Ch04+Ethics,+Social,+Policy+Issues

لا عقوبة بلا تجريم - ولا تجريم بلا تشريع لا بد م وجود النص، لتتم المخالفة و فرض العقوبة "الاخلاق خطوط عريضة اصطلح عليها الناس (المجتمع) اما بالقبول او الرفض. نموذج لسلوك معين يحدد طبيعة التفاعل ما بين طرفين  ما هي الضوابط التي تحدد سلوك الأفراد؟  القيم في المجتمعات   الاخلاق الحميده التي توجه تصرفاتنا واعمالنا والتي يدعو اليها الدين والمجتمع و القانون لنال الاحترام و التقدير. نورا عرفات  اهداف التعلم المرجوة**Objectives** ​  في نهاية هذه الوحدة من المتوقع ان يبني الطالب المعارف و المفاهيم التالية ان يشكل لدية القدرة على تحليل العلاقات فيما بين الاخلاق، القضايا المجتمعية و السياسات و علاقتها بأنظمة المعلومات.  ان يحدد الابعاد لاخلاقية لمجتمع المعلومات و مبادئ السلوك التي تساعد في اتخاذ قرارات ذات مسؤولية اخلاقية  ان يستطيع ان يقيم اثر التقنيات الانترنت الحديثة في حماية الحرية و الملكية الفكرية و الحرية الشخصية ان يقيم الطالب كيف يمكن لانظمة المعلومات و تكنولوجي الاتصالات ان تؤثر في حياتنا اليومية القدرة على مواجهة التحديات الحديثة وايجاد طرق و حلول ادارية

This should be a very easy chapter, we only need to understand some concepts and few terms good luck
 * smart cards **, **types of files** also you can benefit from the summary of ch5 [[file:Laudon_13e_LN_ch05.doc]]

مصطلحات تشابتر 4

**Ethic** refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.

DoubleClick, a major Internet advertising broker, announced in early 2000 that it would use data gathered from Web sites in conjunction with data collected from sources other than the Internet to identify people by name.
 * **Responsibility:** Accepting potential costs, duties, and obligations for your decisions.


 * **Accountability:** Determining who should take responsibility for decisions and actions.


 * **Liability:** Legally placing responsibility with a person or group.


 * **Due Process:** ensuring the laws are applied fairly and correctly.

, "Using information technology in a socially responsible manner means that you can and will be held accountable for the consequences of your actions." Cookies cannot be programmed, cannot carry [|viruses], and cannot install [|malware] on the host computer. However, they can be used by [|spyware] to track user's browsing activities—a major privacy concern that prompted European and US law makers to take action. Cookie data can also be illicitly disclosed by [|hackers] to gain access to a victim's web account.
 * cookies**: A **cookie**, also known as an **HTTP cookie**, **web cookie**, or **browser cookie**, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site. The state information can be used for [|authentication], identification of a user [|session], user's preferences, [|shopping cart] contents, or anything else that can be accomplished through storing text data on the user's computer.


 * Web bugs** : help to track users and determine what they do and don't do on the Internet.


 * spyware** : attempt to gather marketing information about visitors and customers. This type of software is installed directly onto your computer and sends data to the company about your surfing habits

. Opting out allows individuals to tell an organization not to share personal information with any third party.

Opting in requires individuals to expressly give an organization the right to gather information before any information can be collected.


 * (Pretty Good Privacy)** is one of the most popular encryption software programs for e-mail. It does have its limitations though, because both the sender and recipient must have the program installed in order for it to work.

Copyright and other intellectual property rights.
 * Intellectual property** : Is a group that protects the rights of thought and human creativity, including Patents, Trademarks and Industrial Designs and Geographical Indications

. Intellectual property is a result of someone's effort at creating a product of value based on their experiences, knowledge, and education. **In short, intellectual property is brain power.**

Copyright laws and intellectual property rights cannot be violated on the Internet any more than they can in other mediums. While this isn't a law class, you should be aware of the fine line between acceptable and legal usage of materials and the illegal theft of materials.

**The Business Software Alliance ** : is an organization working to prevent software piracy and the illegal use of copyrighted material around the world.

**The Electronic Frontier Foundation ** : an organization dedicated to "protecting rights and preserving freedom in the electronic frontier," has lots of information about protecting free speech on the Internet.
 * Computer crime** is one area that has been extremely hard for our society and our governments to keep up with the rapid change.


 * C omputer crime and abuse ** extends to any wrongdoing involving equipment and Internet usage.

As managers, you should be acutely aware of the health issues caused by computer usage, especially **repetitive stress injury (RSI)**. Why? Because these health issues cost businesses huge amounts of money each year in medical treatment claims and lost productivity. **Carpal tunnel syndrome (CTS)**, a subset of RSI, is the most serious health issue plaguing businesses. **Computer vision syndrome** **(CVS)** is increasing as people continually use computer screens and handheld devices that strain eyesight. Mohannad Mohammad Shehab.