SlideShare a Scribd company logo
1 of 35
Ethical and Social
Issues/Failures in
Information Systems
LEARNING OBJECTIVES
• Identify the ethical, social, and political issues that are
raised by information systems.
• Identify the principles for conduct that can be used to
guide ethical decisions.
• Evaluate the impact of contemporary information
systems and the Internet on the protection of
individual privacy and intellectual property.
• Assess how information systems have affected
everyday life.
Is Your Student Loan Data on Loan?
 Problem: Insufficient privacy protections for sensitive
data related to student loans.
 Solutions: Improve system security and protect student
information to restore confidence in the system.
 Revoke over 52,000 user IDs suspected of misusing
access to students’ private information.
 Demonstrates IT’s role in providing quick and convenient
access to data.
 Illustrates how the very same technology has the
potential to threaten privacy and cause more harm than
good.
Understanding Ethical and Social Issues Related to Systems
• Past five years: One of the most ethically challenged
periods in U.S. history
• Lapses in management ethical and business judgment
in a broad spectrum of industries
• Enron, WorldCom, Parmalat, etc.
• Sub-prime loans and the failure of risk analysis:
CitiBank and Societe Generale
• Information systems instrumental in many recent frauds
• Stiffer sentencing guidelines, obstruction charges
against firms, mean individual managers must take
greater responsibility regarding ethical and legal
conduct
Understanding Ethical and Social Issues Related to Systems
• Ethics
• Principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their
behavior
• Information systems and ethics
• Information systems raise new ethical questions
because they create opportunities for:
• Intense social change, threatening existing
distributions of power, money, rights, and obligations
• New kinds of crime
Understanding Ethical and Social Issues Related to Systems
• A model for thinking about ethical, social, and political
issues
• Society as a calm pond
• IT as a rock dropped in pond, creating ripples of new
situations not covered by old rules
• Social and political institutions cannot respond
overnight to these ripples — it may take years to
develop etiquette, expectations, laws
• Requires understanding of ethics to make choices in
legally gray areas
The Relationship Between Ethical, Social, and Political Issues in an
Information Society
Figure 4-1
The introduction of new
information technology has a
ripple effect, raising new
ethical, social, and political
issues that must be dealt with
on the individual, social, and
political levels. These issues
have five moral dimensions:
information rights and
obligations, property rights and
obligations, system quality,
quality of life, and
accountability and control.
Understanding Ethical and Social Issues Related to Systems
Understanding Ethical and Social Issues Related to Systems
• Five moral dimensions of information age
• Major issues raised by information systems
include:
• Information rights and obligations
• Property rights and obligations
• Accountability and control
• System quality
• Quality of life
Understanding Ethical and Social Issues Related to Systems
• Four key technology trends that raise ethical
issues
• Computing power doubles every 18 months
• Increased reliance on, and vulnerability to, computer systems
• Data storage costs rapidly declining
• Multiplying databases on individuals
• Data analysis advances
• Greater ability to find detailed personal information on individuals
• Profiling and nonobvious relationship awareness (NORA)
• Networking advances and the Internet
• Enables moving and accessing large quantities of personal data
Nonobvious Relationship Awareness (NORA)
Figure 4-2
NORA technology can take
information about people from
disparate sources and find
obscure, nonobvious
relationships. It might discover,
for example, that an applicant
for a job at a casino shares a
telephone number with a known
criminal and issue an alert to the
hiring manager.
Understanding Ethical and Social Issues Related to Systems
• Basic concepts form the underpinning of an ethical
analysis of information systems and those who
manage them
• Responsibility: Accepting the potential costs, duties, and
obligations for decisions
• Accountability: Mechanisms for identifying responsible parties
• Liability: Permits individuals (and firms) to recover damages done
to them
• Due process: Laws are well known and understood, with an ability
to appeal to higher authorities
Ethics in an Information Society
• Ethical analysis: A five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the higher-
order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably take
5. Identify the potential consequences of your options
Ethics in an Information Society
• Candidate Ethical Principles
• Golden Rule
• Do unto others as you would have them do unto you
• Immanuel Kant’s Categorical Imperative
• If an action is not right for everyone to take, it is not right for
anyone
• Descartes' rule of change
• If an action cannot be taken repeatedly, it is not right to take
at all
Ethics in an Information Society
• Candidate Ethical Principles (cont.)
• Utilitarian Principle
• Take the action that achieves the higher or greater value
• Risk Aversion Principle
• Take the action that produces the least harm or least potential
cost
• Ethical “no free lunch” rule
• Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise
Ethics in an Information Society
• Professional codes of conduct
• Promulgated by associations of professionals
• E.g. AMA, ABA, AITP, ACM
• Promises by professions to regulate themselves in the
general interest of society
• Real-world ethical dilemmas
• One set of interests pitted against another
• E.g., Right of company to maximize productivity of
workers vs. workers right to use Internet for short
personal tasks
Ethics in an Information Society
• Information rights and obligations
• Privacy
• Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or the state.
• Ability to control information about yourself
• In U.S., privacy protected by:
• First Amendment (freedom of speech)
• Fourth Amendment (unreasonable search and seizure)
• Additional federal statues
• Privacy Act of 1974
The Moral Dimensions of Information Systems
• Fair information practices:
• Set of principles governing the collection and use of information
• Basis of most U.S. and European privacy laws
• Based on mutuality of interest between record holder and
individual
• Restated and extended by FTC in 1998 to provide guidelines for
protecting online privacy
• Used to drive changes in privacy legislation
• COPPA
• Gramm-Leach-Bliley Act
• HIPAA
The Moral Dimensions of Information Systems
• FTC FIP principles:
• Notice/awareness (core principle): Web sites must disclose
practices before collecting data
• Choice/consent (core principle): Consumers must be able to
choose how information is used for secondary purposes
• Access/participation: Consumers must be able to review,
contest accuracy of personal data
• Security: Data collectors must take steps to ensure accuracy, security
of personal data
• Enforcement: Must be mechanism to enforce FIP principles
The Moral Dimensions of Information Systems
• European Directive on Data Protection:
• Requires companies to inform people when they
collect information about them and disclose how it will
be stored and used.
• Requires informed consent of customer (not true in
the U.S.)
• EU member nations cannot transfer personal data to
countries without similar privacy protection (e.g. U.S.)
• U.S. businesses use safe harbor framework
• Self-regulating policy and enforcement that meets objectives
of government legislation but does not involve government
regulation or enforcement.
The Moral Dimensions of Information Systems
• Internet Challenges to Privacy:
• Cookies
• Tiny files downloaded by Web site to visitor’s hard drive
• Identify visitor’s browser and track visits to site
• Allow Web sites to develop profiles on visitors
• Web bugs
• Tiny graphics embedded in e-mail messages and Web pages
• Designed to monitor who is reading a message and transmitting that
information to another computer on the Internet
• Spyware
• Surreptitiously installed on user’s computer
• May transmit user’s keystrokes or display unwanted ads
The Moral Dimensions of Information Systems
The Moral Dimensions of Information Systems
How Cookies Identify Web Visitors
Figure 4-3
Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the
ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these
data to display personalized information.
• U.S. allows businesses to gather transaction information
and use this for other marketing purposes
• Online industry promotes self-regulation over privacy
legislation
• Self regulation has proven highly variable
• Statements of information use are quite different
• Some firms offer opt-out selection boxes
• Online “seals” of privacy principles
• Most Web sites do not have any privacy policies
• Many online privacy policies do not protect customer
privacy, but rather protect the firm from lawsuits
The Moral Dimensions of Information Systems
The Moral Dimensions of Information Systems
Web sites are posting their privacy policies for visitors to review. The TRUSTe seal designates Web sites that have
agreed to adhere to TRUSTe’s established privacy principles of disclosure, choice, access, and security.
• Technical solutions
• The Platform for Privacy Preferences (P3P)
• Allows Web sites to communicate privacy policies to
visitor’s Web browser – user
• User specifies privacy levels desired in browser settings
• E.g., “medium” level accepts cookies from first-party host
sites that have opt-in or opt-out policies but rejects third-
party cookies that use personally identifiable information
without an opt-in policy.
The Moral Dimensions of Information Systems
The Moral Dimensions of Information Systems
The P3P Standard
Figure 4-4
P3P enables Web sites to translate their privacy policies into a standard format that can be read by the user’s Web browser
software. The user’s Web browser software evaluates the Web site’s privacy policy to determine whether it is compatible with the
user’s privacy preferences.
• Property Rights: Intellectual Property
• Intellectual property: Intangible property of any kind
created by individuals or corporations
• Three ways that intellectual property is protected
• Trade secret: Intellectual work or product belonging to
business, not in the public domain
• Copyright: Statutory grant protecting intellectual property
from being copied for the life of the author, plus 70 years
• Patents: Grants creator of invention an exclusive monopoly
on ideas behind invention for 20 years
The Moral Dimensions of Information Systems
• Challenges to Intellectual Property Rights
• Digital media different from physical media (e.g.
books)
• Ease of replication
• Ease of transmission (networks, Internet)
• Difficulty in classifying software
• Compactness
• Difficulties in establishing uniqueness
• Digital Millenium Copyright Act (DMCA)
• Makes it illegal to circumvent technology-based
protections of copyrighted materials
The Moral Dimensions of Information Systems
• Accountability, Liability, Control
• Computer-related liability problems
• If software fails, who is responsible?
• If seen as a part of a machine that injures or harms,
software producer and operator may be liable
• If seen as similar to a book, difficult to hold software
author/publisher responsible
• What should liability be if software is seen as service?
Would this be similar to telephone systems not being liable
for transmitted messages (so-called “common carriers”)
The Moral Dimensions of Information Systems
• System Quality: Data Quality and System
Errors
• What is an acceptable, technologically feasible level of
system quality?
• Flawless software is economically unfeasible
• Three principal sources of poor system performance:
• Software bugs, errors
• Hardware or facility failures
• Poor input data quality (most common source of business
system failure)
The Moral Dimensions of Information Systems
• Quality of Life: Negative social consequences of
systems
• Balancing power: Although computing power is decentralizing,
key decision-making power remains centralized
• Rapidity of change: Businesses may not have enough time to
respond to global competition
• Maintaining boundaries: Computing and Internet use lengthens
the work-day, infringes on family, personal time
• Dependence and vulnerability: Public and private organizations
ever more dependent on computer systems
The Moral Dimensions of Information Systems
• Read the Interactive Session: Organizations, and then
discuss the following questions:
• What are some of the technologies and communication methods
used by cyberbullies? Why are they so effective?
• What measures have been taken by school districts and
governments to combat cyberbullying? How helpful are they? Can
you think of any other ways to effectively control cyberbullying?
• Should there be stronger laws outlawing cyberbullying? Why or why
not?
• Does a social networking site catering to teems such as MySpace
represent an ethical dilemma? Why or why not?
What Should We Do About Cyberbullying?
The Moral Dimensions of Information Systems
• Computer crime and abuse
• Computer crime: Commission of illegal acts through use of
compute or against a computer system – computer may be
object or instrument of crime
• Computer abuse: Unethical acts, not illegal
• Spam: High costs for businesses in dealing with spam
• Employment: Reengineering work resulting in lost
jobs
• Equity and access – the digital divide: Certain
ethnic and income groups in the United States less
likely to have computers or Internet access
The Moral Dimensions of Information Systems
Understanding Ethical and Social Issues Related to Systems
• Read the Interactive Session: Management, and then
discuss the following questions:
• What is the ethical dilemma facing Wal-Mart in this case? Do
Wal-Mart’s associates also face an ethical dilemma? If so,
what is it?
• What ethical principles apply to this case? How do they
apply?
• What are the potential effects of computerized scheduling on
employee morale? What are the consequences of these
effects for Wal-Mart?
Flexible Scheduling at Wal-Mart: Good or Bad for Employees?
• Health risks:
• Repetitive stress injury (RSI)
• Largest source is computer keyboards
• Carpal Tunnel Syndrome (CTS)
• Computer vision syndrome (CVS)
• Technostress
• Role of radiation, screen emissions, low-level
electromagnetic fields
The Moral Dimensions of Information Systems
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written
permission of the publisher. Printed in the United States of America.
Copyright © 2010 Pearson Education, Inc.
Publishing as Prentice Hall

More Related Content

Similar to 3-Professional Ethics Issues.pptx

CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptRogerPrimo2
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfAliMurat5
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...Tonmoy zahid Rishad
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan kabir Solicitor
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 

Similar to 3-Professional Ethics Issues.pptx (20)

Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
MIS_session06.pptx
MIS_session06.pptxMIS_session06.pptx
MIS_session06.pptx
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdf
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
MIS Wk-12.ppt
MIS Wk-12.pptMIS Wk-12.ppt
MIS Wk-12.ppt
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
E commerce
E commerce E commerce
E commerce
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 

More from JohnLagman3

8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentationJohnLagman3
 
7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentationJohnLagman3
 
1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentationJohnLagman3
 
bufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationbufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationJohnLagman3
 
Variables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointVariables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointJohnLagman3
 
Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.JohnLagman3
 
History of Android powerpoint presentation
History of Android powerpoint presentationHistory of Android powerpoint presentation
History of Android powerpoint presentationJohnLagman3
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpointJohnLagman3
 
Presentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguagePresentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguageJohnLagman3
 
html-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfhtml-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfJohnLagman3
 
Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.JohnLagman3
 
Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.JohnLagman3
 
Lesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxLesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxJohnLagman3
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdfJohnLagman3
 
Lesson 1 Animation.pdf
Lesson 1 Animation.pdfLesson 1 Animation.pdf
Lesson 1 Animation.pdfJohnLagman3
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptJohnLagman3
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfJohnLagman3
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxJohnLagman3
 
1.-Introduction-report.pptx
1.-Introduction-report.pptx1.-Introduction-report.pptx
1.-Introduction-report.pptxJohnLagman3
 

More from JohnLagman3 (20)

8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation
 
7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation
 
1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation
 
bufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationbufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentation
 
Variables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointVariables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpoint
 
Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.
 
History of Android powerpoint presentation
History of Android powerpoint presentationHistory of Android powerpoint presentation
History of Android powerpoint presentation
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
 
Presentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguagePresentation of Hyper Text Markup Language
Presentation of Hyper Text Markup Language
 
html-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfhtml-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdf
 
Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.
 
Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.
 
Lesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxLesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptx
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdf
 
Lesson 1 Animation.pdf
Lesson 1 Animation.pdfLesson 1 Animation.pdf
Lesson 1 Animation.pdf
 
Lesson 1.pdf
Lesson 1.pdfLesson 1.pdf
Lesson 1.pdf
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdf
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptx
 
1.-Introduction-report.pptx
1.-Introduction-report.pptx1.-Introduction-report.pptx
1.-Introduction-report.pptx
 

Recently uploaded

Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 

Recently uploaded (20)

Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 

3-Professional Ethics Issues.pptx

  • 1. Ethical and Social Issues/Failures in Information Systems
  • 2. LEARNING OBJECTIVES • Identify the ethical, social, and political issues that are raised by information systems. • Identify the principles for conduct that can be used to guide ethical decisions. • Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. • Assess how information systems have affected everyday life.
  • 3. Is Your Student Loan Data on Loan?  Problem: Insufficient privacy protections for sensitive data related to student loans.  Solutions: Improve system security and protect student information to restore confidence in the system.  Revoke over 52,000 user IDs suspected of misusing access to students’ private information.  Demonstrates IT’s role in providing quick and convenient access to data.  Illustrates how the very same technology has the potential to threaten privacy and cause more harm than good.
  • 4. Understanding Ethical and Social Issues Related to Systems • Past five years: One of the most ethically challenged periods in U.S. history • Lapses in management ethical and business judgment in a broad spectrum of industries • Enron, WorldCom, Parmalat, etc. • Sub-prime loans and the failure of risk analysis: CitiBank and Societe Generale • Information systems instrumental in many recent frauds • Stiffer sentencing guidelines, obstruction charges against firms, mean individual managers must take greater responsibility regarding ethical and legal conduct
  • 5. Understanding Ethical and Social Issues Related to Systems • Ethics • Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior • Information systems and ethics • Information systems raise new ethical questions because they create opportunities for: • Intense social change, threatening existing distributions of power, money, rights, and obligations • New kinds of crime
  • 6. Understanding Ethical and Social Issues Related to Systems • A model for thinking about ethical, social, and political issues • Society as a calm pond • IT as a rock dropped in pond, creating ripples of new situations not covered by old rules • Social and political institutions cannot respond overnight to these ripples — it may take years to develop etiquette, expectations, laws • Requires understanding of ethics to make choices in legally gray areas
  • 7. The Relationship Between Ethical, Social, and Political Issues in an Information Society Figure 4-1 The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control. Understanding Ethical and Social Issues Related to Systems
  • 8. Understanding Ethical and Social Issues Related to Systems • Five moral dimensions of information age • Major issues raised by information systems include: • Information rights and obligations • Property rights and obligations • Accountability and control • System quality • Quality of life
  • 9. Understanding Ethical and Social Issues Related to Systems • Four key technology trends that raise ethical issues • Computing power doubles every 18 months • Increased reliance on, and vulnerability to, computer systems • Data storage costs rapidly declining • Multiplying databases on individuals • Data analysis advances • Greater ability to find detailed personal information on individuals • Profiling and nonobvious relationship awareness (NORA) • Networking advances and the Internet • Enables moving and accessing large quantities of personal data
  • 10. Nonobvious Relationship Awareness (NORA) Figure 4-2 NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job at a casino shares a telephone number with a known criminal and issue an alert to the hiring manager. Understanding Ethical and Social Issues Related to Systems
  • 11. • Basic concepts form the underpinning of an ethical analysis of information systems and those who manage them • Responsibility: Accepting the potential costs, duties, and obligations for decisions • Accountability: Mechanisms for identifying responsible parties • Liability: Permits individuals (and firms) to recover damages done to them • Due process: Laws are well known and understood, with an ability to appeal to higher authorities Ethics in an Information Society
  • 12. • Ethical analysis: A five-step process 1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher- order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options Ethics in an Information Society
  • 13. • Candidate Ethical Principles • Golden Rule • Do unto others as you would have them do unto you • Immanuel Kant’s Categorical Imperative • If an action is not right for everyone to take, it is not right for anyone • Descartes' rule of change • If an action cannot be taken repeatedly, it is not right to take at all Ethics in an Information Society
  • 14. • Candidate Ethical Principles (cont.) • Utilitarian Principle • Take the action that achieves the higher or greater value • Risk Aversion Principle • Take the action that produces the least harm or least potential cost • Ethical “no free lunch” rule • Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise Ethics in an Information Society
  • 15. • Professional codes of conduct • Promulgated by associations of professionals • E.g. AMA, ABA, AITP, ACM • Promises by professions to regulate themselves in the general interest of society • Real-world ethical dilemmas • One set of interests pitted against another • E.g., Right of company to maximize productivity of workers vs. workers right to use Internet for short personal tasks Ethics in an Information Society
  • 16. • Information rights and obligations • Privacy • Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. • Ability to control information about yourself • In U.S., privacy protected by: • First Amendment (freedom of speech) • Fourth Amendment (unreasonable search and seizure) • Additional federal statues • Privacy Act of 1974 The Moral Dimensions of Information Systems
  • 17. • Fair information practices: • Set of principles governing the collection and use of information • Basis of most U.S. and European privacy laws • Based on mutuality of interest between record holder and individual • Restated and extended by FTC in 1998 to provide guidelines for protecting online privacy • Used to drive changes in privacy legislation • COPPA • Gramm-Leach-Bliley Act • HIPAA The Moral Dimensions of Information Systems
  • 18. • FTC FIP principles: • Notice/awareness (core principle): Web sites must disclose practices before collecting data • Choice/consent (core principle): Consumers must be able to choose how information is used for secondary purposes • Access/participation: Consumers must be able to review, contest accuracy of personal data • Security: Data collectors must take steps to ensure accuracy, security of personal data • Enforcement: Must be mechanism to enforce FIP principles The Moral Dimensions of Information Systems
  • 19. • European Directive on Data Protection: • Requires companies to inform people when they collect information about them and disclose how it will be stored and used. • Requires informed consent of customer (not true in the U.S.) • EU member nations cannot transfer personal data to countries without similar privacy protection (e.g. U.S.) • U.S. businesses use safe harbor framework • Self-regulating policy and enforcement that meets objectives of government legislation but does not involve government regulation or enforcement. The Moral Dimensions of Information Systems
  • 20. • Internet Challenges to Privacy: • Cookies • Tiny files downloaded by Web site to visitor’s hard drive • Identify visitor’s browser and track visits to site • Allow Web sites to develop profiles on visitors • Web bugs • Tiny graphics embedded in e-mail messages and Web pages • Designed to monitor who is reading a message and transmitting that information to another computer on the Internet • Spyware • Surreptitiously installed on user’s computer • May transmit user’s keystrokes or display unwanted ads The Moral Dimensions of Information Systems
  • 21. The Moral Dimensions of Information Systems How Cookies Identify Web Visitors Figure 4-3 Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information.
  • 22. • U.S. allows businesses to gather transaction information and use this for other marketing purposes • Online industry promotes self-regulation over privacy legislation • Self regulation has proven highly variable • Statements of information use are quite different • Some firms offer opt-out selection boxes • Online “seals” of privacy principles • Most Web sites do not have any privacy policies • Many online privacy policies do not protect customer privacy, but rather protect the firm from lawsuits The Moral Dimensions of Information Systems
  • 23. The Moral Dimensions of Information Systems Web sites are posting their privacy policies for visitors to review. The TRUSTe seal designates Web sites that have agreed to adhere to TRUSTe’s established privacy principles of disclosure, choice, access, and security.
  • 24. • Technical solutions • The Platform for Privacy Preferences (P3P) • Allows Web sites to communicate privacy policies to visitor’s Web browser – user • User specifies privacy levels desired in browser settings • E.g., “medium” level accepts cookies from first-party host sites that have opt-in or opt-out policies but rejects third- party cookies that use personally identifiable information without an opt-in policy. The Moral Dimensions of Information Systems
  • 25. The Moral Dimensions of Information Systems The P3P Standard Figure 4-4 P3P enables Web sites to translate their privacy policies into a standard format that can be read by the user’s Web browser software. The user’s Web browser software evaluates the Web site’s privacy policy to determine whether it is compatible with the user’s privacy preferences.
  • 26. • Property Rights: Intellectual Property • Intellectual property: Intangible property of any kind created by individuals or corporations • Three ways that intellectual property is protected • Trade secret: Intellectual work or product belonging to business, not in the public domain • Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years • Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years The Moral Dimensions of Information Systems
  • 27. • Challenges to Intellectual Property Rights • Digital media different from physical media (e.g. books) • Ease of replication • Ease of transmission (networks, Internet) • Difficulty in classifying software • Compactness • Difficulties in establishing uniqueness • Digital Millenium Copyright Act (DMCA) • Makes it illegal to circumvent technology-based protections of copyrighted materials The Moral Dimensions of Information Systems
  • 28. • Accountability, Liability, Control • Computer-related liability problems • If software fails, who is responsible? • If seen as a part of a machine that injures or harms, software producer and operator may be liable • If seen as similar to a book, difficult to hold software author/publisher responsible • What should liability be if software is seen as service? Would this be similar to telephone systems not being liable for transmitted messages (so-called “common carriers”) The Moral Dimensions of Information Systems
  • 29. • System Quality: Data Quality and System Errors • What is an acceptable, technologically feasible level of system quality? • Flawless software is economically unfeasible • Three principal sources of poor system performance: • Software bugs, errors • Hardware or facility failures • Poor input data quality (most common source of business system failure) The Moral Dimensions of Information Systems
  • 30. • Quality of Life: Negative social consequences of systems • Balancing power: Although computing power is decentralizing, key decision-making power remains centralized • Rapidity of change: Businesses may not have enough time to respond to global competition • Maintaining boundaries: Computing and Internet use lengthens the work-day, infringes on family, personal time • Dependence and vulnerability: Public and private organizations ever more dependent on computer systems The Moral Dimensions of Information Systems
  • 31. • Read the Interactive Session: Organizations, and then discuss the following questions: • What are some of the technologies and communication methods used by cyberbullies? Why are they so effective? • What measures have been taken by school districts and governments to combat cyberbullying? How helpful are they? Can you think of any other ways to effectively control cyberbullying? • Should there be stronger laws outlawing cyberbullying? Why or why not? • Does a social networking site catering to teems such as MySpace represent an ethical dilemma? Why or why not? What Should We Do About Cyberbullying? The Moral Dimensions of Information Systems
  • 32. • Computer crime and abuse • Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime • Computer abuse: Unethical acts, not illegal • Spam: High costs for businesses in dealing with spam • Employment: Reengineering work resulting in lost jobs • Equity and access – the digital divide: Certain ethnic and income groups in the United States less likely to have computers or Internet access The Moral Dimensions of Information Systems
  • 33. Understanding Ethical and Social Issues Related to Systems • Read the Interactive Session: Management, and then discuss the following questions: • What is the ethical dilemma facing Wal-Mart in this case? Do Wal-Mart’s associates also face an ethical dilemma? If so, what is it? • What ethical principles apply to this case? How do they apply? • What are the potential effects of computerized scheduling on employee morale? What are the consequences of these effects for Wal-Mart? Flexible Scheduling at Wal-Mart: Good or Bad for Employees?
  • 34. • Health risks: • Repetitive stress injury (RSI) • Largest source is computer keyboards • Carpal Tunnel Syndrome (CTS) • Computer vision syndrome (CVS) • Technostress • Role of radiation, screen emissions, low-level electromagnetic fields The Moral Dimensions of Information Systems
  • 35. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall