SlideShare a Scribd company logo
1 of 41
Download to read offline
ETHICAL AND
SOCIAL ISSUES
IN
INFORMATION
SYSTEMS
Ms. Imeshika Dilrukshi
Learning Outcomes
 At the end of this module, you will be
able to Define;
1. Trends in computer hardware platforms
2. Trends in software platforms
3. Ethical, social, and political issues of information
systems
4. Contemporary information systems technology and
the challenges of Internet to the protection of
individual privacy and intellectual property
Trends in computer
hardware platforms
1. Emergence of Mobile Digital Platforms
 Emergence of mobile, alternatives to PCs and larger
computers
 Functions of the mobile digital Platforms
 Transmission of data
 Surfing the Web
 Transmitting e-mail and instant messages
 Displaying digital content, and exchanging data
with internal corporate systems
Ex: e iPads, smart phones, digital e-book readers
such as Amazon’s Kindle with Web access
capabilities
(Activity 1: Identify what is Chromebook and where
shouldn’t we use it?)
https://www.youtube.com/watch?v=c-1zMFp1iCY
2. CONSUMERIZATION OF IT AND BYOD
Consumerization of IT is: the cycle of technology emerging first in the consumer market
and then spreading to business and government organizations
Ex: Business uses of software services such as Google and Yahoo search, Gmail, Google
Apps, Facebook and Twitter that originated in the consumer marketplace
BYOD → Allowing employees to use their personal mobile devices in the workplace,
called “bring your own device” (BYOD)
Benefits of BYOD : Cost Saving
: Employee Comfort
: Productivity
: Access and Connectivity
3. GRID COMPUTING
Grid computing involves connecting geographically
remote computers into a single network to create a
virtual supercomputer by combining the
computational power of all computers on the grid
Ex: A research team might analyze weather patterns
in the North Atlantic region, while another team
analyzes the south Atlantic region, and both results
can be combined to deliver a complete picture of
Atlantic weather patterns
4. VIRTUALIZATION
Virtualization enables a single physical resource (such as a server or a
storage device) to appear to the user as multiple logical resources
Virtualization is technology that lets you create
 useful IT services using resources that are traditionally bound to
hardware.
 It allows you to use a physical machine’s full capacity by distributing its
capabilities among many users or environments.
 Virtualization allocates resources to applications as needed.
 Customers can run more applications on a single server.
 By providing the ability to host multiple systems on a single physical
machine, virtualization helps organizations increase equipment
utilization rates, conserving data center space and energy usage
https://www.youtube.com/watch?v=qYLNbbSrMZ0
5. Cloud Computing
Cloud computing is the act of running workloads within clouds—which are IT
environments that abstract, pool, and share scalable resources across a
network.
Cloud computing consists of three different types of services:
1. Cloud infrastructure as a service: Customers use processing, storage,
networking, and other computing resources from cloud service providers
to run their information systems.
Ex: Amazon uses the spare capacity of its IT infrastructure to provide a
broadly based cloud environment selling IT infrastructure services
2. Cloud platform as a service: Customers use infrastructure and
programming tools supported by the cloud service provider to develop
their own applications.
This is a model where a third-party provider delivers hardware and
software tools to users over the internet. Usually, these tools are
needed for application development.
Ex: IBM offers a Smart Business Application Development & Test service
for software development and testing on the IBM Cloud.
3. Cloud software as a service:
Customers use software hosted by the vendor on the vendor’s
cloud infrastructure and delivered over a network. Leading
examples are Google Apps, which provides common business
applications online and Salesforce.com
• Owned and maintained by a cloud service
provider
• Ex: Amazon Web Services
Public
Clouds
• Operated solely for an organization.
• It may be managed by the organization or a third
party and may exist on premise or off premises
Private
Clouds
6. Green Computing
Practices and technologies for designing, manufacturing, using, and disposing
of computers, servers, and associated devices such as monitors, printers,
storage devices, and networking and communications systems to minimize the
impact on the environment
Ex: Reducing computer power consumption has been a very high “green” priority.
2. Trends in software platforms
1. OPEN-SOURCE SOFTWARE
 Software with source code that anyone can inspect, modify, and enhance.
 "Source code" is the part of software that most computer users don't ever see; it's the code
computer programmers can manipulate to change how a piece of software—a "program" or
"application"—works.
 Popular open-source software tools include the Linux operating system, the Apache HTTP Web
server, the Mozilla Firefox Web browser
2. SOFTWARE OUTSOURCING AND CLOUD SERVICES
Companies will purchase or rent most of their new software applications from external
sources
There are three external sources for software:
1. Software packages from a commercial software vendor
2. Outsourcing custom application development to an external vendor (which may or
may not be offshore)
3. Cloud-based software services and tools.
1. Software packages from a commercial software vendor
Prewritten commercially available set of software programs that eliminates the need
for a firm to write its own software programs for certain functions
Ex: SAP and Oracle-PeopleSoft.
Developed for customer relationship management, and supply chain management, to
finance and human resources
2. Software Outsourcing
Enables a firm to contract custom software development or maintenance of existing
legacy programs to outside firms, which often operate offshore in low-wage areas of
the world.
Ex: Cemex, Mexico's largest cement manufacturer, signed a 10-year $1 billion
outsourcing deal with IBM in July 2012 for application development and maintenance
as well as IT infrastructure management, finance and HR
3. Cloud-Based Software Services and Tools
Cloud-based computing (also called Software as a Service, or SaaS) allows users
access to software applications that run on shared computing resources (for
example, processing power, memory, and disk storage) via the Internet.
These computing resources are maintained in remote data centers dedicated to
hosting various applications on multiple platforms.
Ex: Cloud ERP is Software as a Service - that allows users to access Enterprise
Resource Planning (ERP) software over the Internet.
ETHICAL AND
SOCIAL ISSUES
IN
INFORMATION
SYSTEMS
What are ethics?
Ethics refers to the principles of right and wrong that individuals,
acting as free moral agents, use to make choices to guide their
behaviors.
Why is ethics an important aspect of information systems???
Fail of ethical Judgements will results losses to
the businesses in the markets
Like other technologies, IS Can also be used for social progress, but could also be used in
executing crimes. Therefore, considering about the ethics in IS is very important
A MODEL FOR THINKING ABOUT ETHICAL,
SOCIAL, AND POLITICAL ISSUES
 We need to understand that Ethical, social, and political issues are
closely linked.
 To examine the relationship between Ethical, Social and Political
dimensions → Assume;
 Society → As a calm pond with social and political institutions
 The Society is supported by laws developed in the political sector that
prescribe behavior and promise sanctions for violations
 Information Technology → as a rock dropped to the pond creating
ripples of new situations, not covered by old rules
 Therefore, Social and Political Institutions cannot respond overnight to
these ripples. It may take years to develop etiquette, expectations,
correct attitudes, or approved rules.
 Therefore, you may be forced to act in a legal gray area
The major ethical, social, and political issues raised by information systems include the following moral
dimensions:
Five Moral Dimensions of the information age
1. Information rights and obligations.
2. Property Rights and Obligations
3. Accountability and Control
4. System Quality
5. Quality of life
KEY TECHNOLOGY TRENDS THAT RAISE
ETHICAL ISSUES
Although ethical issues were a concern even before the advancement of information systems,
the rapid development in this area has caused tensions in exiting social arrangements and
made existing laws obsolete.
Ethical Threats from the Technological
Trends
1. Doubling Computer Power -
Organizations depending on the systems will increase gradually
Risk of poor data quality will also increase.
Social rules and laws may not be always adjusted dependence of the information systems. Therefore,
the accuracy and reliability of information systems are not universally accepted.
2. Advances in Data Storage
Multiple data bases of customers, employees and Suppliers maintained by public and private
organizations. These may violate the individual privacy.
3. Data Analysis Advances
Companies will maintain and analyze profiles of individuals which help them to analyze the data
through analytics.
Customers buying patterns, subscriptions, calls, text messages, credit card information to use in
business purposes.
THE MORAL DIMENSIONS OF INFORMATION
SYSTEMS
1. INFORMATION RIGHTS: PRIVACY AND FREEDOM IN THE INTERNET
AGE
Privacy is the claim of individuals to be left alone, free from surveillance or interference from
other individuals or organizations, including the state.
Data privacy, also called information privacy, is the aspect of information technology (IT)
that deals with the ability an organization or individual has to determine what data in a computer
system can be shared with third parties.
The claim to privacy is protected in the U.S., Canadian, and German constitutions in a variety of
different ways and in other countries through various statutes
 In Europe, privacy protection is much more stringent than in the United States. Unlike
the United States, European countries do not allow businesses to use personally
identifiable information without consumers’ prior consent
 On October 25, 1998, the European Commission’s Directive on Data Protection went
into effect, broadening privacy protection in the European Union (EU) nations.
 Customers must provide their informed consent before any company can legally use
data about them, and they have the right to access that information, correct it, and
request that no further data be collected.
 Ex: companies like Amazon, Facebook, Apple, Google, and others to obtain explicit
consent from consumers about the use of their personal data
Cookies ………….
Cookies are;
✓ Small text files deposited on a computer hard drive when a user visits Web sites.
✓ Cookies identify the visitor’s Web browser software and track visits to the Web site.
✓ When the visitor returns to a site that has stored a cookie, the Web site software will search
the visitor’s computer, find the cookie, and know what that person has done in the past. It
may also update the cookie, depending on the activity during the visit.
✓ In this way, the site can customize its content for each visitor’s interests.
✓ For example, if you purchase a book on Amazon.com and return later from the same
browser, the site will welcome you by name and recommend other books of interest based
on your past purchases.
Web beacons or Web Bugs
✓ Web Beacons are tiny software programs that keep a record of users’ online
clickstream and report this data back to whomever owns the tracking file.
✓ Web beacons are placed on popular Web sites by third-party firms who pay
the Web sites a fee for access to their audience
✓ Wall Street Journal in 2010 and 2011, researchers examined the tracking
files on 50 of the most popular U.S Web sites.
✓ On the 50 sites, they discovered 3,180 tracking files installed on visitor
computers. Only one site, Wikipedia, had no tracking files.
✓ The biggest trackers were Google, Microsoft, and Quantcast, all of whom are
in the business of selling ads to advertising firms and marketers
Spyware
 Secretly install itself on an Internet user’s computer by piggybacking on larger
applications.
 Once installed, the spyware calls out to Web sites to send banner ads and other
unsolicited material to the user, and it can report the user’s movements on the
Internet to other computers.
 May reset your web home page, redirect website requests, randomly flood your
screen with advertising, and perform other irritating acts.
 A recent study found that 88 percent of 400,000 Web sites had at least one Google
tracking bug.
Ex: Google’s AdSense program enables Google to help advertisers select keywords and
design ads for various market segments based on search histories, such as helping a
clothing Web site create and test ads targeted at teenage females
 Most Internet businesses do little to protect the privacy of their customers, and
consumers do not do as much as they should to protect themselves.
 The majority of online customers claim they are concerned about online privacy, but
less than half read the privacy statements on Web sites.
Solutions Available:
1. Many browsers have Do Not Track options.
For users who have selected the Do Not Track browser option, their browser will send a
request to Web sites requesting the user’s behavior not be tracked.
Ex: Internet Explorer 9 and Mozilla’s Firefox browsers
2. Property Rights : Intellectual Property
Intellectual Property
* Intellectual property is considered to be intangible property created by individuals or corporations.
They are creations of the mind, such as inventions; literary and artistic works; designs; and symbols,
names and images used in commerce.
Ex: An author's copyright on a book or article
: A distinctive logo design representing a soft drink company and its products
: Unique design elements of a web site, or a patent on a particular process
* Computerized information can be so easily copied or distributed on networks
* Intellectual property is subject to a variety of protections under three different legal traditions: trade
secrets, copyright, and patent law
 Trade Secret
* Any intellectual work product—a formula, device, pattern, or compilation of data — used for a
business purpose can be classified as a trade secret, provided it is not based on information in
the public domain
* This can be any commercially important Information
Ex: How to produce a product, Tricks in production process
* The limitation of trade secret protection: Software Programs
Examples for Trade Secrets: …………………………………………
https://www.youtube.com/watch?v=necoc_W6uM8
Copyright
* A Statutory grant that protects creators of intellectual property from having their work copied by
others for any purpose during the life of the author plus an additional 70 years after the author’s
death
* For corporate-owned works, copyright protection lasts for 95 years after their initial creation.
* These are established to encourage creativity and authorship by ensuring that creative people
receive the financial and other benefits of their work.
* Copyright protection are given to: to books, periodicals, lectures, dramas, musical compositions,
maps, drawings, artwork of any kind
* Copyrights are unique to each country
Ex - Part II of the Intellectual Property Act, No. 36 of 2003 in Sri Lanka
 Patents
A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
Ex: Patents are a right granted to an inventor that allows them to exclude all others from making,
using, or selling their invention for 20 years.
The key concepts in patent law are originality, novelty, and invention
Ex: Software with patents
Airbnb: Automated determination of booking availability for accommodation listings. (Patent
#US1005315B2)
Coinbase: Instant Exchange. (Patent #US10614430B2)
https://www.youtube.com/watch?v=64GhiDvem4o
Violating Paten Rights could cause massive damages:
Ex: Apple sued Samsung for violating its patents for iPhones, iPads, and iPods and claimed $1
billion for damages
Challenges to Intellectual Property Rights
 Digital media differ from books, periodicals, and other media in terms
of ease of replication
 Ease of transmission; ease of alteration; difficulty in classifying a
software work as a program, book, or even music; compactness—
making theft easy; and difficulties in establishing uniqueness
 Rate of global software piracy climbed to 42 percent in 2011,
representing $63 billion in global losses from software piracy.
Worldwide, for every $100 worth of legitimate software sold that year,
an additional $75 worth was obtained illegally.
 Individuals have been illegally copying and distributing digitized MP3
music files on the Internet for a number of years.
3. Accountability, Liability and Control
 People come to depend on services essentially based on software
Ex: ATM Machines - are a service provided to bank customers. Should this service fail?
customers will be inconvenienced and perhaps harmed economically if they cannot access
their funds in a timely manner
 Blackberry Mobile Phones – Problem in accessing the emails on Time
Who is liable for any economic harm caused to individuals or businesses that could not
access their e-mail during this three-day period?
The software companies should be accountable to make sure the software functions well,
perform the task since it is more difficult to compare with other software products for
quality
4. SYSTEM QUALITY: DATA QUALITY AND
SYSTEM ERRORS
 Three principal sources of poor system performance are
(1) Software bugs and errors
(2) Hardware or facility failures caused by natural or other causes
(3) Poor input data quality.
 Organizations may be held responsible for avoidable and foreseeable consequences, which they
have a duty to perceive and correct
 However, certain perfections are not feasible economically because no one could afford the
product and fixing all minor errors would prevent these products from ever being released
5. QUALITY OF LIFE: EQUITY, ACCESS, AND
BOUNDARIES
 Use of computer information systems can advance the workflows as
well as create negative consequences.
 These negative consequences can be extremely harmful to
individuals, societies, and political institutions.
 It can destroy valuable elements of our culture and society even
while they bring us benefits.
 Some of the negative consequences are discussed below:
 Balancing Power: Center Versus Periphery
Lower-level employees may be empowered to make minor decisions, but the key policy decisions may
be as centralized as in the past.
Corporate Internet behemoths like Google, Apple, Yahoo, Amazon, and Microsoft have come to
dominate the collection and analysis of personal private information of all citizens.
Therefore, power has become more centralized into the hands of a few private oligopolies
 Rapidity to Change: : Reduced Response Time to Competition
The business you work for may not have enough time to respond to global competitors and may be
wiped out in a year, along with your job.
Creating a “just-in-time society” with “just-in-time jobs” and “just-in-time” workplaces, families, and
vacations.
 Maintaining Boundaries: Family, Work, and Leisure
The “do anything anywhere” computing environment is that it is actually coming true.
The traditional boundaries that separate work from family and just plain leisure have been
weakened.
The work umbrella now extends far beyond the eight-hour day into commuting time, vacation time,
and leisure time.
 Dependence and Vulnerability
The current businesses, governments, schools, and private associations, such as churches, are
incredibly dependent on information systems and are, therefore, highly vulnerable if these system
fail.
If these systems were to shut down, there is no backup educational structure or content that can
make up for the loss of the system.
 Computer Crime and Abuse
Computers or computer systems can be the object of the crime ( destroying a company’s computer
center or a company’s computer files), as well as the instrument of a crime.
Simply accessing a computer system without authorization or with intent to do harm, even by
accident, is now a federal crime.
Commonly seen computer attacks are:
Malware infection
Phishing fraud
Laptop and mobile hardware theft
Attacks by botnets
Thank You !!!

More Related Content

Similar to MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM

When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
OASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and JanssenOASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and JanssenJames Bryce Clark
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfaccacloud
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyJennifer York
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxanitramcroberts
 
Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6Rakib Hasan
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry Jishnu Mithre
 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry Jishnu Mithre
 
Topic_14_IT_systems_in_organisations.pptx
Topic_14_IT_systems_in_organisations.pptxTopic_14_IT_systems_in_organisations.pptx
Topic_14_IT_systems_in_organisations.pptxNiraliSoni5
 

Similar to MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM (20)

When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
OASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and JanssenOASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and Janssen
 
Topic 7
Topic 7Topic 7
Topic 7
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdf
 
Enabling Digital Business (EDB)
Enabling Digital Business (EDB)Enabling Digital Business (EDB)
Enabling Digital Business (EDB)
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our Society
 
Ash cis 500 preview full class
Ash cis 500 preview full classAsh cis 500 preview full class
Ash cis 500 preview full class
 
Case study no 2
Case study no 2Case study no 2
Case study no 2
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
 
Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry
 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry
 
Topic_14_IT_systems_in_organisations.pptx
Topic_14_IT_systems_in_organisations.pptxTopic_14_IT_systems_in_organisations.pptx
Topic_14_IT_systems_in_organisations.pptx
 

Recently uploaded

fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthUnveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthShaheen Kumar
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Avanish Goel
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthUnveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM

  • 2. Learning Outcomes  At the end of this module, you will be able to Define; 1. Trends in computer hardware platforms 2. Trends in software platforms 3. Ethical, social, and political issues of information systems 4. Contemporary information systems technology and the challenges of Internet to the protection of individual privacy and intellectual property
  • 3. Trends in computer hardware platforms 1. Emergence of Mobile Digital Platforms  Emergence of mobile, alternatives to PCs and larger computers  Functions of the mobile digital Platforms  Transmission of data  Surfing the Web  Transmitting e-mail and instant messages  Displaying digital content, and exchanging data with internal corporate systems Ex: e iPads, smart phones, digital e-book readers such as Amazon’s Kindle with Web access capabilities (Activity 1: Identify what is Chromebook and where shouldn’t we use it?) https://www.youtube.com/watch?v=c-1zMFp1iCY
  • 4. 2. CONSUMERIZATION OF IT AND BYOD Consumerization of IT is: the cycle of technology emerging first in the consumer market and then spreading to business and government organizations Ex: Business uses of software services such as Google and Yahoo search, Gmail, Google Apps, Facebook and Twitter that originated in the consumer marketplace BYOD → Allowing employees to use their personal mobile devices in the workplace, called “bring your own device” (BYOD) Benefits of BYOD : Cost Saving : Employee Comfort : Productivity : Access and Connectivity
  • 5. 3. GRID COMPUTING Grid computing involves connecting geographically remote computers into a single network to create a virtual supercomputer by combining the computational power of all computers on the grid Ex: A research team might analyze weather patterns in the North Atlantic region, while another team analyzes the south Atlantic region, and both results can be combined to deliver a complete picture of Atlantic weather patterns
  • 6. 4. VIRTUALIZATION Virtualization enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources Virtualization is technology that lets you create  useful IT services using resources that are traditionally bound to hardware.  It allows you to use a physical machine’s full capacity by distributing its capabilities among many users or environments.
  • 7.  Virtualization allocates resources to applications as needed.  Customers can run more applications on a single server.  By providing the ability to host multiple systems on a single physical machine, virtualization helps organizations increase equipment utilization rates, conserving data center space and energy usage https://www.youtube.com/watch?v=qYLNbbSrMZ0
  • 8. 5. Cloud Computing Cloud computing is the act of running workloads within clouds—which are IT environments that abstract, pool, and share scalable resources across a network. Cloud computing consists of three different types of services: 1. Cloud infrastructure as a service: Customers use processing, storage, networking, and other computing resources from cloud service providers to run their information systems. Ex: Amazon uses the spare capacity of its IT infrastructure to provide a broadly based cloud environment selling IT infrastructure services
  • 9. 2. Cloud platform as a service: Customers use infrastructure and programming tools supported by the cloud service provider to develop their own applications. This is a model where a third-party provider delivers hardware and software tools to users over the internet. Usually, these tools are needed for application development. Ex: IBM offers a Smart Business Application Development & Test service for software development and testing on the IBM Cloud.
  • 10. 3. Cloud software as a service: Customers use software hosted by the vendor on the vendor’s cloud infrastructure and delivered over a network. Leading examples are Google Apps, which provides common business applications online and Salesforce.com • Owned and maintained by a cloud service provider • Ex: Amazon Web Services Public Clouds • Operated solely for an organization. • It may be managed by the organization or a third party and may exist on premise or off premises Private Clouds
  • 11. 6. Green Computing Practices and technologies for designing, manufacturing, using, and disposing of computers, servers, and associated devices such as monitors, printers, storage devices, and networking and communications systems to minimize the impact on the environment Ex: Reducing computer power consumption has been a very high “green” priority.
  • 12. 2. Trends in software platforms 1. OPEN-SOURCE SOFTWARE  Software with source code that anyone can inspect, modify, and enhance.  "Source code" is the part of software that most computer users don't ever see; it's the code computer programmers can manipulate to change how a piece of software—a "program" or "application"—works.  Popular open-source software tools include the Linux operating system, the Apache HTTP Web server, the Mozilla Firefox Web browser
  • 13. 2. SOFTWARE OUTSOURCING AND CLOUD SERVICES Companies will purchase or rent most of their new software applications from external sources There are three external sources for software: 1. Software packages from a commercial software vendor 2. Outsourcing custom application development to an external vendor (which may or may not be offshore) 3. Cloud-based software services and tools.
  • 14. 1. Software packages from a commercial software vendor Prewritten commercially available set of software programs that eliminates the need for a firm to write its own software programs for certain functions Ex: SAP and Oracle-PeopleSoft. Developed for customer relationship management, and supply chain management, to finance and human resources 2. Software Outsourcing Enables a firm to contract custom software development or maintenance of existing legacy programs to outside firms, which often operate offshore in low-wage areas of the world. Ex: Cemex, Mexico's largest cement manufacturer, signed a 10-year $1 billion outsourcing deal with IBM in July 2012 for application development and maintenance as well as IT infrastructure management, finance and HR
  • 15. 3. Cloud-Based Software Services and Tools Cloud-based computing (also called Software as a Service, or SaaS) allows users access to software applications that run on shared computing resources (for example, processing power, memory, and disk storage) via the Internet. These computing resources are maintained in remote data centers dedicated to hosting various applications on multiple platforms. Ex: Cloud ERP is Software as a Service - that allows users to access Enterprise Resource Planning (ERP) software over the Internet.
  • 17. What are ethics? Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. Why is ethics an important aspect of information systems???
  • 18. Fail of ethical Judgements will results losses to the businesses in the markets Like other technologies, IS Can also be used for social progress, but could also be used in executing crimes. Therefore, considering about the ethics in IS is very important
  • 19. A MODEL FOR THINKING ABOUT ETHICAL, SOCIAL, AND POLITICAL ISSUES  We need to understand that Ethical, social, and political issues are closely linked.  To examine the relationship between Ethical, Social and Political dimensions → Assume;  Society → As a calm pond with social and political institutions  The Society is supported by laws developed in the political sector that prescribe behavior and promise sanctions for violations  Information Technology → as a rock dropped to the pond creating ripples of new situations, not covered by old rules  Therefore, Social and Political Institutions cannot respond overnight to these ripples. It may take years to develop etiquette, expectations, correct attitudes, or approved rules.  Therefore, you may be forced to act in a legal gray area
  • 20. The major ethical, social, and political issues raised by information systems include the following moral dimensions:
  • 21. Five Moral Dimensions of the information age 1. Information rights and obligations. 2. Property Rights and Obligations 3. Accountability and Control 4. System Quality 5. Quality of life
  • 22. KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES Although ethical issues were a concern even before the advancement of information systems, the rapid development in this area has caused tensions in exiting social arrangements and made existing laws obsolete.
  • 23. Ethical Threats from the Technological Trends 1. Doubling Computer Power - Organizations depending on the systems will increase gradually Risk of poor data quality will also increase. Social rules and laws may not be always adjusted dependence of the information systems. Therefore, the accuracy and reliability of information systems are not universally accepted. 2. Advances in Data Storage Multiple data bases of customers, employees and Suppliers maintained by public and private organizations. These may violate the individual privacy. 3. Data Analysis Advances Companies will maintain and analyze profiles of individuals which help them to analyze the data through analytics. Customers buying patterns, subscriptions, calls, text messages, credit card information to use in business purposes.
  • 24. THE MORAL DIMENSIONS OF INFORMATION SYSTEMS 1. INFORMATION RIGHTS: PRIVACY AND FREEDOM IN THE INTERNET AGE Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Data privacy, also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties. The claim to privacy is protected in the U.S., Canadian, and German constitutions in a variety of different ways and in other countries through various statutes
  • 25.  In Europe, privacy protection is much more stringent than in the United States. Unlike the United States, European countries do not allow businesses to use personally identifiable information without consumers’ prior consent  On October 25, 1998, the European Commission’s Directive on Data Protection went into effect, broadening privacy protection in the European Union (EU) nations.  Customers must provide their informed consent before any company can legally use data about them, and they have the right to access that information, correct it, and request that no further data be collected.  Ex: companies like Amazon, Facebook, Apple, Google, and others to obtain explicit consent from consumers about the use of their personal data
  • 26. Cookies …………. Cookies are; ✓ Small text files deposited on a computer hard drive when a user visits Web sites. ✓ Cookies identify the visitor’s Web browser software and track visits to the Web site. ✓ When the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s computer, find the cookie, and know what that person has done in the past. It may also update the cookie, depending on the activity during the visit. ✓ In this way, the site can customize its content for each visitor’s interests. ✓ For example, if you purchase a book on Amazon.com and return later from the same browser, the site will welcome you by name and recommend other books of interest based on your past purchases.
  • 27. Web beacons or Web Bugs ✓ Web Beacons are tiny software programs that keep a record of users’ online clickstream and report this data back to whomever owns the tracking file. ✓ Web beacons are placed on popular Web sites by third-party firms who pay the Web sites a fee for access to their audience ✓ Wall Street Journal in 2010 and 2011, researchers examined the tracking files on 50 of the most popular U.S Web sites. ✓ On the 50 sites, they discovered 3,180 tracking files installed on visitor computers. Only one site, Wikipedia, had no tracking files. ✓ The biggest trackers were Google, Microsoft, and Quantcast, all of whom are in the business of selling ads to advertising firms and marketers
  • 28. Spyware  Secretly install itself on an Internet user’s computer by piggybacking on larger applications.  Once installed, the spyware calls out to Web sites to send banner ads and other unsolicited material to the user, and it can report the user’s movements on the Internet to other computers.  May reset your web home page, redirect website requests, randomly flood your screen with advertising, and perform other irritating acts.  A recent study found that 88 percent of 400,000 Web sites had at least one Google tracking bug. Ex: Google’s AdSense program enables Google to help advertisers select keywords and design ads for various market segments based on search histories, such as helping a clothing Web site create and test ads targeted at teenage females
  • 29.  Most Internet businesses do little to protect the privacy of their customers, and consumers do not do as much as they should to protect themselves.  The majority of online customers claim they are concerned about online privacy, but less than half read the privacy statements on Web sites. Solutions Available: 1. Many browsers have Do Not Track options. For users who have selected the Do Not Track browser option, their browser will send a request to Web sites requesting the user’s behavior not be tracked. Ex: Internet Explorer 9 and Mozilla’s Firefox browsers
  • 30. 2. Property Rights : Intellectual Property Intellectual Property * Intellectual property is considered to be intangible property created by individuals or corporations. They are creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce. Ex: An author's copyright on a book or article : A distinctive logo design representing a soft drink company and its products : Unique design elements of a web site, or a patent on a particular process * Computerized information can be so easily copied or distributed on networks * Intellectual property is subject to a variety of protections under three different legal traditions: trade secrets, copyright, and patent law
  • 31.  Trade Secret * Any intellectual work product—a formula, device, pattern, or compilation of data — used for a business purpose can be classified as a trade secret, provided it is not based on information in the public domain * This can be any commercially important Information Ex: How to produce a product, Tricks in production process * The limitation of trade secret protection: Software Programs Examples for Trade Secrets: ………………………………………… https://www.youtube.com/watch?v=necoc_W6uM8
  • 32. Copyright * A Statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author’s death * For corporate-owned works, copyright protection lasts for 95 years after their initial creation. * These are established to encourage creativity and authorship by ensuring that creative people receive the financial and other benefits of their work. * Copyright protection are given to: to books, periodicals, lectures, dramas, musical compositions, maps, drawings, artwork of any kind * Copyrights are unique to each country Ex - Part II of the Intellectual Property Act, No. 36 of 2003 in Sri Lanka
  • 33.  Patents A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years Ex: Patents are a right granted to an inventor that allows them to exclude all others from making, using, or selling their invention for 20 years. The key concepts in patent law are originality, novelty, and invention Ex: Software with patents Airbnb: Automated determination of booking availability for accommodation listings. (Patent #US1005315B2) Coinbase: Instant Exchange. (Patent #US10614430B2) https://www.youtube.com/watch?v=64GhiDvem4o Violating Paten Rights could cause massive damages: Ex: Apple sued Samsung for violating its patents for iPhones, iPads, and iPods and claimed $1 billion for damages
  • 34. Challenges to Intellectual Property Rights  Digital media differ from books, periodicals, and other media in terms of ease of replication  Ease of transmission; ease of alteration; difficulty in classifying a software work as a program, book, or even music; compactness— making theft easy; and difficulties in establishing uniqueness  Rate of global software piracy climbed to 42 percent in 2011, representing $63 billion in global losses from software piracy. Worldwide, for every $100 worth of legitimate software sold that year, an additional $75 worth was obtained illegally.  Individuals have been illegally copying and distributing digitized MP3 music files on the Internet for a number of years.
  • 35. 3. Accountability, Liability and Control  People come to depend on services essentially based on software Ex: ATM Machines - are a service provided to bank customers. Should this service fail? customers will be inconvenienced and perhaps harmed economically if they cannot access their funds in a timely manner  Blackberry Mobile Phones – Problem in accessing the emails on Time Who is liable for any economic harm caused to individuals or businesses that could not access their e-mail during this three-day period? The software companies should be accountable to make sure the software functions well, perform the task since it is more difficult to compare with other software products for quality
  • 36. 4. SYSTEM QUALITY: DATA QUALITY AND SYSTEM ERRORS  Three principal sources of poor system performance are (1) Software bugs and errors (2) Hardware or facility failures caused by natural or other causes (3) Poor input data quality.  Organizations may be held responsible for avoidable and foreseeable consequences, which they have a duty to perceive and correct  However, certain perfections are not feasible economically because no one could afford the product and fixing all minor errors would prevent these products from ever being released
  • 37. 5. QUALITY OF LIFE: EQUITY, ACCESS, AND BOUNDARIES  Use of computer information systems can advance the workflows as well as create negative consequences.  These negative consequences can be extremely harmful to individuals, societies, and political institutions.  It can destroy valuable elements of our culture and society even while they bring us benefits.  Some of the negative consequences are discussed below:
  • 38.  Balancing Power: Center Versus Periphery Lower-level employees may be empowered to make minor decisions, but the key policy decisions may be as centralized as in the past. Corporate Internet behemoths like Google, Apple, Yahoo, Amazon, and Microsoft have come to dominate the collection and analysis of personal private information of all citizens. Therefore, power has become more centralized into the hands of a few private oligopolies  Rapidity to Change: : Reduced Response Time to Competition The business you work for may not have enough time to respond to global competitors and may be wiped out in a year, along with your job. Creating a “just-in-time society” with “just-in-time jobs” and “just-in-time” workplaces, families, and vacations.
  • 39.  Maintaining Boundaries: Family, Work, and Leisure The “do anything anywhere” computing environment is that it is actually coming true. The traditional boundaries that separate work from family and just plain leisure have been weakened. The work umbrella now extends far beyond the eight-hour day into commuting time, vacation time, and leisure time.  Dependence and Vulnerability The current businesses, governments, schools, and private associations, such as churches, are incredibly dependent on information systems and are, therefore, highly vulnerable if these system fail. If these systems were to shut down, there is no backup educational structure or content that can make up for the loss of the system.
  • 40.  Computer Crime and Abuse Computers or computer systems can be the object of the crime ( destroying a company’s computer center or a company’s computer files), as well as the instrument of a crime. Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime. Commonly seen computer attacks are: Malware infection Phishing fraud Laptop and mobile hardware theft Attacks by botnets