Class Notes (807,637)
Canada (492,763)
York University (33,498)
ADMS 2511 (179)
Carl Lapp (29)
Lecture 2

Week 2 -Ch 3 & Tech Guide 3.doc

7 Pages
Unlock Document

York University
Administrative Studies
ADMS 2511
Carl Lapp

Sept 20/11 ADMS 2511 Week 2 Chapter 3 and Technology guide 3 Porter’s Forces Competitive Model Why use them? - strategy for marketing products 1. Threat of new Entry - protect intellectual property production (copyright and patents) - Innovation - make it different - Make something that is difficult to copy 2. Bargaining power of Suppliers - use of the internet - for choices - want to be able to get access to greatest amount of suppliers 3. Bargaining Power of Customers - product differentiation - Internet - need to make a customer oriented site (CRM) - use of internet to go from one end of sales cycle to other end 4. Threat of Substitute Products or Services - innovation - Product differentiation - Customization - Allow customers to build their own products - E.g.Apple online you can add components to create a system specifically for you 5. Rivalry among existing firms - R&D, innovation - Product differentiation - Cost Chapter 3 Overview Sept 20/11 - Examine IT ethical issues, practice ethical analysis and identity theft - Explain main threats and risks to IT security - Describe the control layers used to categorize operational practices - Relate IT threats and risks to mitigation (i.e. Controls) - Identify practical behavioural and computer-based protective actions Framework for Ethical Issues (pg.. 71-72) What is ethics? - what is unethical is not necessarily illegal - If it is illegal it is most likely unethical E.g. Car dealership repair shop Privacy - identity theft could occur is information is not kept private Accuracy - make sure data base has the proper information - When information is stored make sure the proper controls are in place to make the correctentry Property - who owns the information? - Can only release customers information WITH CONSENT! - profiling is important Accessibility - who should be able to access the information? - Anyone who is involved in the car - maintenance, sales people, service etc. GOOD TEST QUESTION - e.g. Of Car Dealership and who should see information provided etc. Be able to DEFINE and PROVIDE examples of the FOUR categories of Ethical Issues Privacy in Canada: PIPEDA (Personal Information Protection and Electronic DocumentsAct, 2004) - accountability - Identifying purposes - Consent Sept 20/11 - Limiting collection - Limiting use, disclosure retention - Accuracy - Safeguards - Openness - Individual access - Challenging compliance - be able to apply principles to certain business situations Never give out certain information such as: - S.I.N. - could be used for financial purposes, can change contact address, can change all data to make it their own - Credit card etc. - Drivers license number Where is your Information Kept? - Digital Dossier (pg. 73) - Collection of information about us’ Benefits of high quality privacy - protect our image as corporation and as individuals - Want consumer confidence as an organization - All of these things give us competitive advantage as a business Costly if there is incorrect information Six StepApproach to Solve an Ethical Dilemma 1. Obtain the relevant facts 2. Identify the ethical issues from the facts 3. Determine who is affected by the outcome and how 4. Identify reasonable alternative action 5. Identify consequences of each alternative 6. Decide on an appropriate action E.g. Ethical Dilemma practice 1. Facts - computer was purchased from a friend but has data about activities and profiles of hundreds of people in the city 2. Ethical issues - exposure of confidential information - Property - who owns the property Sept 20/11 - Should the people on the list be notified of the breach in information - Do we notify the friend 3. Who is affected? - hundreds of people - The friend and also me 4. Reasonable alternatives - delete the files - Sell the files - Notify people know privacy has been violated - Giving information back to the friend 5. Consequences of each data - delete data - would not be ethical to delete because we are not authorized to do anything like this - The company still owns the data - sell data - Definitely not ethical to do - notify people know - Take a lot of time to notify - Tedious and headaches
More Less

Related notes for ADMS 2511

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.