SlideShare a Scribd company logo
4.1 © 2010 by Prentice Hall
1
Chapter
Ethical and Social Issues in
Information Systems
4.2 © 2010 by Prentice Hall
• Information rights and obligations
• Privacy
• Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or the state.
• Ability to control information about yourself
• In U.S., privacy protected by:
• First Amendment (freedom of speech)
• Fourth Amendment (unreasonable search and seizure)
• Additional federal statues
• Privacy Act of 1974
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.3 © 2010 by Prentice Hall
• Internet Challenges to Privacy:
• Cookies
• Tiny files downloaded by Web site to visitor’s hard drive
• Identify visitor’s browser and track visits to site
• Allow Web sites to develop profiles on visitors
• Web bugs
• Tiny graphics embedded in e-mail messages and Web pages
• Designed to monitor who is reading a message and transmitting that
information to another computer on the Internet
• Spyware
• Surreptitiously installed on user’s computer
• May transmit user’s keystrokes or display unwanted ads
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.4 © 2010 by Prentice Hall
The Moral Dimensions of Information Systems
How Cookies Identify Web Visitors
Figure 4-3
Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server
requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web
site can then use these data to display personalized information.
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.5 © 2010 by Prentice Hall
• Technical solutions
• The Platform for Privacy Preferences (P3P)
• Allows Web sites to communicate privacy policies to
visitor’s Web browser – user
• User specifies privacy levels desired in browser settings
• E.g., “medium” level accepts cookies from first-party host
sites that have opt-in or opt-out policies but rejects third-
party cookies that use personally identifiable information
without an opt-in policy.
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.6 © 2010 by Prentice Hall
• Property Rights: Intellectual Property
• Intellectual property: Intangible property of any kind
created by individuals or corporations
• Three ways that intellectual property is protected
• Trade secret: Intellectual work or product belonging to
business, not in the public domain
• Copyright: Statutory grant protecting intellectual property
from being copied for the life of the author, plus 70 years
• Patents: Grants creator of invention an exclusive monopoly
on ideas behind invention for 20 years
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.7 © 2010 by Prentice Hall
• Challenges to Intellectual Property Rights
• Digital media different from physical media (e.g.
books)
• Ease of replication
• Ease of transmission (networks, Internet)
• Difficulty in classifying software
• Compactness
• Difficulties in establishing uniqueness
• Digital Millenium Copyright Act (DMCA)
• Makes it illegal to circumvent technology-based
protections of copyrighted materials
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.8 © 2010 by Prentice Hall
• Accountability, Liability, Control
• Computer-related liability problems
• If software fails, who is responsible?
• If seen as a part of a machine that injures or harms,
software producer and operator may be liable
• If seen as similar to a book, difficult to hold software
author/publisher responsible
• What should liability be if software is seen as service?
Would this be similar to telephone systems not being liable
for transmitted messages (so-called “common carriers”)
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.9 © 2010 by Prentice Hall
• System Quality: Data Quality and System
Errors
• What is an acceptable, technologically feasible level of
system quality?
• Flawless software is economically unfeasible
• Three principal sources of poor system performance:
• Software bugs, errors
• Hardware or facility failures
• Poor input data quality (most common source of business
system failure)
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.10 © 2010 by Prentice Hall
• Quality of Life: Negative social consequences of
systems
• Balancing power: Although computing power is decentralizing,
key decision-making power remains centralized
• Rapidity of change: Businesses may not have enough time to
respond to global competition
• Maintaining boundaries: Computing and Internet use lengthens
the work-day, infringes on family, personal time
• Dependence and vulnerability: Public and private organizations
ever more dependent on computer systems
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.11 © 2010 by Prentice Hall
• Computer crime and abuse
• Computer crime: Commission of illegal acts through use of
compute or against a computer system – computer may be
object or instrument of crime
• Computer abuse: Unethical acts, not illegal
• Spam: High costs for businesses in dealing with spam
• Employment: Reengineering work resulting in lost
jobs
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.12 © 2010 by Prentice Hall
• Health risks:
• Repetitive stress injury (RSI)
• Largest source is computer keyboards
• Carpal Tunnel Syndrome (CTS)
• Computer vision syndrome (CVS)
• Technostress
• Role of radiation, screen emissions, low-level
electromagnetic fields
The Moral Dimensions of Information Systems
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems
4.13 © 2010 by Prentice Hall
End of Lecture
Professional Issues in Information Systems
Chapter 1 Ethical and Social Issues in Information Systems

More Related Content

What's hot

Peer to peer
Peer to peerPeer to peer
Peer to peer
Raymond Douglas
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
Uc Man
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Software liability
Software liabilitySoftware liability
Software liability
ALIAS Network
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
Syed Hassan Ali
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
Subhash Vadadoriya
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
Transweb Global Inc
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
Vivek Kumar Sinha
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
 
Computer network
Computer networkComputer network
Computer network
Neha Gupta
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 

What's hot (20)

Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Software liability
Software liabilitySoftware liability
Software liability
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Network ppt
Network pptNetwork ppt
Network ppt
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Computer network
Computer networkComputer network
Computer network
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

Similar to CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt

PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
Mohamed Ali
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
RogerPrimo2
 
MISch04
MISch04MISch04
MISch04
ChSheraz3
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
Kashif Sohail
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
SATYAJIT58
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
Raymond Gao
 
Ethical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptEthical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .ppt
AfricaRealInformatic
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
balewayalew
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
krishnakumarkrishnak3
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
HudaElMaghraby1
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Ethical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxEthical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptx
MICHAELJOHNPEDRASA1
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
MIS Wk-12.ppt
MIS Wk-12.pptMIS Wk-12.ppt
MIS Wk-12.ppt
NasirMehmood666923
 

Similar to CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt (20)

PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
 
MISch04
MISch04MISch04
MISch04
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Ethical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptEthical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .ppt
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Ethical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxEthical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
MIS Wk-12.ppt
MIS Wk-12.pptMIS Wk-12.ppt
MIS Wk-12.ppt
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 

CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt

  • 1. 4.1 © 2010 by Prentice Hall 1 Chapter Ethical and Social Issues in Information Systems
  • 2. 4.2 © 2010 by Prentice Hall • Information rights and obligations • Privacy • Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. • Ability to control information about yourself • In U.S., privacy protected by: • First Amendment (freedom of speech) • Fourth Amendment (unreasonable search and seizure) • Additional federal statues • Privacy Act of 1974 The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 3. 4.3 © 2010 by Prentice Hall • Internet Challenges to Privacy: • Cookies • Tiny files downloaded by Web site to visitor’s hard drive • Identify visitor’s browser and track visits to site • Allow Web sites to develop profiles on visitors • Web bugs • Tiny graphics embedded in e-mail messages and Web pages • Designed to monitor who is reading a message and transmitting that information to another computer on the Internet • Spyware • Surreptitiously installed on user’s computer • May transmit user’s keystrokes or display unwanted ads The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 4. 4.4 © 2010 by Prentice Hall The Moral Dimensions of Information Systems How Cookies Identify Web Visitors Figure 4-3 Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 5. 4.5 © 2010 by Prentice Hall • Technical solutions • The Platform for Privacy Preferences (P3P) • Allows Web sites to communicate privacy policies to visitor’s Web browser – user • User specifies privacy levels desired in browser settings • E.g., “medium” level accepts cookies from first-party host sites that have opt-in or opt-out policies but rejects third- party cookies that use personally identifiable information without an opt-in policy. The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 6. 4.6 © 2010 by Prentice Hall • Property Rights: Intellectual Property • Intellectual property: Intangible property of any kind created by individuals or corporations • Three ways that intellectual property is protected • Trade secret: Intellectual work or product belonging to business, not in the public domain • Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years • Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 7. 4.7 © 2010 by Prentice Hall • Challenges to Intellectual Property Rights • Digital media different from physical media (e.g. books) • Ease of replication • Ease of transmission (networks, Internet) • Difficulty in classifying software • Compactness • Difficulties in establishing uniqueness • Digital Millenium Copyright Act (DMCA) • Makes it illegal to circumvent technology-based protections of copyrighted materials The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 8. 4.8 © 2010 by Prentice Hall • Accountability, Liability, Control • Computer-related liability problems • If software fails, who is responsible? • If seen as a part of a machine that injures or harms, software producer and operator may be liable • If seen as similar to a book, difficult to hold software author/publisher responsible • What should liability be if software is seen as service? Would this be similar to telephone systems not being liable for transmitted messages (so-called “common carriers”) The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 9. 4.9 © 2010 by Prentice Hall • System Quality: Data Quality and System Errors • What is an acceptable, technologically feasible level of system quality? • Flawless software is economically unfeasible • Three principal sources of poor system performance: • Software bugs, errors • Hardware or facility failures • Poor input data quality (most common source of business system failure) The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 10. 4.10 © 2010 by Prentice Hall • Quality of Life: Negative social consequences of systems • Balancing power: Although computing power is decentralizing, key decision-making power remains centralized • Rapidity of change: Businesses may not have enough time to respond to global competition • Maintaining boundaries: Computing and Internet use lengthens the work-day, infringes on family, personal time • Dependence and vulnerability: Public and private organizations ever more dependent on computer systems The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 11. 4.11 © 2010 by Prentice Hall • Computer crime and abuse • Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime • Computer abuse: Unethical acts, not illegal • Spam: High costs for businesses in dealing with spam • Employment: Reengineering work resulting in lost jobs The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 12. 4.12 © 2010 by Prentice Hall • Health risks: • Repetitive stress injury (RSI) • Largest source is computer keyboards • Carpal Tunnel Syndrome (CTS) • Computer vision syndrome (CVS) • Technostress • Role of radiation, screen emissions, low-level electromagnetic fields The Moral Dimensions of Information Systems Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems
  • 13. 4.13 © 2010 by Prentice Hall End of Lecture Professional Issues in Information Systems Chapter 1 Ethical and Social Issues in Information Systems