity Model Integration

 

Key Issues in Software Development

 

Development of Safety-Critical Systems

 

Quality Management Standards

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

x

 


 

228

 

230

 

230

 

231

 

231

 

232

 

233

 

234

 

234

 

236

 

238

 

239

 

242

 

243

 

244

 

246

 

247

 

248

 

249

 

250

 

255

 


 

261

 

261

 

261

 

264

 

267

 

268

 

270

 

273

 

275

 

275

 

279

 

282

 

283

 

284

 

285

 

286

 

288

 

292

 


 

Chapter 8 The Impact of Information Technology on Productivity

 

and Quality of Life

 


 

297

 


 

Vignette

 

Problems with the E-Rate Program

 

The Impact of IT on the Standard of Living and Worker Productivity

 

IT Investment and Productivity

 

The Digital Divide

 


 

297

 

297

 

301

 

301

 

306

 


 

Table of Contents

 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

The Impact of IT on HealthCare Costs

 

Electronic Health Records

 

Use of Mobile and Wireless Technology in the Healthcare Industry

 

Telehealth

 

Medical Information Web Sites for Laypeople

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 9 Social Networking

 

Vignette

 

Wanelo: Social Shopping Web Site Headed for Success

 

What Is a Social Networking Web Site?

 

Business Applications of Online Social Networking

 

Social Network Advertising

 

The Use of Social Networks in the Hiring Process

 

The Use of Social Media to Improve Customer Service

 

Social Shopping Web Sites

 

Social Networking Ethical Issues

 

Cyberbullying

 

Cyberstalking

 

Encounters with Sexual Predators

 

Uploading of Inappropriate Material

 

Online Virtual Worlds

 

Crime in Virtual Worlds

 

Educational and Business Uses of Virtual Worlds

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Chapter 10 Ethics of IT Organizations

 

Vignette

 

HP Finds Autonomy a Tough Pill to Swallow

 

Key Ethical Issues for Organizations

 

The Need for Nontraditional Workers

 

Contingent Workers

 

Advantages of Using Contingent Workers

 

Disadvantages of Using Contingent Workers

 

Deciding When to Use Contingent Workers

 

H-1B Workers

 


 

310

 

310

 

314

 

315

 

317

 

319

 

320

 

320

 

322

 

322

 

324

 

328

 


 

335

 

335

 

335

 

337

 

338

 

339

 

342

 

343

 

344

 

345

 

346

 

347

 

348

 

350

 

351

 

352

 

353

 

354

 

355

 

355

 

356

 

357

 

358

 

362

 


 

369

 

369

 

369

 

371

 

372

 

374

 

375

 

375

 

376

 

377

 


 

Table of Contents

 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

xi

 


 

H-1B Application Process

 

Using H-1B Workers Instead of U.S. Workers

 

Potential Exploitation of H-1B Workers

 

Outsourcing

 

Offshore Outsourcing

 

Pros and Cons of Offshore Outsourcing

 

Strategies for Successful Offshore Outsourcing

 

Whistle-Blowing

 

Protection for Whistle-Blowers

 

Whistle-Blowing Protection for Private-Sector Workers

 

Dealing with a Whistle-Blowing Situation

 

Green Computing

 

ICT Industry Code of Conduct

 

Summary

 

Key Terms

 

Self-Assessment Questions

 

Discussion Questions

 

What Would You Do?

 

Cases

 

End Notes

 


 

Appendix A A Brief Introduction to Morality

 

Introduction

 

The Knotty Question of Goodness

 

Relativism: Why ?Common Sense? Won?t Work

 

Egoism vs. Altruism

 

Deontology, or The Ethics of Logical Consistency and Duty

 

Happy Consequences, or Utilitarianism

 

Promises and Contracts

 

A Return to The Greeks: The Good Life of Virtue

 

Feminism and the Ethics of Care

 

Pluralism

 

Summary

 


 

xii

 


 

379

 

380

 

380

 

381

 

381

 

383

 

384

 

385

 

386

 

387

 

387

 

390

 

392

 

394

 

395

 

395

 

397

 

398

 

401

 

405

 


 

411

 

411

 

412

 

413

 

414

 

416

 

418

 

420

 

421

 

423

 

424

 

425

 


 

Appendix B Answers to Self-Assessment Questions

 


 

427

 


 

Glossary

 


 

429

 


 

Index

 


 

441

 


 

Table of Contents

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

PREFACE

 

We are excited to publish the fifth edition of Ethics in Information Technology. This new

 

edition builds on the success of the previous editions and meets the need for a resource

 

that helps readers understand many of the legal, ethical, and societal issues associated

 

with information technology. We have responded to the feedback from our previous

 

edition adopters, students, and other reviewers to create an improved text. We think you

 

will be pleased with the results.

 

Ethics in Information Technology, Fifth Edition, fills a void of practical business

 

information for business managers and IT professionals. The typical introductory information systems book devotes one chapter to ethics and IT, which cannot possibly cover

 

the full scope of ethical issues related to IT. Such limited coverage does not meet the

 

needs of business managers and IT professionals?the people primarily responsible

 

for addressing ethical issues in the workplace. Missing is an examination of the different

 

ethical situations that arise in IT as well as practical advice for addressing these issues.

 

Ethics in Information Technology, Fifth Edition, has enough substance for an

 

instructor to use it in a full-semester course in computer ethics. Instructors can also

 

use the book as a reading supplement for such courses as Introduction to Management

 

Information Systems, Principles of Information Technology, Managerial Perspective of

 

Information Technology, Computer Security, E-Commerce, and so on.

 


 

WHAT?S NEW

 

Ethics in Information Technology, Fifth Edition, has been updated and revised to incorporate the many new developments and ethical issues that have arisen since the last edition. There is new or expanded coverage of the following topics: the increased security

 

risks of bring your own device (BYOD) business policies, the role of the National Security

 

Agency in breaking of codes used to encrypt sensitive communications and for the interception of signals on behalf of the federal government, the ethics of using online reputation management companies, the use of strategic lawsuits against public participation

 

(SLAPP) and anti-SLAPP lawsuits, the theft by China of trade secrets from the United

 

States and Western Europe, and telehealth and telemedicine and their role in the delivery

 

of health care.

 

All opening vignettes and two-thirds of the end-of-chapter cases are new or extensively updated. Dozens of new real-world examples are presented in each chapter. At least

 

50 percent of the ?Self-Assessment Questions,? ?Discussion Questions,? and What Would

 

You Do?? exercises are new. Based on reviewer feedback, we have also increased the

 

number of ?Discussion Questions? and ?What Would You Do?? exercises. Instructors of

 

online courses frequently use these as the basis for discussion forums that allow online

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

students to share a variety of perspectives and experiences and to create a learning community. Such discussions provide students the opportunity to more deeply understand the

 

material while challenging their critical thinking skills.

 


 

ORGANIZATION

 

Each of the 10 chapters in this book addresses a different aspect of ethics in information

 

technology:

 

?

 


 

?

 


 

?

 


 

xiv

 


 

Chapter 1, ?An Overview of Ethics,? provides an introduction to ethics,ethics

 

in business, and the relevance of discussing ethics in IT. The chapter defines

 

the distinction between morals, ethics, and laws. It identifies the most common forms of employee misconduct. The concept of corporate social responsibility is defined and discussed. It presents five reasons why practicing good

 

business ethics is important in business and provides a model for improving

 

corporate ethics. It examines the role of the chief ethics officer and board of

 

directors in establishing a strong organizational ethics program. The chapter

 

also outlines the need for an organizational code of ethics and describes key

 

steps in establishing a sound ethics program. It suggests a model for ethical

 

decision making and also discusses four commonly used philosophical

 

approaches to ethical decision making. The chapter ends with a discussion

 

of the role of ethics in IT.

 

Chapter 2, ?Ethics for IT Workers and IT Users,? begins with a vignette that

 

illustrates major fraud on a real IT project involving the New York City

 

Payroll. This chapter explains the importance of ethics in the business

 

relationships of IT professionals, including those between IT workers and

 

employers, clients, suppliers, other professionals, IT users, and society. The

 

chapter also emphasizes the significance of IT professional organizations and

 

their codes of ethics, and it discusses the roles that certification and licensing

 

can play in legitimizing professional standards. The chapter also points out

 

the difficulties in licensing IT workers. The chapter touches on some ethical

 

issues faced by IT users?including software piracy, inappropriate use of

 

computing resources, and inappropriate sharing of information?and outlines

 

actions that can be taken to support the ethical practices of IT users. The

 

chapter introduces the topic of compliance and the role the audit committee

 

and members of the internal audit team have in ensuring that both the

 

IT organization and IT users are in compliance with organizational guidelines

 

and policies, as well as various legal and regulatory practices.

 

Chapter 3, ?Computer and Internet Crime,? describes the types of ethical

 

decisions that IT professionals must make, as well as the business needs they

 

must balance when dealing with security issues. The chapter identifies the

 

most common computer-related security incidents and provides numerous

 

reasons why such incidents are increasing. Including the use of cloud computing, virtualization software, and bring your own device corporate business

 

policies. It describes some of the more common hacker attacks, including

 

viruses, worms, Trojan horses, distributed denial-of-service, rootkits, spam,

 


 

Preface

 


 

Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

 

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 


 

?

 


 

?

 


 

phishing, spear-phishing, smishing, vishing, and ransom ware. In addition to

 

providing a useful classification of computer crimes and their perpetrators,

 

the chapter summarizes the major federal laws that address computer crime....

 

Paper#9256641 | Written in 27-Jul-2016

Price : $16
SiteLock