Those who possess the “best” information and know how to use it, win.
However, keeping this information safe and secure is a high priority (see Figure 8.1).
Privacy – “the right to be left alone”.
Managers must be aware of regulations that are in place regarding the authorized collection, disclosure and use of personal information.
Safe harbor framework of 2000.
Figure 8.1 Mason’s areas of managerial concern. What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Accessibility Who owns information? Who owns the channels of distribution, and how should they be regulated? Property Who is responsible for the reliability and accuracy of information? Who will be accountable for errors? Accuracy What information must a person reveal about one’s self to others? What information should others be able to access about you – with or without your permission? What safeguards exist for your protection? Privacy Critical Questions Area
Consider the needs of a society with no corporations or other complex business arrangements.
What conditions would have to be met for the members of a society to agree to allow a corporation to be formed?
Corporations are expected to create more value to society that it consumes.
1. Social welfare – corporations must produce greater benefits than their associated costs.
2. Justice – corporations must pursue profits legally, without fraud or deception, and avoid actions that harm society.
Figure 8.2 Three normative theories of business ethics. Does this action create a “net” benefit for society? Does the proposed action discriminate against any group in particular, and is its implementation socially just? Create value for society in a manner that is just and nondiscriminatory. Social contract Does the proposed action maximize collective benefits to the company? Does this action treat one of the corporate stakeholders unfairly? Maximize benefits to all stakeholders while weighing costs to competing interests. Stakeholder Will this action maximize stockholder value? Can goals be accomplished without compromising company standards and without breaking laws? Maximize stockholder wealth, in legal and non-fraudulent manners. Stockholder Metrics Definition Theory
EMERGING ISSUES IN THE ETHICAL GOVERNANCE OF INFORMATION SYSTEMS
Many programs are available to accomplish this monitoring.
In 2001 sales of $140 million was reported for this type of software.
Employers can exert a higher level of control over their employees.
Managers must be careful to create an atmosphere that is amenable to IS use.
Ethically, managers are obliged to consider the welfare of their workers.
Figure 8.3 Some causal connections between identified areas of ethical concern.
Figure 8.4 Ten Commandments of Computer Ethics 1 .Thou shalt not use a computer to harm other people. 2 .Thou shalt not interfere with other people’s computer work. 3 .Thou shalt not snoop around in other people’s computer files. 4 .Thou shalt not use a computer to steal. 5 .Thou shalt not use a computer to bear false witness. 6 .Thou shalt not use or copy software for which you have not paid. 7 .Thou shalt not use other people’s computer resources without authorization. 8 .Thou shalt not appropriate other people’s intellectual output. 9 .Thou shalt think about the social consequences of the program you write. 10 .Thou shalt use a computer in ways that show consideration and respect.
1. Ethics is important to the IS field particularly since new technologies and innovations are arriving at an untold pace.
2. IS professionals must seek to uphold the ethical handling and dissemination of information adhering to international, federal, state, and local laws concerning the ethical handling of data under their supervision.
3. Improper handling and use of IS can lead not only to internal organization problems but to legal problems as well.
4. Don’t jeopardize your future by the mishandling of IS
A ll rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein