SlideShare a Scribd company logo
1 of 49
Download to read offline
Unboxing
TOPIC 1
COSC372 / 572
MANAGEMENT INFORMATION SYSTEMS
MATTHEW WYSEL
THE UNIVERSITY OF NEW ENGLAND
TOPIC ONE
Ethical and Social Issues in
Information Systems
T1-1
TOPIC 1 SESSION 1:
UNBOXING ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
WHAT ARE ETHICS ANYWAY?
WHY BOTHER ABOUT ETHICS?
WHAT YOU NEED TO KNOW
ROADMAP
SUGGESTED APPLICATION
CH
4
Definitions
Ethics:
The rules of conduct recognized in
respect to a particular class of
human actions or a particular group
or culture.
Morals:
Principles or habits with respect to
right or wrong conduct. While morals
also prescribe dos and don'ts,
morality is ultimately a personal
compass of right and wrong.
Source: http://www.diffen.com/difference/Ethics_vs_Morals
Roadmap for Topic 1
T1 S1 – Unboxing the Ethical and Social Issues in
Information Systems
T1 S2 – Ethical Frameworks and the
Information You Prioritize
T1 S3 – Ethics, Information Systems and
how Society Responds
Application
The introduction of new information
technology has a ripple effect,
raising new ethical, social, and
political issues that must be dealt
with on the individual, social, and
political levels. These issues have five
moral dimensions: information rights
and obligations, property rights and
obligations, system quality, quality of
life, and accountability and control.
Ethical, Social, and Political Issues
Five moral dimensions for Information Systems:
Information rights and obligations
Property rights and obligations
Accountability and control
System quality
Quality of life
Big Data Gets Personal: Behavioural Targeting
 Why is behavioural tracking such an important ethical
dilemma today? Identify the stakeholders and interest
groups in favour of and opposed to behavioural
tracking.
 How do businesses benefit from behavioural tracking?
Do people benefit? Explain your answer.
 What would happen if there were no behavioural
tracking on the Internet?
TOPIC 1 SESSION 1:
UNBOXING ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
WHAT ARE ETHICS ANYWAY?
WHY BOTHER ABOUT ETHICS?
WHAT YOU NEED TO KNOW
ROADMAP
SUGGESTED APPLICATION
CH
4
Ethical Frameworks and the
Information
You Prioritize
COSC372 / 572
MANAGEMENT INFORMATION SYSTEMS
MATTHEW WYSEL
THE UNIVERSITY OF NEW ENGLAND
TOPIC ONE
Ethical and Social Issues in
Information Systems
T1-2
TOPIC 1 SESSION 2:
ETHICAL FRAMEWORKS AND THE
INFORMATION YOU PRIORITIZE
 What ethical, social, and political
issues are raised by information
systems?
 What specific principles for conduct
can be used to guide ethical
decisions?
CH
4
Definitions
Ethics:
The rules of conduct recognized in
respect to a particular class of
human actions or a particular group
or culture.
Morals:
Principles or habits with respect to
right or wrong conduct. While morals
also prescribe dos and don'ts,
morality is ultimately a personal
compass of right and wrong.
Source: http://www.diffen.com/difference/Ethics_vs_Morals
Ethical, Social, and Political Issues
 Recent cases of failed ethical
judgment in business:
 US Elections, Lehman Brothers,
Australian Financial Industry,
Arthur Anderson
 In many, information systems used to
bury decisions from public scrutiny
 Threats to Personal Privacy
 Cambridge Analytica, and others
 https://haveibeenpwned.com/
What Ethical, Social, Political Issues are
Raised by Information Systems?
Ethical, Social, and Political Issues
Information systems and ethics
Information systems raise new ethical questions
because they create opportunities for:
Intense social change,
Threatening existing distributions of power, money,
rights, and obligations
New kinds of crime
Ethical, Social, and Political Issues
Five moral dimensions for Information Systems:
Information rights and obligations
Property rights and obligations
Accountability and control
System quality
Quality of life
Ethical, Social, and Political Issues
The introduction of new
information technology has a
ripple effect, raising new
ethical, social, and political
issues that must be dealt with
on the individual, social, and
political levels. These issues
have five moral dimensions:
information rights and
obligations, property rights
and obligations, system
quality, quality of life, and
accountability and control.
Figure 4-1
Ethical, Social, and Political Issues
 Doubling of computer power
 More organizations depend on
computer systems for critical
operations.
 Rapidly declining data storage
costs
 Organizations can easily maintain
detailed databases on individuals.
 Networking advances and the
Internet
 Copying data and accessing
personal data from remote
locations is much easier.
 Advances in data analysis
techniques
 Profiling: Combining data from multiple
sources to create dossiers of detailed
information on individuals
 Nonobvious relationship awareness
(NORA): Combining data from multiple
sources to find obscure hidden
connections that might help identify
criminals or terrorists
 Mobile device growth
 Tracking of individual mobile phones +
full suite of onboard sensors
What Specific Principles for Conduct can
be used to Guide Ethical Arguments?
Principles to Guide Ethical Decisions
Basic concepts for ethical analysis
 Responsibility:
 Accepting the potential costs, duties, and obligations for decisions
 Accountability:
 Mechanisms for identifying responsible parties
 Liability:
 Permits individuals (and firms) to recover damages done to them
 Due process:
 Laws are well-known and understood, with an ability to appeal to higher authorities
Principles to Guide Ethical Decisions
Five-step ethical analysis
1. Identify and clearly describe the facts.
2. Define the conflict or dilemma and identify the
higher-order values involved.
3. Identify the stakeholders.
4. Identify the options that you can reasonably take.
5. Identify the potential consequences of your options.
Principles to Guide Ethical Decisions
 Candidate ethical principles
 Golden Rule
Do unto others as you would have them do unto you.
 Immanuel Kant’s Categorical Imperative
If an action is not right for everyone to take, it is not right for
anyone.
 Descartes’ Rule of Change
If an action cannot be taken repeatedly, it is not right to take at
all.
Principles to Guide Ethical Decisions
 Candidate ethical principles (cont.)
 Utilitarian Principle
Take the action that achieves the higher or greater value.
 Risk Aversion Principle
Take the action that produces the least harm or potential cost.
 Ethical “No Free Lunch” Rule
Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise.
Principles to Guide Ethical Decisions
 Professional codes of conduct
 Upheld by associations of professionals
 Examples: AMA, ABA, AITP, ACM
 Promises by professions to regulate themselves in the general
interest of society
 Real-world ethical dilemmas
 One set of interests pitted against another
 Example: right of company to maximize productivity of workers
versus workers right to use Internet for short personal tasks
TOPIC 1 SESSION 2:
ETHICAL FRAMEWORKS AND THE
INFORMATION YOU PRIORITIZE
 What ethical, social, and political
issues are raised by information
systems?
 What specific principles for conduct
can be used to guide ethical
decisions?
CH
4
Ethics,
Information Systems and
how Society Responds
COSC372 / 572
MANAGEMENT INFORMATION SYSTEMS
MATTHEW WYSEL
THE UNIVERSITY OF NEW ENGLAND
TOPIC ONE
Ethical and Social Issues in
Information Systems
T1-3
TOPIC 1 SESSION 3:
ETHICS, INFORMATION SYSTEMS AND HOW
SOCIETY RESPONDS
 Why do information systems pose
such challenges individual privacy
and intellectual property?
 How have information systems
affected laws for establishing
accountability, liability, and the
quality of everyday life?
CH
4
General Data Protection Regulation (GDPR)
 Problem: Widespread abuse of collection of personal data within the EU and of EU
citizens.
 Solutions: GDPR regulation that addresses data protection and privacy for all
individuals with EU and EEA.
 Aims to give control to citizens over their personal data and to simply the regulatory
environment for all international businesses that operate within the EU.
 Systems must include data protection by design and by default. Partial/Full
anonymization; can be revoked at any time.
 Fine up to €20 million or up to 4% of the annual worldwide turnover –
whichever is greater.
Why do Information Systems pose
Challenges to the Protection of Individual
and Collective Privacy
Challenges to Privacy and Intellectual Property
 Information rights: privacy and freedom in the Internet age
 Privacy:
 Claim of individuals to be left alone, free from surveillance or
interference from other individuals, organizations, or state; claim to be
able to control information about yourself
 In the United States, privacy protected by:
 First Amendment (freedom of speech)
 Fourth Amendment (unreasonable search and seizure)
 Additional federal statues (e.g., Privacy Act of 1974)
Challenges to Privacy and Intellectual Property
 Fair information practices:
 Set of principles governing the collection and use of information
 Basis of most U.S. and European privacy laws
 Based on mutuality of interest between record holder and individual
 Restated and extended by FTC in 1998 to provide guidelines for
protecting online privacy
 Used to drive changes in privacy legislation
 COPPA
 Gramm-Leach-Bliley Act
 HIPAA
 Do-Not-Track Online Act of 2011
Challenges to Privacy and Intellectual Property
FTC FIP principles:
 Notice/awareness (core principle)
 Web sites must disclose practices
before collecting data.
 Choice/consent (core principle)
 Consumers must be able to choose
how information is used for
secondary purposes.
 Access/participation
 Consumers must be able to review
and contest accuracy of personal
data.
 Security
 Data collectors must take steps to
ensure accuracy, security of personal
data.
 Enforcement
 Must be mechanism to enforce FIP
principles.
Challenges to Privacy and Intellectual Property
 European Directive on Data Protection – precursor to GDPR:
 Companies must inform people information is collected and disclose how
it is stored and used.
 Requires informed consent of customer.
 EU member nations cannot transfer personal data to countries without
similar privacy protection.
 U.S. businesses use safe harbor framework to work with EU personal data.
 Stricter enforcements under consideration:
 Right of access
 Right to be forgotten
Challenges to Privacy and Intellectual Property
Internet challenges to privacy:
 Cookies
 Identify browser and track visits to site
 Super cookies (Flash cookies)
 Web beacons (Web bugs)
 Tiny graphics embedded in e-mails and Web pages
 Monitor who is reading email message or visiting site
 Spyware
 Surreptitiously installed on user’s computer
 May transmit user’s keystrokes or display unwanted ads
 Google services and behavioural targeting
Challenges to Privacy and Intellectual Property
HOW COOKIES IDENTIFY WEB VISITORS
Cookies are written by a Web
site on a visitor’s hard drive.
When the visitor returns to that
Web site, the Web server
requests the ID number from
the cookie and uses it to
access the data stored by
that server on that visitor. The
Web site can then use these
data to display personalized
information.
Figure 4-3
Challenges to Privacy and Intellectual Property
Challenges to Privacy and Intellectual Property
 The United States allows businesses to gather transaction
information and use this for other marketing purposes.
 Opt-out (US Model) vs. opt-in model (EU Model)
 Online industry promotes self-regulation over privacy
legislation
 However, extent of responsibility taken varies:
 Complex/ambiguous privacy statements
 Opt-out models selected over opt-in
 Online “seals” of privacy principles
Challenges to Privacy and Intellectual Property
 Technical solutions
 Email encryption
 Anonymity tools
 Anti-spyware tools
 Browser features
“Private” browsing
“Do not track” options
 Overall, few technical solutions
Figure 4-3
HOW COOKIES IDENTIFY WEB VISITORS
Challenges to Privacy and Intellectual Property
 Property rights: Intellectual property
 Intellectual property: intangible property of any kind created by
individuals or corporations
 Three main ways that intellectual property is protected:
 Trade secret: intellectual work or product belonging to business, not in
the public domain
 Copyright: statutory grant protecting intellectual property from being
copied for the life of the author, plus 70 years
 Patents: grants creator of invention an exclusive monopoly on ideas
behind invention for 20 years
Challenges to Privacy and Intellectual Property
 Challenges to intellectual property rights
 Digital media different from physical media (e.g., books)
 Ease of replication
 Ease of transmission (networks, Internet)
 Difficulty in classifying software
 Compactness
 Difficulties in establishing uniqueness
 Digital Millennium Copyright Act (DMCA)
 Makes it illegal to circumvent technology-based protections of copyrighted
materials
How have Information Systems Affected
Laws for Establishing Accountability,
Liability and Quality of Life?
Information Systems, Laws, and Quality of Life
 Accountability, liability, control
 Computer-related liability problems
If software fails, who is responsible?
 If seen as part of machine that injures or harms, software producer
and operator may be liable.
 If seen as similar to book, difficult to hold author/publisher
responsible.
 What should liability be if software seen as service? Would this be
similar to telephone systems not being liable for transmitted
messages?
Information Systems, Laws, and Quality of Life
 System quality: Data quality and system errors
 What is an acceptable, technologically feasible level of
system quality?
Flawless software is economically unfeasible.
 Three principal sources of poor system performance:
Software bugs, errors
Hardware or facility failures
Poor input data quality (most common source of business
system failure)
 Quality of life: Equity, access, boundaries
 Negative social consequences of systems
Balancing power: although computing power
decentralizing, key decision making remains centralized
Rapidity of change: businesses may not have enough time
to respond to global competition
Maintaining boundaries: computing, Internet use lengthens
work-day, infringes on family, personal time
Dependence and vulnerability: public and private
organizations ever more dependent on computer systems
Information Systems, Laws, and Quality of Life
Information Systems, Laws, and Quality of Life
 Computer crime and abuse
 Computer crime: commission of illegal acts through use of
computer or against a computer system—computer may be
object or instrument of crime
 Computer abuse: unethical acts, not illegal
 Spam: high costs for businesses in dealing with spam
 Employment:
 Reengineering work resulting in lost jobs
 Equity and access—the digital divide:
 Certain ethnic and income groups in the United States less likely to
have computers or Internet access
Health risks:
 Repetitive stress injury (RSI)
Largest source is computer keyboards
Carpal tunnel syndrome (CTS)
 Computer vision syndrome (CVS)
Eyestrain and headaches related to screen use
 Techno-stress
Aggravation, impatience, fatigue
Information Systems, Laws, and Quality of Life
TOPIC 1 SESSION 3:
ETHICS, INFORMATION SYSTEMS AND HOW
SOCIETY RESPONDS
 Why do information systems pose
such challenges individual privacy
and intellectual property?
 How have information systems
affected laws for establishing
accountability, liability, and the
quality of everyday life?
CH
4

More Related Content

Similar to COSC372572 Topic1 Lect1-3 (ch04)_white.pdf

Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework lauricesatu
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxbriancrawford30935
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxhoney690131
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxsmile790243
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxhoney690131
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
This assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docxThis assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docxrhetttrevannion
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxdunnramage
 

Similar to COSC372572 Topic1 Lect1-3 (ch04)_white.pdf (20)

Review questions
Review questionsReview questions
Review questions
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Ethical
EthicalEthical
Ethical
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
This assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docxThis assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docx
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 

More from ManishKarki12

Lecture 12 Social Media.ppt
Lecture 12 Social Media.pptLecture 12 Social Media.ppt
Lecture 12 Social Media.pptManishKarki12
 
SITHCCC013 Student Logbook.docx
SITHCCC013 Student Logbook.docxSITHCCC013 Student Logbook.docx
SITHCCC013 Student Logbook.docxManishKarki12
 
ERP IMPLEMENTATION.pptx
ERP IMPLEMENTATION.pptxERP IMPLEMENTATION.pptx
ERP IMPLEMENTATION.pptxManishKarki12
 

More from ManishKarki12 (6)

Lecture 12 Social Media.ppt
Lecture 12 Social Media.pptLecture 12 Social Media.ppt
Lecture 12 Social Media.ppt
 
BUS709 Lecture 4
BUS709 Lecture 4BUS709 Lecture 4
BUS709 Lecture 4
 
SITHCCC013 Student Logbook.docx
SITHCCC013 Student Logbook.docxSITHCCC013 Student Logbook.docx
SITHCCC013 Student Logbook.docx
 
part-1.ppt
part-1.pptpart-1.ppt
part-1.ppt
 
Dublin City.pptx
Dublin City.pptxDublin City.pptx
Dublin City.pptx
 
ERP IMPLEMENTATION.pptx
ERP IMPLEMENTATION.pptxERP IMPLEMENTATION.pptx
ERP IMPLEMENTATION.pptx
 

Recently uploaded

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 

Recently uploaded (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 

COSC372572 Topic1 Lect1-3 (ch04)_white.pdf

  • 1. Unboxing TOPIC 1 COSC372 / 572 MANAGEMENT INFORMATION SYSTEMS MATTHEW WYSEL THE UNIVERSITY OF NEW ENGLAND TOPIC ONE Ethical and Social Issues in Information Systems T1-1
  • 2. TOPIC 1 SESSION 1: UNBOXING ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS WHAT ARE ETHICS ANYWAY? WHY BOTHER ABOUT ETHICS? WHAT YOU NEED TO KNOW ROADMAP SUGGESTED APPLICATION CH 4
  • 3. Definitions Ethics: The rules of conduct recognized in respect to a particular class of human actions or a particular group or culture. Morals: Principles or habits with respect to right or wrong conduct. While morals also prescribe dos and don'ts, morality is ultimately a personal compass of right and wrong. Source: http://www.diffen.com/difference/Ethics_vs_Morals
  • 4.
  • 5. Roadmap for Topic 1 T1 S1 – Unboxing the Ethical and Social Issues in Information Systems T1 S2 – Ethical Frameworks and the Information You Prioritize T1 S3 – Ethics, Information Systems and how Society Responds
  • 6. Application The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control.
  • 7. Ethical, Social, and Political Issues Five moral dimensions for Information Systems: Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life
  • 8. Big Data Gets Personal: Behavioural Targeting  Why is behavioural tracking such an important ethical dilemma today? Identify the stakeholders and interest groups in favour of and opposed to behavioural tracking.  How do businesses benefit from behavioural tracking? Do people benefit? Explain your answer.  What would happen if there were no behavioural tracking on the Internet?
  • 9. TOPIC 1 SESSION 1: UNBOXING ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS WHAT ARE ETHICS ANYWAY? WHY BOTHER ABOUT ETHICS? WHAT YOU NEED TO KNOW ROADMAP SUGGESTED APPLICATION CH 4
  • 10. Ethical Frameworks and the Information You Prioritize COSC372 / 572 MANAGEMENT INFORMATION SYSTEMS MATTHEW WYSEL THE UNIVERSITY OF NEW ENGLAND TOPIC ONE Ethical and Social Issues in Information Systems T1-2
  • 11. TOPIC 1 SESSION 2: ETHICAL FRAMEWORKS AND THE INFORMATION YOU PRIORITIZE  What ethical, social, and political issues are raised by information systems?  What specific principles for conduct can be used to guide ethical decisions? CH 4
  • 12. Definitions Ethics: The rules of conduct recognized in respect to a particular class of human actions or a particular group or culture. Morals: Principles or habits with respect to right or wrong conduct. While morals also prescribe dos and don'ts, morality is ultimately a personal compass of right and wrong. Source: http://www.diffen.com/difference/Ethics_vs_Morals
  • 13. Ethical, Social, and Political Issues  Recent cases of failed ethical judgment in business:  US Elections, Lehman Brothers, Australian Financial Industry, Arthur Anderson  In many, information systems used to bury decisions from public scrutiny  Threats to Personal Privacy  Cambridge Analytica, and others  https://haveibeenpwned.com/
  • 14. What Ethical, Social, Political Issues are Raised by Information Systems?
  • 15. Ethical, Social, and Political Issues Information systems and ethics Information systems raise new ethical questions because they create opportunities for: Intense social change, Threatening existing distributions of power, money, rights, and obligations New kinds of crime
  • 16. Ethical, Social, and Political Issues Five moral dimensions for Information Systems: Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life
  • 17. Ethical, Social, and Political Issues The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control. Figure 4-1
  • 18. Ethical, Social, and Political Issues  Doubling of computer power  More organizations depend on computer systems for critical operations.  Rapidly declining data storage costs  Organizations can easily maintain detailed databases on individuals.  Networking advances and the Internet  Copying data and accessing personal data from remote locations is much easier.  Advances in data analysis techniques  Profiling: Combining data from multiple sources to create dossiers of detailed information on individuals  Nonobvious relationship awareness (NORA): Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists  Mobile device growth  Tracking of individual mobile phones + full suite of onboard sensors
  • 19. What Specific Principles for Conduct can be used to Guide Ethical Arguments?
  • 20. Principles to Guide Ethical Decisions Basic concepts for ethical analysis  Responsibility:  Accepting the potential costs, duties, and obligations for decisions  Accountability:  Mechanisms for identifying responsible parties  Liability:  Permits individuals (and firms) to recover damages done to them  Due process:  Laws are well-known and understood, with an ability to appeal to higher authorities
  • 21. Principles to Guide Ethical Decisions Five-step ethical analysis 1. Identify and clearly describe the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. 3. Identify the stakeholders. 4. Identify the options that you can reasonably take. 5. Identify the potential consequences of your options.
  • 22. Principles to Guide Ethical Decisions  Candidate ethical principles  Golden Rule Do unto others as you would have them do unto you.  Immanuel Kant’s Categorical Imperative If an action is not right for everyone to take, it is not right for anyone.  Descartes’ Rule of Change If an action cannot be taken repeatedly, it is not right to take at all.
  • 23. Principles to Guide Ethical Decisions  Candidate ethical principles (cont.)  Utilitarian Principle Take the action that achieves the higher or greater value.  Risk Aversion Principle Take the action that produces the least harm or potential cost.  Ethical “No Free Lunch” Rule Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise.
  • 24. Principles to Guide Ethical Decisions  Professional codes of conduct  Upheld by associations of professionals  Examples: AMA, ABA, AITP, ACM  Promises by professions to regulate themselves in the general interest of society  Real-world ethical dilemmas  One set of interests pitted against another  Example: right of company to maximize productivity of workers versus workers right to use Internet for short personal tasks
  • 25. TOPIC 1 SESSION 2: ETHICAL FRAMEWORKS AND THE INFORMATION YOU PRIORITIZE  What ethical, social, and political issues are raised by information systems?  What specific principles for conduct can be used to guide ethical decisions? CH 4
  • 26. Ethics, Information Systems and how Society Responds COSC372 / 572 MANAGEMENT INFORMATION SYSTEMS MATTHEW WYSEL THE UNIVERSITY OF NEW ENGLAND TOPIC ONE Ethical and Social Issues in Information Systems T1-3
  • 27. TOPIC 1 SESSION 3: ETHICS, INFORMATION SYSTEMS AND HOW SOCIETY RESPONDS  Why do information systems pose such challenges individual privacy and intellectual property?  How have information systems affected laws for establishing accountability, liability, and the quality of everyday life? CH 4
  • 28. General Data Protection Regulation (GDPR)  Problem: Widespread abuse of collection of personal data within the EU and of EU citizens.  Solutions: GDPR regulation that addresses data protection and privacy for all individuals with EU and EEA.  Aims to give control to citizens over their personal data and to simply the regulatory environment for all international businesses that operate within the EU.  Systems must include data protection by design and by default. Partial/Full anonymization; can be revoked at any time.  Fine up to €20 million or up to 4% of the annual worldwide turnover – whichever is greater.
  • 29. Why do Information Systems pose Challenges to the Protection of Individual and Collective Privacy
  • 30. Challenges to Privacy and Intellectual Property  Information rights: privacy and freedom in the Internet age  Privacy:  Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself  In the United States, privacy protected by:  First Amendment (freedom of speech)  Fourth Amendment (unreasonable search and seizure)  Additional federal statues (e.g., Privacy Act of 1974)
  • 31. Challenges to Privacy and Intellectual Property  Fair information practices:  Set of principles governing the collection and use of information  Basis of most U.S. and European privacy laws  Based on mutuality of interest between record holder and individual  Restated and extended by FTC in 1998 to provide guidelines for protecting online privacy  Used to drive changes in privacy legislation  COPPA  Gramm-Leach-Bliley Act  HIPAA  Do-Not-Track Online Act of 2011
  • 32. Challenges to Privacy and Intellectual Property FTC FIP principles:  Notice/awareness (core principle)  Web sites must disclose practices before collecting data.  Choice/consent (core principle)  Consumers must be able to choose how information is used for secondary purposes.  Access/participation  Consumers must be able to review and contest accuracy of personal data.  Security  Data collectors must take steps to ensure accuracy, security of personal data.  Enforcement  Must be mechanism to enforce FIP principles.
  • 33. Challenges to Privacy and Intellectual Property  European Directive on Data Protection – precursor to GDPR:  Companies must inform people information is collected and disclose how it is stored and used.  Requires informed consent of customer.  EU member nations cannot transfer personal data to countries without similar privacy protection.  U.S. businesses use safe harbor framework to work with EU personal data.  Stricter enforcements under consideration:  Right of access  Right to be forgotten
  • 34. Challenges to Privacy and Intellectual Property Internet challenges to privacy:  Cookies  Identify browser and track visits to site  Super cookies (Flash cookies)  Web beacons (Web bugs)  Tiny graphics embedded in e-mails and Web pages  Monitor who is reading email message or visiting site  Spyware  Surreptitiously installed on user’s computer  May transmit user’s keystrokes or display unwanted ads  Google services and behavioural targeting
  • 35.
  • 36. Challenges to Privacy and Intellectual Property HOW COOKIES IDENTIFY WEB VISITORS Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Figure 4-3
  • 37. Challenges to Privacy and Intellectual Property
  • 38. Challenges to Privacy and Intellectual Property  The United States allows businesses to gather transaction information and use this for other marketing purposes.  Opt-out (US Model) vs. opt-in model (EU Model)  Online industry promotes self-regulation over privacy legislation  However, extent of responsibility taken varies:  Complex/ambiguous privacy statements  Opt-out models selected over opt-in  Online “seals” of privacy principles
  • 39. Challenges to Privacy and Intellectual Property  Technical solutions  Email encryption  Anonymity tools  Anti-spyware tools  Browser features “Private” browsing “Do not track” options  Overall, few technical solutions
  • 40. Figure 4-3 HOW COOKIES IDENTIFY WEB VISITORS
  • 41. Challenges to Privacy and Intellectual Property  Property rights: Intellectual property  Intellectual property: intangible property of any kind created by individuals or corporations  Three main ways that intellectual property is protected:  Trade secret: intellectual work or product belonging to business, not in the public domain  Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years  Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
  • 42. Challenges to Privacy and Intellectual Property  Challenges to intellectual property rights  Digital media different from physical media (e.g., books)  Ease of replication  Ease of transmission (networks, Internet)  Difficulty in classifying software  Compactness  Difficulties in establishing uniqueness  Digital Millennium Copyright Act (DMCA)  Makes it illegal to circumvent technology-based protections of copyrighted materials
  • 43. How have Information Systems Affected Laws for Establishing Accountability, Liability and Quality of Life?
  • 44. Information Systems, Laws, and Quality of Life  Accountability, liability, control  Computer-related liability problems If software fails, who is responsible?  If seen as part of machine that injures or harms, software producer and operator may be liable.  If seen as similar to book, difficult to hold author/publisher responsible.  What should liability be if software seen as service? Would this be similar to telephone systems not being liable for transmitted messages?
  • 45. Information Systems, Laws, and Quality of Life  System quality: Data quality and system errors  What is an acceptable, technologically feasible level of system quality? Flawless software is economically unfeasible.  Three principal sources of poor system performance: Software bugs, errors Hardware or facility failures Poor input data quality (most common source of business system failure)
  • 46.  Quality of life: Equity, access, boundaries  Negative social consequences of systems Balancing power: although computing power decentralizing, key decision making remains centralized Rapidity of change: businesses may not have enough time to respond to global competition Maintaining boundaries: computing, Internet use lengthens work-day, infringes on family, personal time Dependence and vulnerability: public and private organizations ever more dependent on computer systems Information Systems, Laws, and Quality of Life
  • 47. Information Systems, Laws, and Quality of Life  Computer crime and abuse  Computer crime: commission of illegal acts through use of computer or against a computer system—computer may be object or instrument of crime  Computer abuse: unethical acts, not illegal  Spam: high costs for businesses in dealing with spam  Employment:  Reengineering work resulting in lost jobs  Equity and access—the digital divide:  Certain ethnic and income groups in the United States less likely to have computers or Internet access
  • 48. Health risks:  Repetitive stress injury (RSI) Largest source is computer keyboards Carpal tunnel syndrome (CTS)  Computer vision syndrome (CVS) Eyestrain and headaches related to screen use  Techno-stress Aggravation, impatience, fatigue Information Systems, Laws, and Quality of Life
  • 49. TOPIC 1 SESSION 3: ETHICS, INFORMATION SYSTEMS AND HOW SOCIETY RESPONDS  Why do information systems pose such challenges individual privacy and intellectual property?  How have information systems affected laws for establishing accountability, liability, and the quality of everyday life? CH 4