SlideShare a Scribd company logo
1 of 26
MANAGEMENT INFORMATION
SYSTEM
Ethical & Social
Issues in MIS
Information systems and ethics
– Information systems raise new ethical
questions because they create
opportunities for:
Intense social change, threatening
existing distributions of power, money,
rights, and obligations
New kinds of crime
Key technology trends that raise
ethical issues
1. Doubling of computer power
– More organizations depend on computer systems for
critical operations
1. Rapidly declining data storage costs
– Organizations can easily maintain detailed databases on
individuals
1. Networking advances and the Internet
– Copying data from one location to another and accessing
personal data from remote locations is much easier
4. Advances in data analysis techniques
– Companies can analyze vast quantities of data
gathered on individuals for:
 Profiling
– Combining data from multiple sources to create
dossiers of detailed information on individuals
 Nonobvious relationship awareness (NORA)
– Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists
NORA technology can take information about people from disparate sources
and find obscure, nonobvious relationships. It might discover, for example, that
an applicant for a job shares a telephone number with a known criminal and
issue an alert to the hiring manager.
Where does it cross the line?
 Edward Snowden
 He leaked classified documents
that revealed numerous global
surveillance programs, many run
by the NSA and the Five
Eyes* with the cooperation
of telecommunication
companies and European
governments
* It is an intelligence alliance comprising Australia, Canada, New
Zealand, the United Kingdom, and the United States
Ethics in an Information Society
 Basic concepts for ethical analysis
– Responsibility:
 Accepting the potential costs, duties, and obligations for
decisions
– Accountability:
 Mechanisms for identifying responsible parties
– Liability:
 Permits individuals (and firms) to recover damages done to
them
– Due process:
 Laws are well known and understood, with an ability to appeal
to higher authorities
 Ethical analysis: A five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the
higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably
take
5. Identify the potential consequences of your
options
 Six Candidate Ethical Principles
1. Golden Rule
 Do unto others as you would have them do unto you
1. Immanuel Kant’s Categorical Imperative
 If an action is not right for everyone to take, it is not right
for anyone
1. Descartes’ Rule of Change
 If an action cannot be taken repeatedly, it is not right to
take at all
 Six Candidate Ethical Principles (cont.)
4. Utilitarian Principle
 Take the action that achieves the higher or greater value
4. Risk Aversion Principle
 Take the action that produces the least harm or least
potential cost
4. Ethical “no free lunch” Rule
 Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise
Five moral dimensions of the
information age
1. Information rights and obligations
2. Property rights and obligations
3. Accountability and control
4. System quality
5. Quality of life
Five moral dimensions graphically
1- Information rights and
obligations
 Privacy:
– Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself
 Do you believe that there are sufficient
protections for privacy in law?
Data protection laws of the world
 http://www.dlapiperdataprotection.com/
Fair Information Practices (FIP)
 Notice/awareness (core principle)
– Web sites must disclose practices before collecting
data
 Choice/consent (core principle)
– Consumers must be able to choose how information
is
 Access/participation
– Consumers must be able to review, contest
accuracy of personal data
Fair Information Practices (FIP)
 Security
– Data collectors must take steps to ensure accuracy,
security of personal data
 Enforcement
– There must be a mechanism to enforce FIP
principles
Internet challenges to privacy
 Cookies
– Tiny files downloaded by Web site to visitor’s hard drive
to help identify visitor’s browser and track visits to site
– Allow Web sites to develop profiles on visitors
 Web beacons/bugs
– Tiny graphics embedded in e-mail and Web pages to
monitor who is reading message
 Spyware
– Surreptitiously installed on user’s computer
– May transmit user’s keystrokes or display unwanted ads
Google’s collection of private data;
behavioral targeting
 What are your thoughts on it?
2 - Property rights and obligations
 Intellectual property: Intangible property of any
kind created by individuals or corporations
 Three main ways that protect intellectual property
1. Trade secret: Intellectual work or product belonging to
business, not in the public domain
2. Copyright: Statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years
3. Patents: Grants creator of invention an exclusive
monopoly on ideas behind invention for 20 years
 Challenges to intellectual property rights
– Digital media different from physical media (e.g.
books)
 Ease of replication
 Ease of transmission (networks, Internet)
 Difficulty in classifying software
 Compactness
 Difficulties in establishing uniqueness
3 - Accountability and control
Computer-related liability problems
– If software fails, who is responsible?
– Eg, Amazon and its clients
4 - Systems quality
 System Quality: Data Quality and System Errors
– What is an acceptable, technologically feasible level of
system quality?
 Flawless software is economically unfeasible
– Three principal sources of poor system performance:
 Software bugs, errors
 Hardware or facility failures
 Poor input data quality (most common source of business
system failure)
5 - Quality of life
 Quality of life: Equity, access, and boundaries
– Negative social consequences of systems
 Balancing power: Although computing power helps
decentralizing, key decision-making remains centralized
 Rapidity of change: Businesses may not have enough time
to respond to global competition
 Maintaining boundaries: Computing, Internet use lengthens
work-day, infringes on family, personal time
 Dependence and vulnerability: Public and private
organizations ever more dependent on computer systems
Health risks:
– Repetitive stress injury (RSI)
Largest source is computer keyboards
Carpal Tunnel Syndrome (CTS)
– Computer vision syndrome (CVS)
– Technostress
– Role of radiation, screen emissions, low-
level electromagnetic fields
 Computer crime and abuse
– Computer crime: Commission of illegal acts through use
of compute or against a computer system – computer
may be object or instrument of crime
– Computer abuse: Unethical acts, not illegal
 Spam: High costs for businesses in dealing with spam
 Employment:
– Reengineering work resulting in lost jobs
 Equity and access – the digital divide:
– Certain ethnic and income groups in the United States
less likely to have computers or Internet access
Questions??

More Related Content

What's hot

SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Functional information system
Functional  information systemFunctional  information system
Functional information systemamazing19
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategySukanya Ben
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)Saumya Singh
 
Management information systems
Management information systemsManagement information systems
Management information systemsnavin1
 
Foundation of information system in business
Foundation of information system in businessFoundation of information system in business
Foundation of information system in businessAmrit Banstola
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)Jaisha Jaikishan
 
strategic information system
strategic information systemstrategic information system
strategic information systemPrateek Singh
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemMuhammad Hashaam Shinystar
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Information Systems, Organizations, Management and Strategy
Information Systems, Organizations, Management and StrategyInformation Systems, Organizations, Management and Strategy
Information Systems, Organizations, Management and StrategyMostafa Ewees
 

What's hot (20)

Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Business Analytics
 Business Analytics  Business Analytics
Business Analytics
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and Strategy
 
The role of information system
The role of information system The role of information system
The role of information system
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)
 
Business Analytics
Business AnalyticsBusiness Analytics
Business Analytics
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
Foundation of information system in business
Foundation of information system in businessFoundation of information system in business
Foundation of information system in business
 
MIS concepts
MIS conceptsMIS concepts
MIS concepts
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)
 
strategic information system
strategic information systemstrategic information system
strategic information system
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information System
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Information Systems, Organizations, Management and Strategy
Information Systems, Organizations, Management and StrategyInformation Systems, Organizations, Management and Strategy
Information Systems, Organizations, Management and Strategy
 

Similar to Ethical And Social Issues in MIS - Management Information System

COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.pptKaty Kate
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 

Similar to Ethical And Social Issues in MIS - Management Information System (20)

Chapter 4
Chapter 4Chapter 4
Chapter 4
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Review questions
Review questionsReview questions
Review questions
 
Technological trends
Technological trendsTechnological trends
Technological trends
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 

More from FaHaD .H. NooR

FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...FaHaD .H. NooR
 
FAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business SchoolFAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business SchoolFaHaD .H. NooR
 
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...FaHaD .H. NooR
 
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan NoorOperations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan NoorFaHaD .H. NooR
 
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan NoorSupply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan NoorFaHaD .H. NooR
 
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...FaHaD .H. NooR
 
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...FaHaD .H. NooR
 
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...FaHaD .H. NooR
 
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan NoorTraining for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan NoorFaHaD .H. NooR
 
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan NoorTikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan NoorFaHaD .H. NooR
 
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan NoorAmazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan NoorFaHaD .H. NooR
 
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan NoorComplete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan NoorFaHaD .H. NooR
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...FaHaD .H. NooR
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...FaHaD .H. NooR
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain ManagementFaHaD .H. NooR
 
Creating and Managing Supplier Relationships
Creating and Managing Supplier RelationshipsCreating and Managing Supplier Relationships
Creating and Managing Supplier RelationshipsFaHaD .H. NooR
 
ETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCINGETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCINGFaHaD .H. NooR
 
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...FaHaD .H. NooR
 
MCB Islamic Bank Internship Report - UCP - 2019
MCB Islamic Bank Internship Report - UCP - 2019MCB Islamic Bank Internship Report - UCP - 2019
MCB Islamic Bank Internship Report - UCP - 2019FaHaD .H. NooR
 
Transportation Fundamentals | Transportation stake holders | Transport Capabi...
Transportation	Fundamentals | Transportation stake holders | Transport Capabi...Transportation	Fundamentals | Transportation stake holders | Transport Capabi...
Transportation Fundamentals | Transportation stake holders | Transport Capabi...FaHaD .H. NooR
 

More from FaHaD .H. NooR (20)

FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
 
FAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business SchoolFAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business School
 
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
 
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan NoorOperations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
 
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan NoorSupply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
 
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
 
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
 
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
 
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan NoorTraining for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
 
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan NoorTikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
 
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan NoorAmazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
 
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan NoorComplete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Creating and Managing Supplier Relationships
Creating and Managing Supplier RelationshipsCreating and Managing Supplier Relationships
Creating and Managing Supplier Relationships
 
ETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCINGETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCING
 
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
 
MCB Islamic Bank Internship Report - UCP - 2019
MCB Islamic Bank Internship Report - UCP - 2019MCB Islamic Bank Internship Report - UCP - 2019
MCB Islamic Bank Internship Report - UCP - 2019
 
Transportation Fundamentals | Transportation stake holders | Transport Capabi...
Transportation	Fundamentals | Transportation stake holders | Transport Capabi...Transportation	Fundamentals | Transportation stake holders | Transport Capabi...
Transportation Fundamentals | Transportation stake holders | Transport Capabi...
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 

Ethical And Social Issues in MIS - Management Information System

  • 2. Information systems and ethics – Information systems raise new ethical questions because they create opportunities for: Intense social change, threatening existing distributions of power, money, rights, and obligations New kinds of crime
  • 3. Key technology trends that raise ethical issues 1. Doubling of computer power – More organizations depend on computer systems for critical operations 1. Rapidly declining data storage costs – Organizations can easily maintain detailed databases on individuals 1. Networking advances and the Internet – Copying data from one location to another and accessing personal data from remote locations is much easier
  • 4. 4. Advances in data analysis techniques – Companies can analyze vast quantities of data gathered on individuals for:  Profiling – Combining data from multiple sources to create dossiers of detailed information on individuals  Nonobvious relationship awareness (NORA) – Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
  • 5. NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job shares a telephone number with a known criminal and issue an alert to the hiring manager.
  • 6. Where does it cross the line?  Edward Snowden  He leaked classified documents that revealed numerous global surveillance programs, many run by the NSA and the Five Eyes* with the cooperation of telecommunication companies and European governments * It is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States
  • 7. Ethics in an Information Society  Basic concepts for ethical analysis – Responsibility:  Accepting the potential costs, duties, and obligations for decisions – Accountability:  Mechanisms for identifying responsible parties – Liability:  Permits individuals (and firms) to recover damages done to them – Due process:  Laws are well known and understood, with an ability to appeal to higher authorities
  • 8.  Ethical analysis: A five-step process 1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher-order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options
  • 9.  Six Candidate Ethical Principles 1. Golden Rule  Do unto others as you would have them do unto you 1. Immanuel Kant’s Categorical Imperative  If an action is not right for everyone to take, it is not right for anyone 1. Descartes’ Rule of Change  If an action cannot be taken repeatedly, it is not right to take at all
  • 10.  Six Candidate Ethical Principles (cont.) 4. Utilitarian Principle  Take the action that achieves the higher or greater value 4. Risk Aversion Principle  Take the action that produces the least harm or least potential cost 4. Ethical “no free lunch” Rule  Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
  • 11. Five moral dimensions of the information age 1. Information rights and obligations 2. Property rights and obligations 3. Accountability and control 4. System quality 5. Quality of life
  • 12. Five moral dimensions graphically
  • 13. 1- Information rights and obligations  Privacy: – Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself  Do you believe that there are sufficient protections for privacy in law?
  • 14. Data protection laws of the world  http://www.dlapiperdataprotection.com/
  • 15. Fair Information Practices (FIP)  Notice/awareness (core principle) – Web sites must disclose practices before collecting data  Choice/consent (core principle) – Consumers must be able to choose how information is  Access/participation – Consumers must be able to review, contest accuracy of personal data
  • 16. Fair Information Practices (FIP)  Security – Data collectors must take steps to ensure accuracy, security of personal data  Enforcement – There must be a mechanism to enforce FIP principles
  • 17. Internet challenges to privacy  Cookies – Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site – Allow Web sites to develop profiles on visitors  Web beacons/bugs – Tiny graphics embedded in e-mail and Web pages to monitor who is reading message  Spyware – Surreptitiously installed on user’s computer – May transmit user’s keystrokes or display unwanted ads
  • 18. Google’s collection of private data; behavioral targeting  What are your thoughts on it?
  • 19. 2 - Property rights and obligations  Intellectual property: Intangible property of any kind created by individuals or corporations  Three main ways that protect intellectual property 1. Trade secret: Intellectual work or product belonging to business, not in the public domain 2. Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years 3. Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
  • 20.  Challenges to intellectual property rights – Digital media different from physical media (e.g. books)  Ease of replication  Ease of transmission (networks, Internet)  Difficulty in classifying software  Compactness  Difficulties in establishing uniqueness
  • 21. 3 - Accountability and control Computer-related liability problems – If software fails, who is responsible? – Eg, Amazon and its clients
  • 22. 4 - Systems quality  System Quality: Data Quality and System Errors – What is an acceptable, technologically feasible level of system quality?  Flawless software is economically unfeasible – Three principal sources of poor system performance:  Software bugs, errors  Hardware or facility failures  Poor input data quality (most common source of business system failure)
  • 23. 5 - Quality of life  Quality of life: Equity, access, and boundaries – Negative social consequences of systems  Balancing power: Although computing power helps decentralizing, key decision-making remains centralized  Rapidity of change: Businesses may not have enough time to respond to global competition  Maintaining boundaries: Computing, Internet use lengthens work-day, infringes on family, personal time  Dependence and vulnerability: Public and private organizations ever more dependent on computer systems
  • 24. Health risks: – Repetitive stress injury (RSI) Largest source is computer keyboards Carpal Tunnel Syndrome (CTS) – Computer vision syndrome (CVS) – Technostress – Role of radiation, screen emissions, low- level electromagnetic fields
  • 25.  Computer crime and abuse – Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime – Computer abuse: Unethical acts, not illegal  Spam: High costs for businesses in dealing with spam  Employment: – Reengineering work resulting in lost jobs  Equity and access – the digital divide: – Certain ethnic and income groups in the United States less likely to have computers or Internet access