SlideShare a Scribd company logo
1 of 24
Personal, Legal,
Ethical, and
Organizational
Issues of
Information
Systems
4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not
be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
LEARNING OUTCOMES
2
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4
1. Discuss information privacy and methods for
improving the privacy of information
2. Explain the privacy of e-mail, data collection
issues, and censorship
3. Discuss the ethical issues related to information
technology
4. Discuss the principles of intellectual property and
issues related to the infringement of intellectual
property
LEARNING OUTCOMES (continued)
3
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4
5. Discuss information system issues that affect
organizations, including the digital divide,
electronic publishing, and the connection between
the workplace and employees’ health
6. Describe green computing and the ways it can
improve the quality of the environment
4MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Privacy Issues
• Employers search social networking sites for
background information on applicants
• Monitoring systems are adopted by
employers to check employee performance
• Healthcare organizations, financial
institutions, legal firms, and online-ordering
firms gather personal data and enter it in
databases
LO 1
5MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Privacy Issues (continued)
• Information about every aspect of people’s
lives is stored on various databases
• Many practices of government agencies, credit
agencies, and marketing companies using
databases would represent an invasion of
privacy
• Several federal laws regulate the collecting
and using of information on people and
corporations
• Narrow in scope and contain loopholes
LO 1
6MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Concepts of the Web and Network Privacy
• Set of rules specifying the legal and ethical use of a system
and the consequences of noncompliance
Acceptable use policy
• Issues involving both the user’s and the organization’s
responsibilities and liabilities
Accountability
• Method for binding all the parties to a contract
Nonrepudiation
LO 1
7MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Guidelines to Minimize the Invasion of Privacy
• Users should:
• Conduct business only with Web sites that have
privacy policies
• Limit access to personal information to those
with authorization
• Identify ways to prevent personal information
gathered from being disclosed without consent
• Be able to review their records and correct any
inaccuracies
LO 1
8MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Guidelines to Minimize the Invasion of Privacy
(continued 1)
• Organizations must:
• Ensure data’s reliability and take precautions to
prevent misuse of the data
• Make sure any data collection has a stated
purpose
• Use verification procedures to ensure data
accuracy
• Correct or delete incorrect data and delete the
data when it is no longer needed for the stated
purpose
LO 1
9MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Guidelines to Minimize the Invasion of Privacy
(continued 2)
• Not keep record-keeping systems that store
personal data a secret
• Take all necessary measures to prevent
unauthorized access to data and misuse of data
LO 1
10MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Federal Data Protection Laws
• Health Insurance Portability and
Accountability Act (HIPAA)
• Fair and Accurate Credit Transaction Act
(FACTA)
• Children’s Online Privacy Protection Act
(COPPA)
LO 1
11MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Privacy Issues Presented by E-mail
• Spam: Unsolicited e-mail sent for
advertising purposes
• Sent in bulk using automated mailing software
• Ease of access
• Individuals should assume that others have
access to their messages
• Any e-mails sent on company-owned computers
are the property of an organization
LO 1
12MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Data Collection on the Web
• Number of people shopping online is
increasing rapidly because of convenience,
the array of choices, and lower prices
• Reluctant to make online purchases because of
concerns about hackers
• Information provided on the Web can be
combined with other information and
technologies to produce new information
LO 1
13MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Technologies Used for Data Collection
• Cookies: Small text files with unique ID tags
that are embedded in a Web browser and
saved on the user’s hard drive
• Help Web sites customize pages for users
• Considered an invasion of privacy when users’
information is used without prior consent
• Installing a cookie manager helps users disable
cookies
LO 1
14MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Technologies Used for Data Collection (continued)
• Log files: Record a user’s actions on a Web
site and are generated by Web server
software
• Help in identifying cases of identity
misrepresentation on Web sites
LO 1
15MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Ethical Issues of Information Technologies
• Information technology offers opportunities
for unethical behavior because of the ease
of collecting and disseminating information
• Increase in cybercrime, cyberfraud, identity
theft, and intellectual property theft
• Organizations can reduce unethical
behavior of employees by developing and
enforcing codes of ethics
LO 2
16MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Types of Information on the Web
• Public information
• Posted by an organization or public agency
• Censored for public policy reasons
• Censored if the content is deemed offensive to a
political, religious, or cultural group
• Private information
• Posted by a person
• Uncensored because of constitutional freedom
of expression
LO 2
17MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Censorship
• Restricting access to the Web
• Countries such as China, Myanmar (Burma), and
Singapore restrict or forbid their citizens’ access
to the Web
➖ Internet neutrality: Internet service providers
(ISPs) and government agencies should treat
all data on the Internet equally
• Parents use programs such as CyberPatrol,
CyberSitter, Net Nanny, and SafeSurf to prevent
children’s access to a few Web sites
LO 2
18MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Intellectual Property
• Legal umbrella covering protections that
involve copyrights, trademarks, trade
secrets, and patents developed by people
or businesses
LO 2
19MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Categories in Intellectual Property
• Industrial property
• Inventions, trademarks, logos, and industrial
designs
• Copyrighted material
• Literary and artistic works
• Online materials such as Web pages, HTML
code, and computer graphics
• Fair Use Doctrine - Exception to the copyright
law that allows the use of copyrighted material
for certain purposes
LO 2
20MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Intellectual Property Protections
• Trademark - Protects product names and
identifying marks
• Patent - Protects new processes
• Advantages of patents to organizations
➖ Generates revenue by licensing the patent
➖ Attracts funding for research and
development
➖ Keeps competitors from entering certain
market segments
LO 2
21MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Laws Covering Software Piracy
• 1980 revisions to the Copyright Act of 1976
include computer programs
• Laws covering legal issues related to
information technologies in the United
States
• Telecommunications Act of 1996
• Communications Decency Act (CDA)
• Laws against spamming
LO 2
22MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Cybersquatting
• Registering, selling, or using a domain name
to profit from someone else’s trademark
• Typosquatting - Relies on typographical
errors made by Web users when typing a
Web site address into a Web browser
• Variation of cybersquatting
• Called URL hijacking
LO 2
23MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Digital Divide
• Divide created between the information
rich and the information poor by
information technology and the Internet
• Computers still are not affordable for many
people
• Increasing funding for computers at schools and
public places helps offset the divide
LO 2
24MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Impact of Information Technology in the
Workplace
• Creation of technical jobs, requiring
extensive training
• Increased consumers’ purchasing power
• Results in a stronger economy by reducing
production costs
• Direct effect on the nature of jobs
• Telecommuting enables people to perform their
jobs from home
• Organizations can use the best human resources
in a large geographical region
LO 3
25MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Impact of Information Technology in the
Workplace (continued)
• Job deskilling - Occurs when skilled labor is
eliminated by high technology
• Virtual organizations: Networks of
independent companies, suppliers,
customers, and manufacturers connected
via information technologies
• To share skills and cost
• To have access to each other’s markets
LO 3
26
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4
Table 4.1 Potential Benefits and Drawbacks of
Telecommuting
Potential Benefits
Can care for small children or elderly parents and spend more
time with family
Have fewer restrictions on clothing for work, thereby saving the
expense of work wear
No commute, so distance and time factors are reduced as well as
the effects of car
emissions on air quality
Able to work in more pleasant surroundings
Increased productivity
Decreased neighborhood crime because of more people being
home during the day
Easier work environment for employees with disabilities
Reduced costs for office space and utilities
Reduced employee turnover and absenteeism
Able to find and hire people with special skills, regardless of
where they are located
Fewer interruptions from coworkers
LO 3
27
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4
Table 4.1 Potential Benefits and Drawbacks of
Telecommuting (continued)
Potential Drawbacks
Can become a workaholic (no hard boundaries between “at
work” and “at home”)
No regulated work routine
Less interaction with coworkers
No separation between work and home life
Potential legal issues about workers’ injuries
Family interruptions and household distractions
Lack of necessary supplies or equipment
Could create a two-tiered workforce—telecommuters and on-
site workers—
that affects promotions and raises
LO 3
28MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Information Technology and Health Issues
• Increasing popularity of touchscreens result
in stress-related injuries of the users’ hands,
arms, back, and eyes
• Health problems related to computer
equipment
• Vision problems
• Musculoskeletal problems
• Skin problems
• Reproductive problems
• Stress-related problems
LO 3
29MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Green Computing
• Promotes a sustainable environment and
consumes the least amount of energy
• Involves the design, manufacture, use, and
disposal of computers, servers, and
computing devices with minimal impact on
the environment
• Requires cooperation of both private and
public sectors
LO 4
30MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Ways to Achieve Green Computing
• Designing products that last longer and are
modular in design
• Parts can be upgraded without replacing the
entire system
• Designing search engines and computing
routines that are faster and consume less
energy
• Replacing underutilized smaller servers with
one large server using a virtualization
technique
LO 4
31MIS8 | CH4
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Ways to Achieve Green Computing (continued)
• Using computing devices that consume less
energy and are biodegradable
• Allowing certain employees to work from
their homes to reduce carbon footprints
• Conducting meetings over computer
networks to reduce business travel
• Encouraging carpool and non-motorized
transportation for employees
• Turning off idle PCs and recycling computer-
related materials
LO 4
32Copy r i gh t ©201 8 Cenga g e Lear ni n g . A l l Ri ghts
Res er v ed . M ay not be s c anne d , c opi ed or dupl i c at e d
, or pos te d to a publ i c l y ac c e s s i bl e webs i te , i n
whol e or i n par t. HIST4 | CH6 32MIS8 | CH4
KEY TERMS
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. 32
• Acceptable use
policy
• Accountability
• Nonrepudiation
• Spam
• Cookies
• Log files
• Intellectual property
• Cybersquatting
• Digital divide
• Virtual organizations
• Green computing
33Copy r i gh t ©201 8 Cenga g e Lear ni n g . A l l Ri ghts
Res er v ed . M ay not be s c anne d , c opi ed or dupl i c at e d
, or pos te d to a publ i c l y ac c e s s i bl e webs i te , i n
whol e or i n par t. 33
SUMMARY
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4 33
• Employers search social networking sites,
such as Facebook or Instagram, to find
background information on applicants
• Spamming presents serious privacy issues
• Two types of information available on the
Web are public and private
34Copy r i gh t ©201 8 Cenga g e Lear ni n g . A l l Ri ghts
Res er v ed . M ay not be s c anne d , c opi ed or dupl i c at e d
, or pos te d to a publ i c l y ac c e s s i bl e webs i te , i n
whol e or i n par t. 34
SUMMARY (continued)
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4 34
• Many associations promote the ethically
responsible use of information systems and
technologies
• Information technology has created many
new jobs
• Green computing is one of the methods for
combating global warming
35
Copyright ©2018 Cengage Learning. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part. MIS8 | CH4

More Related Content

Similar to Personal, Legal, Ethical, and Organizational Issues of .docx

#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarEnough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarConcept Searching, Inc
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3Anne Starr
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3Anne Starr
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
SharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet ManagersSharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet ManagersPrescient Digital Media
 

Similar to Personal, Legal, Ethical, and Organizational Issues of .docx (20)

#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarEnough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
SharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet ManagersSharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet Managers
 

More from karlhennesey

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxkarlhennesey
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxkarlhennesey
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxkarlhennesey
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxkarlhennesey
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxkarlhennesey
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxkarlhennesey
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxkarlhennesey
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxkarlhennesey
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxkarlhennesey
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxkarlhennesey
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxkarlhennesey
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxkarlhennesey
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxkarlhennesey
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxkarlhennesey
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxkarlhennesey
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxkarlhennesey
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxkarlhennesey
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxkarlhennesey
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxkarlhennesey
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxkarlhennesey
 

More from karlhennesey (20)

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docx
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docx
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docx
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docx
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docx
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docx
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docx
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docx
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docx
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docx
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docx
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
 

Recently uploaded

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Personal, Legal, Ethical, and Organizational Issues of .docx

  • 1. Personal, Legal, Ethical, and Organizational Issues of Information Systems 4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. LEARNING OUTCOMES 2 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4 1. Discuss information privacy and methods for improving the privacy of information 2. Explain the privacy of e-mail, data collection issues, and censorship
  • 2. 3. Discuss the ethical issues related to information technology 4. Discuss the principles of intellectual property and issues related to the infringement of intellectual property LEARNING OUTCOMES (continued) 3 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4 5. Discuss information system issues that affect organizations, including the digital divide, electronic publishing, and the connection between the workplace and employees’ health 6. Describe green computing and the ways it can improve the quality of the environment 4MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues • Employers search social networking sites for
  • 3. background information on applicants • Monitoring systems are adopted by employers to check employee performance • Healthcare organizations, financial institutions, legal firms, and online-ordering firms gather personal data and enter it in databases LO 1 5MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (continued) • Information about every aspect of people’s lives is stored on various databases • Many practices of government agencies, credit agencies, and marketing companies using databases would represent an invasion of privacy • Several federal laws regulate the collecting and using of information on people and corporations • Narrow in scope and contain loopholes LO 1
  • 4. 6MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Concepts of the Web and Network Privacy • Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance Acceptable use policy • Issues involving both the user’s and the organization’s responsibilities and liabilities Accountability • Method for binding all the parties to a contract Nonrepudiation LO 1 7MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Guidelines to Minimize the Invasion of Privacy
  • 5. • Users should: • Conduct business only with Web sites that have privacy policies • Limit access to personal information to those with authorization • Identify ways to prevent personal information gathered from being disclosed without consent • Be able to review their records and correct any inaccuracies LO 1 8MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Guidelines to Minimize the Invasion of Privacy (continued 1) • Organizations must: • Ensure data’s reliability and take precautions to prevent misuse of the data • Make sure any data collection has a stated purpose
  • 6. • Use verification procedures to ensure data accuracy • Correct or delete incorrect data and delete the data when it is no longer needed for the stated purpose LO 1 9MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Guidelines to Minimize the Invasion of Privacy (continued 2) • Not keep record-keeping systems that store personal data a secret • Take all necessary measures to prevent unauthorized access to data and misuse of data LO 1 10MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
  • 7. Federal Data Protection Laws • Health Insurance Portability and Accountability Act (HIPAA) • Fair and Accurate Credit Transaction Act (FACTA) • Children’s Online Privacy Protection Act (COPPA) LO 1 11MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues Presented by E-mail • Spam: Unsolicited e-mail sent for advertising purposes • Sent in bulk using automated mailing software • Ease of access • Individuals should assume that others have access to their messages • Any e-mails sent on company-owned computers are the property of an organization LO 1
  • 8. 12MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Data Collection on the Web • Number of people shopping online is increasing rapidly because of convenience, the array of choices, and lower prices • Reluctant to make online purchases because of concerns about hackers • Information provided on the Web can be combined with other information and technologies to produce new information LO 1 13MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Technologies Used for Data Collection • Cookies: Small text files with unique ID tags that are embedded in a Web browser and
  • 9. saved on the user’s hard drive • Help Web sites customize pages for users • Considered an invasion of privacy when users’ information is used without prior consent • Installing a cookie manager helps users disable cookies LO 1 14MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Technologies Used for Data Collection (continued) • Log files: Record a user’s actions on a Web site and are generated by Web server software • Help in identifying cases of identity misrepresentation on Web sites LO 1 15MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly
  • 10. accessible website, in whole or in part. Ethical Issues of Information Technologies • Information technology offers opportunities for unethical behavior because of the ease of collecting and disseminating information • Increase in cybercrime, cyberfraud, identity theft, and intellectual property theft • Organizations can reduce unethical behavior of employees by developing and enforcing codes of ethics LO 2 16MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Types of Information on the Web • Public information • Posted by an organization or public agency • Censored for public policy reasons • Censored if the content is deemed offensive to a political, religious, or cultural group • Private information
  • 11. • Posted by a person • Uncensored because of constitutional freedom of expression LO 2 17MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Censorship • Restricting access to the Web • Countries such as China, Myanmar (Burma), and Singapore restrict or forbid their citizens’ access to the Web ➖ Internet neutrality: Internet service providers (ISPs) and government agencies should treat all data on the Internet equally • Parents use programs such as CyberPatrol, CyberSitter, Net Nanny, and SafeSurf to prevent children’s access to a few Web sites LO 2 18MIS8 | CH4
  • 12. Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Intellectual Property • Legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents developed by people or businesses LO 2 19MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Categories in Intellectual Property • Industrial property • Inventions, trademarks, logos, and industrial designs • Copyrighted material • Literary and artistic works • Online materials such as Web pages, HTML code, and computer graphics • Fair Use Doctrine - Exception to the copyright
  • 13. law that allows the use of copyrighted material for certain purposes LO 2 20MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Intellectual Property Protections • Trademark - Protects product names and identifying marks • Patent - Protects new processes • Advantages of patents to organizations ➖ Generates revenue by licensing the patent ➖ Attracts funding for research and development ➖ Keeps competitors from entering certain market segments LO 2 21MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly
  • 14. accessible website, in whole or in part. Laws Covering Software Piracy • 1980 revisions to the Copyright Act of 1976 include computer programs • Laws covering legal issues related to information technologies in the United States • Telecommunications Act of 1996 • Communications Decency Act (CDA) • Laws against spamming LO 2 22MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Cybersquatting • Registering, selling, or using a domain name to profit from someone else’s trademark • Typosquatting - Relies on typographical errors made by Web users when typing a Web site address into a Web browser • Variation of cybersquatting
  • 15. • Called URL hijacking LO 2 23MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Digital Divide • Divide created between the information rich and the information poor by information technology and the Internet • Computers still are not affordable for many people • Increasing funding for computers at schools and public places helps offset the divide LO 2 24MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Impact of Information Technology in the
  • 16. Workplace • Creation of technical jobs, requiring extensive training • Increased consumers’ purchasing power • Results in a stronger economy by reducing production costs • Direct effect on the nature of jobs • Telecommuting enables people to perform their jobs from home • Organizations can use the best human resources in a large geographical region LO 3 25MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Impact of Information Technology in the Workplace (continued) • Job deskilling - Occurs when skilled labor is eliminated by high technology • Virtual organizations: Networks of independent companies, suppliers,
  • 17. customers, and manufacturers connected via information technologies • To share skills and cost • To have access to each other’s markets LO 3 26 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4 Table 4.1 Potential Benefits and Drawbacks of Telecommuting Potential Benefits Can care for small children or elderly parents and spend more time with family Have fewer restrictions on clothing for work, thereby saving the expense of work wear No commute, so distance and time factors are reduced as well as the effects of car emissions on air quality Able to work in more pleasant surroundings Increased productivity Decreased neighborhood crime because of more people being
  • 18. home during the day Easier work environment for employees with disabilities Reduced costs for office space and utilities Reduced employee turnover and absenteeism Able to find and hire people with special skills, regardless of where they are located Fewer interruptions from coworkers LO 3 27 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4 Table 4.1 Potential Benefits and Drawbacks of Telecommuting (continued) Potential Drawbacks Can become a workaholic (no hard boundaries between “at work” and “at home”) No regulated work routine Less interaction with coworkers No separation between work and home life
  • 19. Potential legal issues about workers’ injuries Family interruptions and household distractions Lack of necessary supplies or equipment Could create a two-tiered workforce—telecommuters and on- site workers— that affects promotions and raises LO 3 28MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Information Technology and Health Issues • Increasing popularity of touchscreens result in stress-related injuries of the users’ hands, arms, back, and eyes • Health problems related to computer equipment • Vision problems • Musculoskeletal problems • Skin problems • Reproductive problems
  • 20. • Stress-related problems LO 3 29MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Green Computing • Promotes a sustainable environment and consumes the least amount of energy • Involves the design, manufacture, use, and disposal of computers, servers, and computing devices with minimal impact on the environment • Requires cooperation of both private and public sectors LO 4 30MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
  • 21. Ways to Achieve Green Computing • Designing products that last longer and are modular in design • Parts can be upgraded without replacing the entire system • Designing search engines and computing routines that are faster and consume less energy • Replacing underutilized smaller servers with one large server using a virtualization technique LO 4 31MIS8 | CH4 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Ways to Achieve Green Computing (continued) • Using computing devices that consume less energy and are biodegradable • Allowing certain employees to work from their homes to reduce carbon footprints • Conducting meetings over computer networks to reduce business travel
  • 22. • Encouraging carpool and non-motorized transportation for employees • Turning off idle PCs and recycling computer- related materials LO 4 32Copy r i gh t ©201 8 Cenga g e Lear ni n g . A l l Ri ghts Res er v ed . M ay not be s c anne d , c opi ed or dupl i c at e d , or pos te d to a publ i c l y ac c e s s i bl e webs i te , i n whol e or i n par t. HIST4 | CH6 32MIS8 | CH4 KEY TERMS Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32 • Acceptable use policy • Accountability • Nonrepudiation • Spam • Cookies • Log files
  • 23. • Intellectual property • Cybersquatting • Digital divide • Virtual organizations • Green computing 33Copy r i gh t ©201 8 Cenga g e Lear ni n g . A l l Ri ghts Res er v ed . M ay not be s c anne d , c opi ed or dupl i c at e d , or pos te d to a publ i c l y ac c e s s i bl e webs i te , i n whol e or i n par t. 33 SUMMARY Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4 33 • Employers search social networking sites, such as Facebook or Instagram, to find background information on applicants • Spamming presents serious privacy issues • Two types of information available on the Web are public and private 34Copy r i gh t ©201 8 Cenga g e Lear ni n g . A l l Ri ghts
  • 24. Res er v ed . M ay not be s c anne d , c opi ed or dupl i c at e d , or pos te d to a publ i c l y ac c e s s i bl e webs i te , i n whol e or i n par t. 34 SUMMARY (continued) Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4 34 • Many associations promote the ethically responsible use of information systems and technologies • Information technology has created many new jobs • Green computing is one of the methods for combating global warming 35 Copyright ©2018 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. MIS8 | CH4