SlideShare a Scribd company logo
MANAGEMENT INFORMATION
SYSTEM
Ethical & Social
Issues in MIS
Information systems and ethics
– Information systems raise new ethical
questions because they create
opportunities for:
Intense social change, threatening
existing distributions of power, money,
rights, and obligations
New kinds of crime
Key technology trends that raise
ethical issues
1. Doubling of computer power
– More organizations depend on computer systems for
critical operations
1. Rapidly declining data storage costs
– Organizations can easily maintain detailed databases on
individuals
1. Networking advances and the Internet
– Copying data from one location to another and accessing
personal data from remote locations is much easier
4. Advances in data analysis techniques
– Companies can analyze vast quantities of data
gathered on individuals for:
 Profiling
– Combining data from multiple sources to create
dossiers of detailed information on individuals
 Nonobvious relationship awareness (NORA)
– Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists
NORA technology can take information about people from disparate sources
and find obscure, nonobvious relationships. It might discover, for example, that
an applicant for a job shares a telephone number with a known criminal and
issue an alert to the hiring manager.
Where does it cross the line?
 Edward Snowden
 He leaked classified documents
that revealed numerous global
surveillance programs, many run
by the NSA and the Five
Eyes* with the cooperation
of telecommunication
companies and European
governments
* It is an intelligence alliance comprising Australia, Canada, New
Zealand, the United Kingdom, and the United States
Ethics in an Information Society
 Basic concepts for ethical analysis
– Responsibility:
 Accepting the potential costs, duties, and obligations for
decisions
– Accountability:
 Mechanisms for identifying responsible parties
– Liability:
 Permits individuals (and firms) to recover damages done to
them
– Due process:
 Laws are well known and understood, with an ability to appeal
to higher authorities
 Ethical analysis: A five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the
higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably
take
5. Identify the potential consequences of your
options
 Six Candidate Ethical Principles
1. Golden Rule
 Do unto others as you would have them do unto you
1. Immanuel Kant’s Categorical Imperative
 If an action is not right for everyone to take, it is not right
for anyone
1. Descartes’ Rule of Change
 If an action cannot be taken repeatedly, it is not right to
take at all
 Six Candidate Ethical Principles (cont.)
4. Utilitarian Principle
 Take the action that achieves the higher or greater value
4. Risk Aversion Principle
 Take the action that produces the least harm or least
potential cost
4. Ethical “no free lunch” Rule
 Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise
Five moral dimensions of the
information age
1. Information rights and obligations
2. Property rights and obligations
3. Accountability and control
4. System quality
5. Quality of life
Five moral dimensions graphically
1- Information rights and
obligations
 Privacy:
– Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself
 Do you believe that there are sufficient
protections for privacy in law?
Data protection laws of the world
 http://www.dlapiperdataprotection.com/
Fair Information Practices (FIP)
 Notice/awareness (core principle)
– Web sites must disclose practices before collecting
data
 Choice/consent (core principle)
– Consumers must be able to choose how information
is
 Access/participation
– Consumers must be able to review, contest
accuracy of personal data
Fair Information Practices (FIP)
 Security
– Data collectors must take steps to ensure accuracy,
security of personal data
 Enforcement
– There must be a mechanism to enforce FIP
principles
Internet challenges to privacy
 Cookies
– Tiny files downloaded by Web site to visitor’s hard drive
to help identify visitor’s browser and track visits to site
– Allow Web sites to develop profiles on visitors
 Web beacons/bugs
– Tiny graphics embedded in e-mail and Web pages to
monitor who is reading message
 Spyware
– Surreptitiously installed on user’s computer
– May transmit user’s keystrokes or display unwanted ads
Google’s collection of private data;
behavioral targeting
 What are your thoughts on it?
2 - Property rights and obligations
 Intellectual property: Intangible property of any
kind created by individuals or corporations
 Three main ways that protect intellectual property
1. Trade secret: Intellectual work or product belonging to
business, not in the public domain
2. Copyright: Statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years
3. Patents: Grants creator of invention an exclusive
monopoly on ideas behind invention for 20 years
 Challenges to intellectual property rights
– Digital media different from physical media (e.g.
books)
 Ease of replication
 Ease of transmission (networks, Internet)
 Difficulty in classifying software
 Compactness
 Difficulties in establishing uniqueness
3 - Accountability and control
Computer-related liability problems
– If software fails, who is responsible?
– Eg, Amazon and its clients
4 - Systems quality
 System Quality: Data Quality and System Errors
– What is an acceptable, technologically feasible level of
system quality?
 Flawless software is economically unfeasible
– Three principal sources of poor system performance:
 Software bugs, errors
 Hardware or facility failures
 Poor input data quality (most common source of business
system failure)
5 - Quality of life
 Quality of life: Equity, access, and boundaries
– Negative social consequences of systems
 Balancing power: Although computing power helps
decentralizing, key decision-making remains centralized
 Rapidity of change: Businesses may not have enough time
to respond to global competition
 Maintaining boundaries: Computing, Internet use lengthens
work-day, infringes on family, personal time
 Dependence and vulnerability: Public and private
organizations ever more dependent on computer systems
Health risks:
– Repetitive stress injury (RSI)
Largest source is computer keyboards
Carpal Tunnel Syndrome (CTS)
– Computer vision syndrome (CVS)
– Technostress
– Role of radiation, screen emissions, low-
level electromagnetic fields
 Computer crime and abuse
– Computer crime: Commission of illegal acts through use
of compute or against a computer system – computer
may be object or instrument of crime
– Computer abuse: Unethical acts, not illegal
 Spam: High costs for businesses in dealing with spam
 Employment:
– Reengineering work resulting in lost jobs
 Equity and access – the digital divide:
– Certain ethnic and income groups in the United States
less likely to have computers or Internet access
Questions??

More Related Content

What's hot

Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Aamir Abbas
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
Tonmoy zahid Rishad
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
Sukanya Ben
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
home based
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systemsProf. Othman Alsalloum
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
mmuser2014
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
METHODIST COLLEGE OF ENGG & TECH
 
Chapter-5 Industry and competitor analysis
Chapter-5 Industry and competitor analysisChapter-5 Industry and competitor analysis
Chapter-5 Industry and competitor analysisAfzaal Ali
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
Sukanya Ben
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantage
Harmanjeet Kaur
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
Dattatreya Reddy Peram
 
Information Systems Evolution (IS)
Information Systems Evolution (IS)Information Systems Evolution (IS)
Information Systems Evolution (IS)
Helmee Halim
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
The evolution of management information system
The evolution of management information systemThe evolution of management information system
The evolution of management information system
Cheryl Asia
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
Suleyman Ally
 

What's hot (20)

Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Chapter-5 Industry and competitor analysis
Chapter-5 Industry and competitor analysisChapter-5 Industry and competitor analysis
Chapter-5 Industry and competitor analysis
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantage
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
Chapter 1 MIS
Chapter 1 MISChapter 1 MIS
Chapter 1 MIS
 
Information Systems Evolution (IS)
Information Systems Evolution (IS)Information Systems Evolution (IS)
Information Systems Evolution (IS)
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
The evolution of management information system
The evolution of management information systemThe evolution of management information system
The evolution of management information system
 
Financial Information System
Financial Information SystemFinancial Information System
Financial Information System
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
 

Similar to Ethical And Social Issues in MIS - Management Information System

COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
ManishKarki12
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
Raymond Gao
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
Wulax37
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
superb11b
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
Katy Kate
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
Bilal Ahmad
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
Mohamed Ali
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
503SaranyaS
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 

Similar to Ethical And Social Issues in MIS - Management Information System (20)

Chapter 4
Chapter 4Chapter 4
Chapter 4
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Review questions
Review questionsReview questions
Review questions
 
Technological trends
Technological trendsTechnological trends
Technological trends
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 

More from FaHaD .H. NooR

FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FaHaD .H. NooR
 
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
FaHaD .H. NooR
 
FAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
FAHAD HASSAN NOOR || UCP Business School Associate Dean RecommendedFAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
FAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
FaHaD .H. NooR
 
FAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business SchoolFAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business School
FaHaD .H. NooR
 
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
FaHaD .H. NooR
 
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan NoorOperations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
FaHaD .H. NooR
 
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan NoorSupply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
FaHaD .H. NooR
 
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
FaHaD .H. NooR
 
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
FaHaD .H. NooR
 
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
FaHaD .H. NooR
 
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan NoorTraining for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
FaHaD .H. NooR
 
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan NoorTikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
FaHaD .H. NooR
 
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan NoorAmazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
FaHaD .H. NooR
 
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan NoorComplete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
FaHaD .H. NooR
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
FaHaD .H. NooR
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
FaHaD .H. NooR
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
FaHaD .H. NooR
 
Creating and Managing Supplier Relationships
Creating and Managing Supplier RelationshipsCreating and Managing Supplier Relationships
Creating and Managing Supplier Relationships
FaHaD .H. NooR
 
ETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCINGETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCING
FaHaD .H. NooR
 
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
FaHaD .H. NooR
 

More from FaHaD .H. NooR (20)

FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
 
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
 
FAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
FAHAD HASSAN NOOR || UCP Business School Associate Dean RecommendedFAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
FAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
 
FAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business SchoolFAHAD HASSAN NOOR || UCP Business School
FAHAD HASSAN NOOR || UCP Business School
 
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
 
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan NoorOperations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
 
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan NoorSupply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
 
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
 
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
 
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
 
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan NoorTraining for Zendesk Administrators MasterClass - Fahad Hassan Noor
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
 
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan NoorTikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
 
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan NoorAmazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
 
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan NoorComplete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
 
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Creating and Managing Supplier Relationships
Creating and Managing Supplier RelationshipsCreating and Managing Supplier Relationships
Creating and Managing Supplier Relationships
 
ETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCINGETHICAL AND SUSTAINABLE SOURCING
ETHICAL AND SUSTAINABLE SOURCING
 
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Ethical And Social Issues in MIS - Management Information System

  • 2. Information systems and ethics – Information systems raise new ethical questions because they create opportunities for: Intense social change, threatening existing distributions of power, money, rights, and obligations New kinds of crime
  • 3. Key technology trends that raise ethical issues 1. Doubling of computer power – More organizations depend on computer systems for critical operations 1. Rapidly declining data storage costs – Organizations can easily maintain detailed databases on individuals 1. Networking advances and the Internet – Copying data from one location to another and accessing personal data from remote locations is much easier
  • 4. 4. Advances in data analysis techniques – Companies can analyze vast quantities of data gathered on individuals for:  Profiling – Combining data from multiple sources to create dossiers of detailed information on individuals  Nonobvious relationship awareness (NORA) – Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
  • 5. NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job shares a telephone number with a known criminal and issue an alert to the hiring manager.
  • 6. Where does it cross the line?  Edward Snowden  He leaked classified documents that revealed numerous global surveillance programs, many run by the NSA and the Five Eyes* with the cooperation of telecommunication companies and European governments * It is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States
  • 7. Ethics in an Information Society  Basic concepts for ethical analysis – Responsibility:  Accepting the potential costs, duties, and obligations for decisions – Accountability:  Mechanisms for identifying responsible parties – Liability:  Permits individuals (and firms) to recover damages done to them – Due process:  Laws are well known and understood, with an ability to appeal to higher authorities
  • 8.  Ethical analysis: A five-step process 1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher-order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options
  • 9.  Six Candidate Ethical Principles 1. Golden Rule  Do unto others as you would have them do unto you 1. Immanuel Kant’s Categorical Imperative  If an action is not right for everyone to take, it is not right for anyone 1. Descartes’ Rule of Change  If an action cannot be taken repeatedly, it is not right to take at all
  • 10.  Six Candidate Ethical Principles (cont.) 4. Utilitarian Principle  Take the action that achieves the higher or greater value 4. Risk Aversion Principle  Take the action that produces the least harm or least potential cost 4. Ethical “no free lunch” Rule  Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
  • 11. Five moral dimensions of the information age 1. Information rights and obligations 2. Property rights and obligations 3. Accountability and control 4. System quality 5. Quality of life
  • 12. Five moral dimensions graphically
  • 13. 1- Information rights and obligations  Privacy: – Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself  Do you believe that there are sufficient protections for privacy in law?
  • 14. Data protection laws of the world  http://www.dlapiperdataprotection.com/
  • 15. Fair Information Practices (FIP)  Notice/awareness (core principle) – Web sites must disclose practices before collecting data  Choice/consent (core principle) – Consumers must be able to choose how information is  Access/participation – Consumers must be able to review, contest accuracy of personal data
  • 16. Fair Information Practices (FIP)  Security – Data collectors must take steps to ensure accuracy, security of personal data  Enforcement – There must be a mechanism to enforce FIP principles
  • 17. Internet challenges to privacy  Cookies – Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site – Allow Web sites to develop profiles on visitors  Web beacons/bugs – Tiny graphics embedded in e-mail and Web pages to monitor who is reading message  Spyware – Surreptitiously installed on user’s computer – May transmit user’s keystrokes or display unwanted ads
  • 18. Google’s collection of private data; behavioral targeting  What are your thoughts on it?
  • 19. 2 - Property rights and obligations  Intellectual property: Intangible property of any kind created by individuals or corporations  Three main ways that protect intellectual property 1. Trade secret: Intellectual work or product belonging to business, not in the public domain 2. Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years 3. Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
  • 20.  Challenges to intellectual property rights – Digital media different from physical media (e.g. books)  Ease of replication  Ease of transmission (networks, Internet)  Difficulty in classifying software  Compactness  Difficulties in establishing uniqueness
  • 21. 3 - Accountability and control Computer-related liability problems – If software fails, who is responsible? – Eg, Amazon and its clients
  • 22. 4 - Systems quality  System Quality: Data Quality and System Errors – What is an acceptable, technologically feasible level of system quality?  Flawless software is economically unfeasible – Three principal sources of poor system performance:  Software bugs, errors  Hardware or facility failures  Poor input data quality (most common source of business system failure)
  • 23. 5 - Quality of life  Quality of life: Equity, access, and boundaries – Negative social consequences of systems  Balancing power: Although computing power helps decentralizing, key decision-making remains centralized  Rapidity of change: Businesses may not have enough time to respond to global competition  Maintaining boundaries: Computing, Internet use lengthens work-day, infringes on family, personal time  Dependence and vulnerability: Public and private organizations ever more dependent on computer systems
  • 24. Health risks: – Repetitive stress injury (RSI) Largest source is computer keyboards Carpal Tunnel Syndrome (CTS) – Computer vision syndrome (CVS) – Technostress – Role of radiation, screen emissions, low- level electromagnetic fields
  • 25.  Computer crime and abuse – Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime – Computer abuse: Unethical acts, not illegal  Spam: High costs for businesses in dealing with spam  Employment: – Reengineering work resulting in lost jobs  Equity and access – the digital divide: – Certain ethnic and income groups in the United States less likely to have computers or Internet access