SlideShare a Scribd company logo
Review Questions

1. In what ways are ethical, social, and political issues connected? Give some examples.

Ethics refers to principles of right and wrong which individuals use to guide their
behavior. Individuals act within a social environment that, in turn, exists within a
political environment. Ethical dilemmas are problems that affect society and that often
are addressed in the political arena. For example, new computer technology makes it
easier to gain private information about individuals, creating an ethical dilemma for the
potential user of that information (whether or not to invade the privacy of the
individual). Society will respond by demanding new laws to regulate the use of data.
Students will be able to give a range of examples of this connection.

2. What are the key technology trends that heighten ethical concerns?

Table 5-1 identifies the four key technology trends. These trends include computer
power doubling every 18 months, rapid decline in data storage costs, data analysis
advances, and networking advances and the Internet.

The doubling of computing power every 18 months is creating a growing dependence
on systems and a consequent vulnerability to system errors, poor data quality, and
failure of critical systems. Advances in data storage techniques and rapidly declining
storage costs provide for massive data storage capabilities on individual systems and
enable the routine violation of individual privacy. Advances in datamining techniques
for large databases allow those who are able to dominate supercomputing capacity
(large businesses and governments) to increase their power over individuals through the
analysis of massive amounts of data about individuals. Advances in telecommunications
infrastructure allow the movement of massive amounts of data at greatly reduced cost,
permitting the use of data and, as a result, the invasion of privacy on a scale and
precision unimaginable to us now.

3. What are the differences between responsibility, accountability, and liability?

Responsibility means that you accept the potential costs, duties, and obligations for the
decisions you make. Accountability is a feature of systems and social institutions that
allows the determination of who is responsible. Liability is a feature of political systems
that permits individuals to recover damages done to them by responsible individuals or
organizations.

4. What are the five steps in an ethical analysis?

The five steps in an ethical analysis are outlined in the Manager's Toolkit. The five
steps include (1) identify and describe clearly the facts; (2) define the conflict or
dilemma and identify the higher order values involved; (3) identify the stakeholders; (4)
identify the options you can reasonably take, and (5) identify the potential consequences
of your options.

5. Identify and describe six ethical principles.
The six ethical principles include the golden rule, Immanuel Kant's Categorical
Imperative, Descartes' rule of change, Utilitarian Principle, Risk Aversion Principle, and
ethical "no free lunch" rule. The golden rule suggests doing unto others as you would
have them do unto you. Kant's Categorical Imperative suggests that if an action is not
right for everyone to take, then it is not right for anyone. Descartes' rule of change, also
known as the slippery slope rule, suggests that if an action cannot be taken repeatedly,
then it is not right to be taken at any time. The Utilitarian Principle suggests taking the
action that achieves the higher or greater value. The Risk Aversion Principle suggests
taking the action that produces the least harm or the least potential cost. The ethical "no
free lunch" rule says that virtually all tangible and intangible objects are owned by
someone unless there is a specific declaration otherwise.

6. What is a professional code of conduct?

When groups of people claim to be professionals, they take on special rights and
obligations. As professionals, they enter into even more constraining relationships with
employers, customers, and society because of the special claims to knowledge, wisdom,
and respect. Professional codes of conduct are promulgated by associations of
professionals in order to regulate entrance qualifications and competencies and to
establish codes of ethics.

7. What are meant by "privacy" and "fair information practices”?

Privacy is the claim that individuals have the right to be left alone, free from
surveillance or interference from other individuals or organizations, including the state.
Claims to privacy involve the workplace as well as the home. Information technology
threatens individual claims to privacy by making the invasion of privacy cheap,
profitable, and effective.

The fair information practices (FIP) is a set of principles governing the collection and
use of information about individuals. The five FIP principles are: (1) notice/awareness;
(2) choice/consent; (3) access/participation; (4) security; and (5) enforcement.

8. How is the Internet challenging the protection of individual privacy?

Cookies, Web bugs, and other means of collecting information about Internet users can
be shared without the Internet user's consent. This allows information that a user may
have given voluntarily for a good purpose, say logging into the New York Times site, to
be shared with some other site. Spamming or e-mail that uses a user’s e-mail address is
another invasion of privacy.

9. What role can informed consent, legislation, industry self-regulation, and technology
tools play in protecting individual privacy of Internet users?

Informed consent means that the Web site visitor knowingly permits the collection of
data about his/her and his/her visit to the company's Web site. Federal privacy laws help
regulate the collection, usage, and disclosure of information in the United States. Table
5-2 lists several of the federal privacy laws in the United States. Businesses have taken
some steps, including publishing statements about how their information will be used
and sometimes offering an opt-out right. However, few businesses offer an opt-in
approach. Several technology tools are available to combat privacy invasion. Technical
solutions enable e-mail encryption, anonymous e-mailing and surfing, and cookie
rejection. Table 5-4 lists several privacy tools. Of particular interest is the P3P standard
that allows the user to have more control over personal information that is gathered on
the Web sites that she visits.

10. What are the three different regimes that protect intellectual property rights? What
challenges to intellectual property rights are posed by the Internet?

Three different legal traditions that protect property rights are trade secret, copyright,
and patent. A trade secret is any intellectual work product used for a business purpose
that can be classified as belonging to that business, provided it is not based on
information in the public domain. The drawback to trade secret protection is that once
an idea falls into the public domain, it no longer can be protected as a trade secret. A
copyright is a statutory grant that protects creators of intellectual property against
copying by others for any purpose for a period of 28 years. (For work created on or after
January 1, 1978, the intellectual property is protected during the author's lifetime plus
70 years after his death.) The drawback of this protection is that underlying ideas are
not protected, only their manifestations in a work. A patent grants the owner a
monopoly on the ideas behind an invention for 20 years. While patent protection does
grant a monopoly on the underlying concepts and ideas, the difficulty is passing
stringent criteria of non-obviousness, originality, and novelty. The Internet makes it
very easy to widely distribute and reproduce intellectual property.

11. Why is it so difficult to hold software services liable for failure or injury?

It is very difficult, if not impossible, to hold software producers liable for their software
products because it is only when software acts as a part of a defective product that strict
liability pertains. If the software is strictly a service (not part of a product), these laws
do not apply. As part of a product, software is still considered to be like books, which
historically are protected from liability claims by the First Amendment guaranteeing
freedom of expression.

12. What is the most common cause of system quality problems?

The three principal sources of system quality problems are hardware and facility
failures, software bugs and errors, and data quality. However, the most common cause
of system quality problems is data quality. According to the 1998 Redman study cited
in the textbook, individual organizations report data error rates ranging from 0.5 to 30
percent.

13. Name and describe four "quality of life" impacts of computers and information
systems.

The textbook describes eight "quality of life" impacts of computers and information
systems. These include balancing power, rapidity of change, maintaining boundaries,
dependency and vulnerability, computer crime and abuse, employment, equity and
access, and health risks.

Balancing power describes the shift toward highly decentralized computing, coupled
with an ideology of "empowerment" of thousands of workers and decentralization of
decision making to lower organizational levels. The problem is that the lower-level
worker involvement in decision making tends to be trivial. Key policy decisions are as
centralized as in the past.

The rapidity of change impact suggests that information systems have increased the
efficiency of the global marketplace. As a result, businesses no longer have many years
to adjust to competition. Businesses can now be wiped out very rapidly, and along with
them, jobs.

The maintaining boundaries impact suggests that portable computers and
telecommuting have created the condition where people can take their work anywhere
with them and do it at any time. As a result, workers find that their work is cutting into
family time, vacations, and leisure, weakening the traditional institutions of family and
friends and blurring the line between public and private life.

The dependency and vulnerability impact suggests that businesses, governments,
schools, and private associations are becoming more and more dependent on
information systems, and so they are highly vulnerable to the failure of those systems.

The computer crime and abuse impact suggests that computers have created new
opportunities for committing crimes and have themselves become the target of crimes.

The employment impact suggests that redesigning business processes could potentially
cause millions of middle-level managers and clerical workers to lose their jobs. Worse,
if reengineering actually works as claimed, these workers will not find similar
employment because the demand for their skills will decline.

The equity and access impact suggests that access to computer and information
resources is not equitably distributed throughout society. Access is distributed
inequitably along racial, economic, and social class lines (as are many other information
resources). Poor children attending poor school districts are less likely to use computers
at school. Children from wealthy homes are five times more likely to use PCs for
schoolwork than poor children. Whites are three times more likely to use computers at
home for schoolwork than African-Americans. Potentially, we could create a society of
information haves and have-nots, further increasing the social cleavages in our society.

Health risks have been attributed to computers and information technologies. For
instance, business now spends $20 billion a year to compensate and treat victims of
computer-related occupational diseases. Those illnesses include RSI (repetitive stress
injury), CVS (computer vision syndrome), and technostress.

14. What is technostress, and how would you identify it?
Technostress is defined as stress induced by computer-use. Its symptoms are
aggravation, hostility towards humans, impatience, and enervation.

15. Name three management actions that could reduce RSI.

Management can reduce RSI (repetitive stress injury) by using workstations (mainly
keyboards) designed for a neutral wrist position (using a wrist rest to support the wrist).
Use of proper monitor stands and footrests will contribute to proper posture and so
reduce RSI, as will allowing (or requiring) employees to take frequent breaks from their
work to walk around. Finally, use of new, ergonomically designed keyboards will also
help.


Case Study – The FBI and Digital Surveillance: How Far Should It Go? 1. Does
Carnivore present an ethical dilemma? Explain your answer. Students can answer this
question in many ways. Key to their responses, however, is that they respond by using
an ethical approach. What is the correct moral choice? The other element students must
deal with is who is making the choice? Does the FBI staff responsible for using it have
an ethical choice? What about those who are responsible for the decisions of the ISP, do
they have an ethical dilemma? Or do some of them want to deal with the possibility of
the congresspersons that have to make decisions about it? Or even the writers who write
about ethical and social issues in a digital firm? The best way for students to analyze
this issue is to apply the five-step ethical analysis approach to this situation. Your
students also need to examine the candidates for ethical principles. This question should
lead to an interesting discussion, partly because the dilemma is very real, particularly in
this post-September 11 period. 2. Apply an ethical analysis to the issue of the FBI’s use
of information technology and U.S. citizens’ privacy rights. Notice that this question is
broader than the first question because this asks about the use of information technology
whereas Question 1 limits the issue to Carnivore. No matter where individual students
stand on the issue of Carnivore, it is difficult to come to a clear stance on the broader
issue of information technology. However, the question is limited to the uses by the
FBI. Begin the discussion by asking the students about the different ways the FBI uses
information technology. For each use, have your students determine whether or not it
can affect the privacy rights of citizens. For example, the FBI can use information
technology for storing the DNA of individuals. Is this a problem for citizens’ privacy
rights? 3. What are the ethical, social and political issues raised by the FBI tapping the
e-mails of individuals and collecting personal data on them?

As with most ethical issues, student views will vary widely. Your task is to make sure
the differing views are raised and discussed because these issues are complex and affect
the future and type of government we live under, whichever country we live in. And,
again in the case of Carnivore, does it fall under these issues given the fact that the FBI
wants control of the information technology that can be misused? Are there alternative
ways of accomplishing the goals? This can be a very lively, engaging and thought-
provoking discussion.

The ethical privacy issue examines the conditions under which someone should invade
the privacy of others; what legitimates intruding into others’ lives through unobtrusive
surveillance or other means; do we have to inform people that we are eavesdropping;
and do we have to inform people that we are using credit history information for
employment screening purposes? These are critical issues, but these are directed at
more standard telephone tapping, and Carnivore has another issue — the use of
Carnivore to obtain information not covered by the court order, whether it is about other
people or about the person covered by the court order.

As the text says, the social issue of privacy concerns the development of “expectations
of privacy” or privacy norms and public attitudes. Do we (the society) encourage people
to expect “private territory” when using modern technology, including e-mail? Should
expectations of privacy be extended to criminal conspirators, and if not, how do we
know if they are criminal conspirators, and if so how do we solve crimes?

The political area really covers the issue of lawmaking. Should the FBI be allowed to
eavesdrop on e-mails of criminal suspects? If so, how do we prevent the FBI from
misusing that power?

4.How effective is Carnivore as a terrorism and crime-prevention tool?

The answers should be relatively clear. Those who are amateurs at electronic
communication can probably be caught if they use e-mail for criminal (including
terrorist) reasons. However the case study shows that alternative ways of
communicating messages, including e-mail, exist and are probably being used by
criminals.

5. State your views on ways to solve the problems of collecting the key data the FBI can
gain through Carnivore without interfering with the privacy of people not related to the
crime involved.

The case study offers at least one alternative — the control of Carnivore-type software
by the ISPs, although this can still be misused by the ISP. Encourage your students to
come up with thoughtful, creative ideas. The alternative ways that the students suggest
must be examined carefully to see if they are actually possible, and if they can be
misused. Again, students will struggle with the difficult issues of solving privacy
problems, and come to understand that agreement on these issues is difficult, if not
impossible, leading to a discussion of majority and minority in a democratic society.

More Related Content

What's hot

Chapter 10 MIS
Chapter 10 MISChapter 10 MIS
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
Faisal14H
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
Thoughtworks
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Sukanya Ben
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Soetam Rizky
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of Ethics
Suji Priya J
 
MIS-CH01: IS in Business Today
MIS-CH01: IS in Business TodayMIS-CH01: IS in Business Today
MIS-CH01: IS in Business Today
Sukanya Ben
 
E business strategy
E business strategyE business strategy
E business strategy
Not currently emloyed
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
Sukanya Ben
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
Sukanya Ben
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managers
AbdulQadir Koitewale
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
university of education,Lahore
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
 
Social and Ethical Issues in Information System
Social and Ethical Issues in Information SystemSocial and Ethical Issues in Information System
Social and Ethical Issues in Information System
university of education,Lahore
 

What's hot (20)

Laudon Ch10
Laudon Ch10Laudon Ch10
Laudon Ch10
 
Chapter 10 MIS
Chapter 10 MISChapter 10 MIS
Chapter 10 MIS
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of Ethics
 
MIS-CH01: IS in Business Today
MIS-CH01: IS in Business TodayMIS-CH01: IS in Business Today
MIS-CH01: IS in Business Today
 
E business strategy
E business strategyE business strategy
E business strategy
 
Chapter 1 MIS
Chapter 1 MISChapter 1 MIS
Chapter 1 MIS
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Chapter 2 MIS
Chapter 2 MISChapter 2 MIS
Chapter 2 MIS
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managers
 
Chapter 3 MIS
Chapter 3 MISChapter 3 MIS
Chapter 3 MIS
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Social and Ethical Issues in Information System
Social and Ethical Issues in Information SystemSocial and Ethical Issues in Information System
Social and Ethical Issues in Information System
 

Viewers also liked

4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
Rownel Cerezo Gagani
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Ethics in Volunteer Engagement
Ethics in Volunteer EngagementEthics in Volunteer Engagement
Ethics in Volunteer Engagement
VolunteerMatch
 
Analysis of a business problem using various normative theories
Analysis of a business problem using various normative theoriesAnalysis of a business problem using various normative theories
Analysis of a business problem using various normative theoriesAnura Kumara
 
Analysis of a business problem using various normative theories
Analysis of a business problem using various normative theoriesAnalysis of a business problem using various normative theories
Analysis of a business problem using various normative theoriesAnura Kumara
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMMThe Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
Hector Del Castillo, CPM, CPMM
 
Case study 7
Case study 7Case study 7
Case study 7
khaled alsaeh
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
113068
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
Intellectual Property/Copyright/ Ethics
Intellectual Property/Copyright/EthicsIntellectual Property/Copyright/Ethics
Intellectual Property/Copyright/ Ethics
Natalia1818
 
Non obvious relationship awareness (nora)
Non obvious relationship awareness (nora)Non obvious relationship awareness (nora)
Non obvious relationship awareness (nora)
neymarsabin
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethicscharwendel
 

Viewers also liked (19)

4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethics in Volunteer Engagement
Ethics in Volunteer EngagementEthics in Volunteer Engagement
Ethics in Volunteer Engagement
 
Analysis of a business problem using various normative theories
Analysis of a business problem using various normative theoriesAnalysis of a business problem using various normative theories
Analysis of a business problem using various normative theories
 
Analysis of a business problem using various normative theories
Analysis of a business problem using various normative theoriesAnalysis of a business problem using various normative theories
Analysis of a business problem using various normative theories
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMMThe Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
 
Capital structure
Capital structureCapital structure
Capital structure
 
Case study 7
Case study 7Case study 7
Case study 7
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Intellectual Property/Copyright/ Ethics
Intellectual Property/Copyright/EthicsIntellectual Property/Copyright/Ethics
Intellectual Property/Copyright/ Ethics
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Non obvious relationship awareness (nora)
Non obvious relationship awareness (nora)Non obvious relationship awareness (nora)
Non obvious relationship awareness (nora)
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethics
 

Similar to Review questions

chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
jeanettehully
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
shanaeacklam
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
ManishKarki12
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
Nicha Tatsaneeyapan
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
briancrawford30935
 
Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08
BookStoreLib
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Habib Ullah Qamar
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
Luis R Castellanos
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
amreena6
 
5362098
53620985362098
5362098
AditiVeda1
 

Similar to Review questions (20)

chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Review questions

  • 1. Review Questions 1. In what ways are ethical, social, and political issues connected? Give some examples. Ethics refers to principles of right and wrong which individuals use to guide their behavior. Individuals act within a social environment that, in turn, exists within a political environment. Ethical dilemmas are problems that affect society and that often are addressed in the political arena. For example, new computer technology makes it easier to gain private information about individuals, creating an ethical dilemma for the potential user of that information (whether or not to invade the privacy of the individual). Society will respond by demanding new laws to regulate the use of data. Students will be able to give a range of examples of this connection. 2. What are the key technology trends that heighten ethical concerns? Table 5-1 identifies the four key technology trends. These trends include computer power doubling every 18 months, rapid decline in data storage costs, data analysis advances, and networking advances and the Internet. The doubling of computing power every 18 months is creating a growing dependence on systems and a consequent vulnerability to system errors, poor data quality, and failure of critical systems. Advances in data storage techniques and rapidly declining storage costs provide for massive data storage capabilities on individual systems and enable the routine violation of individual privacy. Advances in datamining techniques for large databases allow those who are able to dominate supercomputing capacity (large businesses and governments) to increase their power over individuals through the analysis of massive amounts of data about individuals. Advances in telecommunications infrastructure allow the movement of massive amounts of data at greatly reduced cost, permitting the use of data and, as a result, the invasion of privacy on a scale and precision unimaginable to us now. 3. What are the differences between responsibility, accountability, and liability? Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. Accountability is a feature of systems and social institutions that allows the determination of who is responsible. Liability is a feature of political systems that permits individuals to recover damages done to them by responsible individuals or organizations. 4. What are the five steps in an ethical analysis? The five steps in an ethical analysis are outlined in the Manager's Toolkit. The five steps include (1) identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher order values involved; (3) identify the stakeholders; (4) identify the options you can reasonably take, and (5) identify the potential consequences of your options. 5. Identify and describe six ethical principles.
  • 2. The six ethical principles include the golden rule, Immanuel Kant's Categorical Imperative, Descartes' rule of change, Utilitarian Principle, Risk Aversion Principle, and ethical "no free lunch" rule. The golden rule suggests doing unto others as you would have them do unto you. Kant's Categorical Imperative suggests that if an action is not right for everyone to take, then it is not right for anyone. Descartes' rule of change, also known as the slippery slope rule, suggests that if an action cannot be taken repeatedly, then it is not right to be taken at any time. The Utilitarian Principle suggests taking the action that achieves the higher or greater value. The Risk Aversion Principle suggests taking the action that produces the least harm or the least potential cost. The ethical "no free lunch" rule says that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise. 6. What is a professional code of conduct? When groups of people claim to be professionals, they take on special rights and obligations. As professionals, they enter into even more constraining relationships with employers, customers, and society because of the special claims to knowledge, wisdom, and respect. Professional codes of conduct are promulgated by associations of professionals in order to regulate entrance qualifications and competencies and to establish codes of ethics. 7. What are meant by "privacy" and "fair information practices”? Privacy is the claim that individuals have the right to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Claims to privacy involve the workplace as well as the home. Information technology threatens individual claims to privacy by making the invasion of privacy cheap, profitable, and effective. The fair information practices (FIP) is a set of principles governing the collection and use of information about individuals. The five FIP principles are: (1) notice/awareness; (2) choice/consent; (3) access/participation; (4) security; and (5) enforcement. 8. How is the Internet challenging the protection of individual privacy? Cookies, Web bugs, and other means of collecting information about Internet users can be shared without the Internet user's consent. This allows information that a user may have given voluntarily for a good purpose, say logging into the New York Times site, to be shared with some other site. Spamming or e-mail that uses a user’s e-mail address is another invasion of privacy. 9. What role can informed consent, legislation, industry self-regulation, and technology tools play in protecting individual privacy of Internet users? Informed consent means that the Web site visitor knowingly permits the collection of data about his/her and his/her visit to the company's Web site. Federal privacy laws help regulate the collection, usage, and disclosure of information in the United States. Table 5-2 lists several of the federal privacy laws in the United States. Businesses have taken
  • 3. some steps, including publishing statements about how their information will be used and sometimes offering an opt-out right. However, few businesses offer an opt-in approach. Several technology tools are available to combat privacy invasion. Technical solutions enable e-mail encryption, anonymous e-mailing and surfing, and cookie rejection. Table 5-4 lists several privacy tools. Of particular interest is the P3P standard that allows the user to have more control over personal information that is gathered on the Web sites that she visits. 10. What are the three different regimes that protect intellectual property rights? What challenges to intellectual property rights are posed by the Internet? Three different legal traditions that protect property rights are trade secret, copyright, and patent. A trade secret is any intellectual work product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain. The drawback to trade secret protection is that once an idea falls into the public domain, it no longer can be protected as a trade secret. A copyright is a statutory grant that protects creators of intellectual property against copying by others for any purpose for a period of 28 years. (For work created on or after January 1, 1978, the intellectual property is protected during the author's lifetime plus 70 years after his death.) The drawback of this protection is that underlying ideas are not protected, only their manifestations in a work. A patent grants the owner a monopoly on the ideas behind an invention for 20 years. While patent protection does grant a monopoly on the underlying concepts and ideas, the difficulty is passing stringent criteria of non-obviousness, originality, and novelty. The Internet makes it very easy to widely distribute and reproduce intellectual property. 11. Why is it so difficult to hold software services liable for failure or injury? It is very difficult, if not impossible, to hold software producers liable for their software products because it is only when software acts as a part of a defective product that strict liability pertains. If the software is strictly a service (not part of a product), these laws do not apply. As part of a product, software is still considered to be like books, which historically are protected from liability claims by the First Amendment guaranteeing freedom of expression. 12. What is the most common cause of system quality problems? The three principal sources of system quality problems are hardware and facility failures, software bugs and errors, and data quality. However, the most common cause of system quality problems is data quality. According to the 1998 Redman study cited in the textbook, individual organizations report data error rates ranging from 0.5 to 30 percent. 13. Name and describe four "quality of life" impacts of computers and information systems. The textbook describes eight "quality of life" impacts of computers and information systems. These include balancing power, rapidity of change, maintaining boundaries,
  • 4. dependency and vulnerability, computer crime and abuse, employment, equity and access, and health risks. Balancing power describes the shift toward highly decentralized computing, coupled with an ideology of "empowerment" of thousands of workers and decentralization of decision making to lower organizational levels. The problem is that the lower-level worker involvement in decision making tends to be trivial. Key policy decisions are as centralized as in the past. The rapidity of change impact suggests that information systems have increased the efficiency of the global marketplace. As a result, businesses no longer have many years to adjust to competition. Businesses can now be wiped out very rapidly, and along with them, jobs. The maintaining boundaries impact suggests that portable computers and telecommuting have created the condition where people can take their work anywhere with them and do it at any time. As a result, workers find that their work is cutting into family time, vacations, and leisure, weakening the traditional institutions of family and friends and blurring the line between public and private life. The dependency and vulnerability impact suggests that businesses, governments, schools, and private associations are becoming more and more dependent on information systems, and so they are highly vulnerable to the failure of those systems. The computer crime and abuse impact suggests that computers have created new opportunities for committing crimes and have themselves become the target of crimes. The employment impact suggests that redesigning business processes could potentially cause millions of middle-level managers and clerical workers to lose their jobs. Worse, if reengineering actually works as claimed, these workers will not find similar employment because the demand for their skills will decline. The equity and access impact suggests that access to computer and information resources is not equitably distributed throughout society. Access is distributed inequitably along racial, economic, and social class lines (as are many other information resources). Poor children attending poor school districts are less likely to use computers at school. Children from wealthy homes are five times more likely to use PCs for schoolwork than poor children. Whites are three times more likely to use computers at home for schoolwork than African-Americans. Potentially, we could create a society of information haves and have-nots, further increasing the social cleavages in our society. Health risks have been attributed to computers and information technologies. For instance, business now spends $20 billion a year to compensate and treat victims of computer-related occupational diseases. Those illnesses include RSI (repetitive stress injury), CVS (computer vision syndrome), and technostress. 14. What is technostress, and how would you identify it?
  • 5. Technostress is defined as stress induced by computer-use. Its symptoms are aggravation, hostility towards humans, impatience, and enervation. 15. Name three management actions that could reduce RSI. Management can reduce RSI (repetitive stress injury) by using workstations (mainly keyboards) designed for a neutral wrist position (using a wrist rest to support the wrist). Use of proper monitor stands and footrests will contribute to proper posture and so reduce RSI, as will allowing (or requiring) employees to take frequent breaks from their work to walk around. Finally, use of new, ergonomically designed keyboards will also help. Case Study – The FBI and Digital Surveillance: How Far Should It Go? 1. Does Carnivore present an ethical dilemma? Explain your answer. Students can answer this question in many ways. Key to their responses, however, is that they respond by using an ethical approach. What is the correct moral choice? The other element students must deal with is who is making the choice? Does the FBI staff responsible for using it have an ethical choice? What about those who are responsible for the decisions of the ISP, do they have an ethical dilemma? Or do some of them want to deal with the possibility of the congresspersons that have to make decisions about it? Or even the writers who write about ethical and social issues in a digital firm? The best way for students to analyze this issue is to apply the five-step ethical analysis approach to this situation. Your students also need to examine the candidates for ethical principles. This question should lead to an interesting discussion, partly because the dilemma is very real, particularly in this post-September 11 period. 2. Apply an ethical analysis to the issue of the FBI’s use of information technology and U.S. citizens’ privacy rights. Notice that this question is broader than the first question because this asks about the use of information technology whereas Question 1 limits the issue to Carnivore. No matter where individual students stand on the issue of Carnivore, it is difficult to come to a clear stance on the broader issue of information technology. However, the question is limited to the uses by the FBI. Begin the discussion by asking the students about the different ways the FBI uses information technology. For each use, have your students determine whether or not it can affect the privacy rights of citizens. For example, the FBI can use information technology for storing the DNA of individuals. Is this a problem for citizens’ privacy rights? 3. What are the ethical, social and political issues raised by the FBI tapping the e-mails of individuals and collecting personal data on them? As with most ethical issues, student views will vary widely. Your task is to make sure the differing views are raised and discussed because these issues are complex and affect the future and type of government we live under, whichever country we live in. And, again in the case of Carnivore, does it fall under these issues given the fact that the FBI wants control of the information technology that can be misused? Are there alternative ways of accomplishing the goals? This can be a very lively, engaging and thought- provoking discussion. The ethical privacy issue examines the conditions under which someone should invade the privacy of others; what legitimates intruding into others’ lives through unobtrusive
  • 6. surveillance or other means; do we have to inform people that we are eavesdropping; and do we have to inform people that we are using credit history information for employment screening purposes? These are critical issues, but these are directed at more standard telephone tapping, and Carnivore has another issue — the use of Carnivore to obtain information not covered by the court order, whether it is about other people or about the person covered by the court order. As the text says, the social issue of privacy concerns the development of “expectations of privacy” or privacy norms and public attitudes. Do we (the society) encourage people to expect “private territory” when using modern technology, including e-mail? Should expectations of privacy be extended to criminal conspirators, and if not, how do we know if they are criminal conspirators, and if so how do we solve crimes? The political area really covers the issue of lawmaking. Should the FBI be allowed to eavesdrop on e-mails of criminal suspects? If so, how do we prevent the FBI from misusing that power? 4.How effective is Carnivore as a terrorism and crime-prevention tool? The answers should be relatively clear. Those who are amateurs at electronic communication can probably be caught if they use e-mail for criminal (including terrorist) reasons. However the case study shows that alternative ways of communicating messages, including e-mail, exist and are probably being used by criminals. 5. State your views on ways to solve the problems of collecting the key data the FBI can gain through Carnivore without interfering with the privacy of people not related to the crime involved. The case study offers at least one alternative — the control of Carnivore-type software by the ISPs, although this can still be misused by the ISP. Encourage your students to come up with thoughtful, creative ideas. The alternative ways that the students suggest must be examined carefully to see if they are actually possible, and if they can be misused. Again, students will struggle with the difficult issues of solving privacy problems, and come to understand that agreement on these issues is difficult, if not impossible, leading to a discussion of majority and minority in a democratic society.