Professional Documents
Culture Documents
Session 1 – Introduction
UNIVERSITY OF GHANA
Department of Computer Science
2017/2018 Academic Year
6
states that there is a
5
positive relationship
4
between price and
3 quantity of a good
2 supplied.
1
0
This means that supply
0 10 20 30 40
Thousands of bushels of soybeans
50
curves typically
produced per year have a positive slope.
Economics
Media and
Technologies
communication
Globalization
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
ECONOMICS OF INFORMATION
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
INFORMATION TECHNOLOGY,
LABOUR AND EMPLOYMENT
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
P = O Where
P = productivity
I O = output
I = input
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
System Concept
inputs outputs
transformations Customers
Land Goods
people SYSTEM and
capital services
facilities
equipment
tools O
energy I
materials
information productivity
O O O O O
I I I I I
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Measuring Productivity
Static: P=O/I in a given period of time (t). Its useful
for benchmarking purposes.
Dynamic:
p(1)=O(1)/I(1); p(2)=O(2)/I(2); then p(2)/p(1) yields a
dimensionless index that reflects change in
productivity between periods. ([p(2)-p(1)]/p(1))*100
yields the percentage change between periods.
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Computing Content
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 12 Slide 12 Department of Computer Science, UG
Ethics in Information Technology
(Cont’d)
The general public has not realized the critical
importance of ethics as applied to IT
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 13 Slide 13 Department of Computer Science, UG
Ethics in Information Technology
(Cont’d)
They must be able to make broad-minded,
objective, ethical decisions based on technical
savvy, business know-how, and a sense of
ethics
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 14 Slide 14 Department of Computer Science, UG
What is Ethics?
Moral code
Set of rules
Establishes boundaries of generally accepted
behaviour
Different rules often have contradictions
Morality
Social conventions about right and wrong
Widely shared
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 15 Slide 15 Department of Computer Science, UG
What is Ethics? (continued)
Morality may vary by:
Age
Cultural group
Ethnic background
Religion
Gender
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 16 Slide 16 Department of Computer Science, UG
Definition of Ethics
Ethics are set of beliefs about right and wrong
behaviour
Ethical behaviour conforms to generally accepted
social norms
Virtues on ther other hand are habits that incline
people to do what is acceptable
Vices are habits of unacceptable behavior
Value system are scheme of moral values
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 17 Slide 17 Department of Computer Science, UG
The Importance of Integrity
Integrity is a cornerstone of ethical behaviour
People with integrity
Act in accordance with a personal code of
principles
Extend to all people the same respect and
consideration that you desire
Apply the same moral standards in all situations
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 18 Slide 18 Department of Computer Science, UG
Ethics in the Business World
Risk is the product of multiplying the likelihood of an
event by the impact of its occurrence
Risks associated with inappropriate behaviour have
increased due to
Globalization
Heightened vigilance by
Employees
Shareholders
Regulatory agencies
Julius
Julius Yaw
Yaw Ludu, 4/29/20
Ludu, MENG
MENG Slide 19 Slide 19 19
Department of Computer Science, UG
Logic Chips
Examples of Scandals in IT companies include;
WorldCom
Qwest Communications International Inc.
Adelphia Communications Corp.
Computer Associates (CA)
Any in Ghana?
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 20 Slide 20 Department of Computer Science, UG
Why Foster Good Business Ethics?
1. To gain the goodwill of the community
2. To create an organization that operates
consistently
3. To produce good business
4. To protect the organization and its employees
from legal action
5. To avoid unfavourable publicity
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 21 Slide 21 21
Department of Computer Science, UG
Good Ethics Can Mean Good Business
Produce safe and effective products
Avoid costly recalls and lawsuits
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 23 Slide 23 Department of Computer Science, UG
Avoiding Unfavorable Publicity
Public reputation of company strongly influences
Value of its stock
How consumers regard products and services
Degree of oversight received from government
agencies
Amount of support and cooperation received from
business partners
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 24 Slide 24 Department of Computer Science, UG
Establishing a Corporate Code of Ethics
Code of ethics:
Highlights an organization’s key ethical issues
Identifies overarching values and principles important
to an organization
Focuses employees on areas of ethical risk
Cannot gain company-wide acceptance unless
Developed with employee participation
Fully endorsed by organization’s leadership
Must continually be applied to company’s decision
making
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 25 Slide 25 Department of Computer Science, UG
Social Audits
Social audit
Identifies ethical lapses committed in the past
Sets directives for avoiding similar missteps in the
future
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 26 Slide 26 Department of Computer Science, UG
Require Employees to Take Ethics
Training
Comprehensive ethics education program encourages
employees to act responsibly and ethically
Often presented in small workshop formats
Principle-based decision making is based on principles
in corporate code of ethics
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 27 Slide 27 Department of Computer Science, UG
Creating an Ethical Work Environment
Good employees sometimes make bad ethical choices
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 28 Slide 28 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
ETHICAL THEORIES
An ethics of consequences
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 3 Department of Computer Science, UG
Utilitarianism Cont’d
A variety of consequentialism
"actions are right in proportion as they tend to
promote happiness, wrong as they tend to produce
the reverse of happiness." (John Stuart Mill's
Greatest Happiness Principle)
Freedom of Action
lack of coercion
Freedom of Choice
availability of alternative options
Kant (1724-1804)
single principle: categorical imperative
Universality - what maxims pass this test
persons as ends (what counts as a person?)
Citizenship
To obey all the laws and to do our part to make the
communities in which we live and work better.
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Personal attacks
New Vulnerabilities
Detected
10000
8000
6000
4000
2000
0
2000 2001 2002 2003
Think – be smart!
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Terrorism
No universal accepted definition of terrorism.
•Marsella defines terrorism as :
“ . . . the use of force or violence, by individuals or groups
that is directed toward civilian populations and intended
to instill fear as a means of coercing individuals or groups
to change their political and social positions”.
Julius Yaw Ludu, MENG Slide 13 Data Link Institute
Definitions: Terrorism and
Cyberterrorism
Like terrorism, cyberterrorism has different
connotations.
Denning holds that cyberterrorism “ . . . refers to highly
damaging computer-based attacks or threats of attack.
By non-state actors against information systems when
conducted to intimidate or coerce governments or
societies in pursuit of goals that are political or social.”
What distinguishes cyberterrorism from cyber war is that
non-state actors undertake cyberterrorism, whereas
nation states undertake cyber war.
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
Public policy development: The policy
life cycle
As countries develop, they deal with problems
through effective public policies
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
Definition of Corruption
Corruption often is defined as: “The abuse of
entrusted power for private gain”.
A decentralised network
A code of conduct
A regulatory system
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
3
Extradition
dual criminality
nationality
Extradition
Dual criminality and harmonization of law
Council of Europe
convention may serve as basis
precedence given to existing treaties
refusal on grounds of nationality
• obligation to investigate and prosecute
G8
Washington, D.C., 1997:
Principles and Action Plan to Combat High-tech Crime
Moscow, Russia, 1999:
Principles on Transborder Access to Stored Computer Data
Mont Tremblant, Canada, 2002:
Recommendations for Tracing Networked Communications
Across National Borders in Terrorist and Criminal
Investigations
Principles on the Availability of Data Essential to Protecting
Public Safety
G8 Statement on Data Protection Regimes
Data Preservation Checklists
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
20
Commonwealth
Model Law on Computer Related Crime, 2002
Guide to assist
Influenced by text of Council of Europe Convention
Common framework with Council of Europe
24-7 Network
Need for coordinated law enforcement contacts
G8
Council of Europe
Inter-American Conventions
Consider extent to which Conventions require
amendment or protocol to:
incorporate new investigative techniques
supplement existing bilateral treaties
provide additional safeguards
24/7 Network
Recommendations
Agree to common concepts of crime
Agree to common list of investigative powers
Investigative powers should:
apply not only to computer-related crime but to
collection of evidence of any crime
balance powers with privacy and human rights
provide ability to trace communications
be available for MLA
Cont’d
Julius Yaw Ludu, MENG Slide 23 Department of Computer Science, UG
24
Information Policy
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
What is the NII?
A broad approach to maximising the value of
information to the nation and to society
A representation of a Government Information
Strategy
An information parallel to the National (physical)
Infrastructure
A structured approach to releasing the greatest
benefit from our information
A manageable initiative to create, make readily
available and publicise an entity and framework to
promote availability and best practice in fostering
openness and the information ecosystem
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
What topics are covered in the NII?