SlideShare a Scribd company logo
15.15.11 © 2002 by Prentice Hall
c h a p t e r
15
ETHICAL & SOCIALETHICAL & SOCIAL
IMPACT OFIMPACT OF
INFORMATIONINFORMATION
SYSTEMSSYSTEMS
15.15.22 © 2002 by Prentice Hall
LEARNING OBJECTIVESLEARNING OBJECTIVES
• ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUESANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES
RAISED BY INFORMATION SYSTEMSRAISED BY INFORMATION SYSTEMS
• IDENTIFY, APPLY MORAL DIMENSIONS OFIDENTIFY, APPLY MORAL DIMENSIONS OF
INFORMATION SOCIETYINFORMATION SOCIETY
15.15.33 © 2002 by Prentice Hall
LEARNING OBJECTIVESLEARNING OBJECTIVES
• APPLY ETHICAL ANALYSISAPPLY ETHICAL ANALYSIS
• EXAMINE ETHICAL PRINCIPLESEXAMINE ETHICAL PRINCIPLES
FOR CONDUCTFOR CONDUCT
• DESIGN CORPORATE POLICIESDESIGN CORPORATE POLICIES
FOR ETHICAL CONDUCTFOR ETHICAL CONDUCT
15.15.44 © 2002 by Prentice Hall
MANAGEMENT CHALLENGESMANAGEMENT CHALLENGES
• UNDERSTAND ETHICAL & SOCIALUNDERSTAND ETHICAL & SOCIAL
ISSUES RELATED TO SYSTEMSISSUES RELATED TO SYSTEMS
• ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION
SOCIETYSOCIETY
• MORAL DIMENSION OFMORAL DIMENSION OF
INFORMATION SYSTEMSINFORMATION SYSTEMS
**
15.15.55 © 2002 by Prentice Hall
ETHICSETHICS
PRINCIPLES OF RIGHT AND WRONGPRINCIPLES OF RIGHT AND WRONG
USED BY INDIVIDUALSUSED BY INDIVIDUALS
AS FREE MORAL AGENTSAS FREE MORAL AGENTS
TO GUIDE BEHAVIORTO GUIDE BEHAVIOR
**
15.15.66 © 2002 by Prentice Hall
INDIVIDUAL
SOCIETY
POLITY
ETHICAL ISSUES
SOCIAL ISSUES
POLITICAL ISSUES
QUALITY OF LIFEQUALITY OF LIFE
INFORMATIONINFORMATION
RIGHTS &RIGHTS &
OBLIGATIONSOBLIGATIONS
PROPERTYPROPERTY
RIGHTS &RIGHTS &
OBLIGATIONSOBLIGATIONS
ACCOUNTABILITYACCOUNTABILITY
& CONTROL& CONTROL
SYSTEMSYSTEM
QUALITYQUALITY
ETHICAL, SOCIAL & POLITICAL ISSUESETHICAL, SOCIAL & POLITICAL ISSUES
INFORMATIONINFORMATION
&&
TECHNOLOGYTECHNOLOGY
15.15.77 © 2002 by Prentice Hall
• INFORMATION RIGHTS & OBLIGATIONSINFORMATION RIGHTS & OBLIGATIONS
• PROPERTY RIGHTSPROPERTY RIGHTS
• ACCOUNTABILITY & CONTROLACCOUNTABILITY & CONTROL
• SYSTEM QUALITYSYSTEM QUALITY
• QUALITY OF LIFEQUALITY OF LIFE
**
MORAL DIMENSIONS OF THEMORAL DIMENSIONS OF THE
INFORMATION AGEINFORMATION AGE
15.15.88 © 2002 by Prentice Hall
TECHNOLOGY TRENDS & ETHICALTECHNOLOGY TRENDS & ETHICAL
ISSUESISSUES
• COMPUTING POWER DOUBLES EVERY 18COMPUTING POWER DOUBLES EVERY 18
MONTHSMONTHS
• DECLINING COSTS OF DATA STORAGEDECLINING COSTS OF DATA STORAGE
• DATA MINING ADVANCESDATA MINING ADVANCES
• NETWORKING ADVANCES & INTERNETNETWORKING ADVANCES & INTERNET
**
15.15.99 © 2002 by Prentice Hall
ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION
SOCIETYSOCIETY
• RESPONSIBILITY:RESPONSIBILITY: Accepting costs,Accepting costs,
duties, obligations for decisionsduties, obligations for decisions
• ACCOUNTABILITY:ACCOUNTABILITY: AssessingAssessing
responsibilities for decisions & actionsresponsibilities for decisions & actions
• LIABILITY:LIABILITY: Must pay for legal damagesMust pay for legal damages
• DUE PROCESS:DUE PROCESS: Insures laws are appliedInsures laws are applied
properlyproperly
**
15.15.1010 © 2002 by Prentice Hall
ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION
SOCIETYSOCIETY
ETHICAL ANALYSIS:ETHICAL ANALYSIS:
• IDENTIFY, DESCRIBE FACTSIDENTIFY, DESCRIBE FACTS
• DEFINE CONFLICT, IDENTIFY VALUESDEFINE CONFLICT, IDENTIFY VALUES
• IDENTIFY STAKEHOLDERSIDENTIFY STAKEHOLDERS
• IDENTIFY OPTIONSIDENTIFY OPTIONS
• IDENTIFY POTENTIAL CONSEQUENCESIDENTIFY POTENTIAL CONSEQUENCES
**
15.15.1111 © 2002 by Prentice Hall
ETHICAL PRINCIPLES:ETHICAL PRINCIPLES:
• TREAT OTHERS AS YOU WANT TO BE TREATEDTREAT OTHERS AS YOU WANT TO BE TREATED
• IF ACTION NOT RIGHT FOR EVERYONE, NOTIF ACTION NOT RIGHT FOR EVERYONE, NOT
RIGHT FOR ANYONE (KANT)RIGHT FOR ANYONE (KANT)
• IF ACTION NOT REPEATABLE, NOT RIGHT ATIF ACTION NOT REPEATABLE, NOT RIGHT AT
ANY TIME (DESCARTES)ANY TIME (DESCARTES)
• PUT VALUE ON OUTCOMES, UNDERSTANDPUT VALUE ON OUTCOMES, UNDERSTAND
CONSEQUENCESCONSEQUENCES
• INCUR LEAST HARM OR COSTINCUR LEAST HARM OR COST
• NO FREE LUNCHNO FREE LUNCH
**
ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION
SOCIETYSOCIETY
15.15.1212 © 2002 by Prentice Hall
INFORMATION RIGHTSINFORMATION RIGHTS
PRIVACY:PRIVACY: Right to be left aloneRight to be left alone
FAIR INFORMATION PRACTICESFAIR INFORMATION PRACTICES (FIP)(FIP)::
• NO SECRET PERSONAL RECORDSNO SECRET PERSONAL RECORDS
• INDIVIDUALS CAN ACCESS, AMENDINDIVIDUALS CAN ACCESS, AMEND
INFORMATION ABOUT THEMINFORMATION ABOUT THEM
• USE INFO ONLY WITH PRIOR CONSENTUSE INFO ONLY WITH PRIOR CONSENT
• MANAGERS ACCOUNTABLE FORMANAGERS ACCOUNTABLE FOR
DAMAGE DONE BY SYSTEMSDAMAGE DONE BY SYSTEMS
• GOVERNMENTS CAN INTERVENEGOVERNMENTS CAN INTERVENE
**
15.15.1313 © 2002 by Prentice Hall
U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
GENERAL FEDERAL PRIVACY LAWS:GENERAL FEDERAL PRIVACY LAWS:
FREEDOM OF INFORMATION ACT, 1968FREEDOM OF INFORMATION ACT, 1968
PRIVACY ACT OF 1974PRIVACY ACT OF 1974
ELECTRONIC COMMUNICATIONS PRIVACY ACT OFELECTRONIC COMMUNICATIONS PRIVACY ACT OF
19861986
COMPUTER MATCHING AND PRIVACYCOMPUTER MATCHING AND PRIVACY
PROTECTION ACT OF 1988PROTECTION ACT OF 1988
COMPUTER SECURITY ACT OF 1987COMPUTER SECURITY ACT OF 1987
FEDERAL MANAGERS FINANCIAL INTEGRITY ACTFEDERAL MANAGERS FINANCIAL INTEGRITY ACT
OF 1982OF 1982
**
15.15.1414 © 2002 by Prentice Hall
PRIVACY LAWS AFFECTING PRIVATEPRIVACY LAWS AFFECTING PRIVATE
INSTITUTIONS:INSTITUTIONS:
FAIR CREDIT REPORTING ACT, 1970FAIR CREDIT REPORTING ACT, 1970
FAMILY EDUCATION RIGHTS & PRIVACY ACT OFFAMILY EDUCATION RIGHTS & PRIVACY ACT OF
19781978
RIGHT TO FINANCIAL PRIVACY ACT OF 1978RIGHT TO FINANCIAL PRIVACY ACT OF 1978
PRIVACY PROTECTION ACT OF 1980PRIVACY PROTECTION ACT OF 1980
CABLE COMMUNICATIONS POLICY ACT OF 1984CABLE COMMUNICATIONS POLICY ACT OF 1984
ELECTRONIC COMMUNICATIONS PRIVACY ACT OFELECTRONIC COMMUNICATIONS PRIVACY ACT OF
19971997
**
U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
15.15.1515 © 2002 by Prentice Hall
MORE PRIVACY LAWS AFFECTING PRIVATEMORE PRIVACY LAWS AFFECTING PRIVATE
INSTITUTIONS:INSTITUTIONS:
VIDEO PRIVACY PROTECTION ACT OF 1988VIDEO PRIVACY PROTECTION ACT OF 1988
CONSUMER INTERNET PRIVACY PROTECTIONCONSUMER INTERNET PRIVACY PROTECTION
ACT OF 1997ACT OF 1997
COMMUNICATIONS PRIVACY & CONSUMERCOMMUNICATIONS PRIVACY & CONSUMER
EMPOWERMENT ACT OF 1997EMPOWERMENT ACT OF 1997
DATA PRIVACY ACT OF 1997DATA PRIVACY ACT OF 1997
CONSUMER INTERNET PRIVACY PROTECTIONCONSUMER INTERNET PRIVACY PROTECTION
ACT OF 1999ACT OF 1999
**
U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
15.15.1616 © 2002 by Prentice Hall
ETHICAL ISSUES:ETHICAL ISSUES: Who is morallyWho is morally
responsible for consequences ofresponsible for consequences of
use?use?
SOCIAL ISSUES:SOCIAL ISSUES: What should societyWhat should society
expect and allow?expect and allow?
POLITICAL ISSUES:POLITICAL ISSUES: To what extentTo what extent
should government intervene,should government intervene,
protect?protect?
**
ACCOUNTABILITY, LIABILITY &ACCOUNTABILITY, LIABILITY &
CONTROLCONTROL
15.15.1717 © 2002 by Prentice Hall
INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
INTELLECTUAL PROPERTY:INTELLECTUAL PROPERTY: IntangibleIntangible
creations protected by lawcreations protected by law
TRADE SECRET:TRADE SECRET: Intellectual work orIntellectual work or
product belonging to business, not inproduct belonging to business, not in
public domainpublic domain
COPYRIGHT:COPYRIGHT: Statutory grant protectingStatutory grant protecting
intellectual property from copying byintellectual property from copying by
others for 28 yearsothers for 28 years
**
15.15.1818 © 2002 by Prentice Hall
INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
TRADE MARK:TRADE MARK: Legally registered mark,Legally registered mark,
device, or name to distinguish one’sdevice, or name to distinguish one’s
goodsgoods
PATENT:PATENT: Legal document granting ownerLegal document granting owner
exclusive monopoly on an invention for 17exclusive monopoly on an invention for 17
yearsyears
**
15.15.1919 © 2002 by Prentice Hall
ETHICAL ISSUES:ETHICAL ISSUES: When is software orWhen is software or
service ready for release?service ready for release?
SOCIAL ISSUES:SOCIAL ISSUES: Can people trust quality ofCan people trust quality of
software, services, data?software, services, data?
POLITICAL ISSUES:POLITICAL ISSUES: Should congress orShould congress or
industry develop standards for software,industry develop standards for software,
hardware, data quality?hardware, data quality?
**
SYSTEM QUALITY:SYSTEM QUALITY:
DATA QUALITY &DATA QUALITY &
SYSTEM ERRORSSYSTEM ERRORS
15.15.2020 © 2002 by Prentice Hall
QUALITY OF LIFEQUALITY OF LIFE
CENTRALIZATION VS. DECENTRALIZATIONCENTRALIZATION VS. DECENTRALIZATION
RAPID CHANGE:RAPID CHANGE: Reduced response time toReduced response time to
competitioncompetition
MAINTAINING BOUNDARIES:MAINTAINING BOUNDARIES: Family, work,Family, work,
leisureleisure
DEPENDENCE AND VULNERABILITYDEPENDENCE AND VULNERABILITY
COMPUTER CRIME & ABUSECOMPUTER CRIME & ABUSE
**
15.15.2121 © 2002 by Prentice Hall
QUALITY OF LIFEQUALITY OF LIFE
EMPLOYMENT:EMPLOYMENT: Trickle-downTrickle-down
technology; reengineering job losstechnology; reengineering job loss
EQUITY & ACCESS:EQUITY & ACCESS: Increasing racialIncreasing racial
& social class cleavages& social class cleavages
HEALTH RISKSHEALTH RISKS
**
15.15.2222 © 2002 by Prentice Hall
QUALITY OF LIFEQUALITY OF LIFE
HEALTH RISKS:HEALTH RISKS:
• REPETITIVE STRESS INJURY (RSI)REPETITIVE STRESS INJURY (RSI)
• CARPAL TUNNEL SYNDROME (CTS)CARPAL TUNNEL SYNDROME (CTS)
• COMPUTER VISION SYNDROME (CVS)COMPUTER VISION SYNDROME (CVS)
• TECHNOSTRESS: Irritation, hostility,TECHNOSTRESS: Irritation, hostility,
impatience, enervation, fearimpatience, enervation, fear
• VDT RADIATIONVDT RADIATION
**
15.15.2323 © 2002 by Prentice Hall
INTERNET CRIME & ABUSEINTERNET CRIME & ABUSE
• HACKING:HACKING: Access to proprietary dataAccess to proprietary data
• JAMMING:JAMMING: Tie up host computerTie up host computer
• MALICIOUS SOFTWARE:MALICIOUS SOFTWARE: Viruses disableViruses disable
computercomputer
• SNIFFING:SNIFFING: Intercept data passing throughIntercept data passing through
system, e.g. credit card datasystem, e.g. credit card data
• SPOOFING:SPOOFING: Fraudulent misrepresentationFraudulent misrepresentation
**

More Related Content

What's hot

Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
mmuser2014
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
Sukanya Ben
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Today
tvto1381
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
Tonmoy zahid Rishad
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introduction
Prakash Patil
 
Data Governance
Data GovernanceData Governance
Data Governance
Axis Technology, LLC
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
Kriscila Yumul
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
university of education,Lahore
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
Faisal14H
 
Chapter 6 foundations of business intelligence
Chapter 6 foundations of business intelligenceChapter 6 foundations of business intelligence
Chapter 6 foundations of business intelligence
Van Chau
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and Strategy
Sukanya Ben
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
Sukanya Ben
 

What's hot (20)

Chapter 3 MIS
Chapter 3 MISChapter 3 MIS
Chapter 3 MIS
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Chapter 1 MIS
Chapter 1 MISChapter 1 MIS
Chapter 1 MIS
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Today
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introduction
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
 
Chapter 6 foundations of business intelligence
Chapter 6 foundations of business intelligenceChapter 6 foundations of business intelligence
Chapter 6 foundations of business intelligence
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and Strategy
 
Mis ch01
Mis ch01Mis ch01
Mis ch01
 
Information systems, organizations, and strategy
Information systems,  organizations, and strategyInformation systems,  organizations, and strategy
Information systems, organizations, and strategy
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
 

Viewers also liked

Building a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual ResourcesBuilding a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual Resources
Myfitbrain
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and developmentiarthur
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
Jeffrey Paulette
 
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual EntrepreneurThe Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
Dave Rigotti
 
Protection of Information System & Types of Controls
Protection of Information System & Types of ControlsProtection of Information System & Types of Controls
Protection of Information System & Types of Controls
VR Talsaniya
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)
Muhammed Kedir Hiko
 
Tps Presentation
Tps PresentationTps Presentation
Tps PresentationApex
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
Mohammed Kashifulla
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
uday sharma
 
Capp
CappCapp
Expert Systems
Expert SystemsExpert Systems
Expert Systems
sadeenedian08
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 

Viewers also liked (20)

Building a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual ResourcesBuilding a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual Resources
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual EntrepreneurThe Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
 
Protection of Information System & Types of Controls
Protection of Information System & Types of ControlsProtection of Information System & Types of Controls
Protection of Information System & Types of Controls
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)
 
Tps Presentation
Tps PresentationTps Presentation
Tps Presentation
 
management information system module2
management information system module2management information system module2
management information system module2
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Capp
CappCapp
Capp
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Introduction to cad cam
Introduction to cad camIntroduction to cad cam
Introduction to cad cam
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
6.expert systems
6.expert systems6.expert systems
6.expert systems
 

Similar to Social & Ethical Issues in Information Systems

SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10Welly Tjoe
 
MIS chap # 10..
MIS chap # 10..MIS chap # 10..
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEKMarketing
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
North Texas Chapter of the ISSA
 
MIS Wk-12.ppt
MIS Wk-12.pptMIS Wk-12.ppt
MIS Wk-12.ppt
NasirMehmood666923
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
Mohamed Ali
 
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz PatrickDigital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
Tealium
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES.eu
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
TrustArc
 
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptxReducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
aj051804
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
HillaryObomighie
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
Raffa Learning Community
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
DATUM LLC
 

Similar to Social & Ethical Issues in Information Systems (20)

Ch15
Ch15Ch15
Ch15
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
MIS chap # 10..
MIS chap # 10..MIS chap # 10..
MIS chap # 10..
 
6104 5
6104 56104 5
6104 5
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Mis9 ch05 ppt
Mis9 ch05 pptMis9 ch05 ppt
Mis9 ch05 ppt
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
MIS Wk-12.ppt
MIS Wk-12.pptMIS Wk-12.ppt
MIS Wk-12.ppt
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz PatrickDigital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Topik 5
Topik 5Topik 5
Topik 5
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptxReducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 

More from university of education,Lahore

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
university of education,Lahore
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
university of education,Lahore
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
university of education,Lahore
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
university of education,Lahore
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
university of education,Lahore
 
ePayment Methods
ePayment MethodsePayment Methods
A Star Search
A Star SearchA Star Search
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
university of education,Lahore
 
Uml Diagrams
Uml DiagramsUml Diagrams
eDras Max
eDras MaxeDras Max
RAD Model
RAD ModelRAD Model
Microsoft Project
Microsoft ProjectMicrosoft Project
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
university of education,Lahore
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
university of education,Lahore
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
university of education,Lahore
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
university of education,Lahore
 

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Social & Ethical Issues in Information Systems

  • 1. 15.15.11 © 2002 by Prentice Hall c h a p t e r 15 ETHICAL & SOCIALETHICAL & SOCIAL IMPACT OFIMPACT OF INFORMATIONINFORMATION SYSTEMSSYSTEMS
  • 2. 15.15.22 © 2002 by Prentice Hall LEARNING OBJECTIVESLEARNING OBJECTIVES • ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUESANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSRAISED BY INFORMATION SYSTEMS • IDENTIFY, APPLY MORAL DIMENSIONS OFIDENTIFY, APPLY MORAL DIMENSIONS OF INFORMATION SOCIETYINFORMATION SOCIETY
  • 3. 15.15.33 © 2002 by Prentice Hall LEARNING OBJECTIVESLEARNING OBJECTIVES • APPLY ETHICAL ANALYSISAPPLY ETHICAL ANALYSIS • EXAMINE ETHICAL PRINCIPLESEXAMINE ETHICAL PRINCIPLES FOR CONDUCTFOR CONDUCT • DESIGN CORPORATE POLICIESDESIGN CORPORATE POLICIES FOR ETHICAL CONDUCTFOR ETHICAL CONDUCT
  • 4. 15.15.44 © 2002 by Prentice Hall MANAGEMENT CHALLENGESMANAGEMENT CHALLENGES • UNDERSTAND ETHICAL & SOCIALUNDERSTAND ETHICAL & SOCIAL ISSUES RELATED TO SYSTEMSISSUES RELATED TO SYSTEMS • ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION SOCIETYSOCIETY • MORAL DIMENSION OFMORAL DIMENSION OF INFORMATION SYSTEMSINFORMATION SYSTEMS **
  • 5. 15.15.55 © 2002 by Prentice Hall ETHICSETHICS PRINCIPLES OF RIGHT AND WRONGPRINCIPLES OF RIGHT AND WRONG USED BY INDIVIDUALSUSED BY INDIVIDUALS AS FREE MORAL AGENTSAS FREE MORAL AGENTS TO GUIDE BEHAVIORTO GUIDE BEHAVIOR **
  • 6. 15.15.66 © 2002 by Prentice Hall INDIVIDUAL SOCIETY POLITY ETHICAL ISSUES SOCIAL ISSUES POLITICAL ISSUES QUALITY OF LIFEQUALITY OF LIFE INFORMATIONINFORMATION RIGHTS &RIGHTS & OBLIGATIONSOBLIGATIONS PROPERTYPROPERTY RIGHTS &RIGHTS & OBLIGATIONSOBLIGATIONS ACCOUNTABILITYACCOUNTABILITY & CONTROL& CONTROL SYSTEMSYSTEM QUALITYQUALITY ETHICAL, SOCIAL & POLITICAL ISSUESETHICAL, SOCIAL & POLITICAL ISSUES INFORMATIONINFORMATION && TECHNOLOGYTECHNOLOGY
  • 7. 15.15.77 © 2002 by Prentice Hall • INFORMATION RIGHTS & OBLIGATIONSINFORMATION RIGHTS & OBLIGATIONS • PROPERTY RIGHTSPROPERTY RIGHTS • ACCOUNTABILITY & CONTROLACCOUNTABILITY & CONTROL • SYSTEM QUALITYSYSTEM QUALITY • QUALITY OF LIFEQUALITY OF LIFE ** MORAL DIMENSIONS OF THEMORAL DIMENSIONS OF THE INFORMATION AGEINFORMATION AGE
  • 8. 15.15.88 © 2002 by Prentice Hall TECHNOLOGY TRENDS & ETHICALTECHNOLOGY TRENDS & ETHICAL ISSUESISSUES • COMPUTING POWER DOUBLES EVERY 18COMPUTING POWER DOUBLES EVERY 18 MONTHSMONTHS • DECLINING COSTS OF DATA STORAGEDECLINING COSTS OF DATA STORAGE • DATA MINING ADVANCESDATA MINING ADVANCES • NETWORKING ADVANCES & INTERNETNETWORKING ADVANCES & INTERNET **
  • 9. 15.15.99 © 2002 by Prentice Hall ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION SOCIETYSOCIETY • RESPONSIBILITY:RESPONSIBILITY: Accepting costs,Accepting costs, duties, obligations for decisionsduties, obligations for decisions • ACCOUNTABILITY:ACCOUNTABILITY: AssessingAssessing responsibilities for decisions & actionsresponsibilities for decisions & actions • LIABILITY:LIABILITY: Must pay for legal damagesMust pay for legal damages • DUE PROCESS:DUE PROCESS: Insures laws are appliedInsures laws are applied properlyproperly **
  • 10. 15.15.1010 © 2002 by Prentice Hall ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION SOCIETYSOCIETY ETHICAL ANALYSIS:ETHICAL ANALYSIS: • IDENTIFY, DESCRIBE FACTSIDENTIFY, DESCRIBE FACTS • DEFINE CONFLICT, IDENTIFY VALUESDEFINE CONFLICT, IDENTIFY VALUES • IDENTIFY STAKEHOLDERSIDENTIFY STAKEHOLDERS • IDENTIFY OPTIONSIDENTIFY OPTIONS • IDENTIFY POTENTIAL CONSEQUENCESIDENTIFY POTENTIAL CONSEQUENCES **
  • 11. 15.15.1111 © 2002 by Prentice Hall ETHICAL PRINCIPLES:ETHICAL PRINCIPLES: • TREAT OTHERS AS YOU WANT TO BE TREATEDTREAT OTHERS AS YOU WANT TO BE TREATED • IF ACTION NOT RIGHT FOR EVERYONE, NOTIF ACTION NOT RIGHT FOR EVERYONE, NOT RIGHT FOR ANYONE (KANT)RIGHT FOR ANYONE (KANT) • IF ACTION NOT REPEATABLE, NOT RIGHT ATIF ACTION NOT REPEATABLE, NOT RIGHT AT ANY TIME (DESCARTES)ANY TIME (DESCARTES) • PUT VALUE ON OUTCOMES, UNDERSTANDPUT VALUE ON OUTCOMES, UNDERSTAND CONSEQUENCESCONSEQUENCES • INCUR LEAST HARM OR COSTINCUR LEAST HARM OR COST • NO FREE LUNCHNO FREE LUNCH ** ETHICS IN AN INFORMATIONETHICS IN AN INFORMATION SOCIETYSOCIETY
  • 12. 15.15.1212 © 2002 by Prentice Hall INFORMATION RIGHTSINFORMATION RIGHTS PRIVACY:PRIVACY: Right to be left aloneRight to be left alone FAIR INFORMATION PRACTICESFAIR INFORMATION PRACTICES (FIP)(FIP):: • NO SECRET PERSONAL RECORDSNO SECRET PERSONAL RECORDS • INDIVIDUALS CAN ACCESS, AMENDINDIVIDUALS CAN ACCESS, AMEND INFORMATION ABOUT THEMINFORMATION ABOUT THEM • USE INFO ONLY WITH PRIOR CONSENTUSE INFO ONLY WITH PRIOR CONSENT • MANAGERS ACCOUNTABLE FORMANAGERS ACCOUNTABLE FOR DAMAGE DONE BY SYSTEMSDAMAGE DONE BY SYSTEMS • GOVERNMENTS CAN INTERVENEGOVERNMENTS CAN INTERVENE **
  • 13. 15.15.1313 © 2002 by Prentice Hall U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS GENERAL FEDERAL PRIVACY LAWS:GENERAL FEDERAL PRIVACY LAWS: FREEDOM OF INFORMATION ACT, 1968FREEDOM OF INFORMATION ACT, 1968 PRIVACY ACT OF 1974PRIVACY ACT OF 1974 ELECTRONIC COMMUNICATIONS PRIVACY ACT OFELECTRONIC COMMUNICATIONS PRIVACY ACT OF 19861986 COMPUTER MATCHING AND PRIVACYCOMPUTER MATCHING AND PRIVACY PROTECTION ACT OF 1988PROTECTION ACT OF 1988 COMPUTER SECURITY ACT OF 1987COMPUTER SECURITY ACT OF 1987 FEDERAL MANAGERS FINANCIAL INTEGRITY ACTFEDERAL MANAGERS FINANCIAL INTEGRITY ACT OF 1982OF 1982 **
  • 14. 15.15.1414 © 2002 by Prentice Hall PRIVACY LAWS AFFECTING PRIVATEPRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS:INSTITUTIONS: FAIR CREDIT REPORTING ACT, 1970FAIR CREDIT REPORTING ACT, 1970 FAMILY EDUCATION RIGHTS & PRIVACY ACT OFFAMILY EDUCATION RIGHTS & PRIVACY ACT OF 19781978 RIGHT TO FINANCIAL PRIVACY ACT OF 1978RIGHT TO FINANCIAL PRIVACY ACT OF 1978 PRIVACY PROTECTION ACT OF 1980PRIVACY PROTECTION ACT OF 1980 CABLE COMMUNICATIONS POLICY ACT OF 1984CABLE COMMUNICATIONS POLICY ACT OF 1984 ELECTRONIC COMMUNICATIONS PRIVACY ACT OFELECTRONIC COMMUNICATIONS PRIVACY ACT OF 19971997 ** U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
  • 15. 15.15.1515 © 2002 by Prentice Hall MORE PRIVACY LAWS AFFECTING PRIVATEMORE PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS:INSTITUTIONS: VIDEO PRIVACY PROTECTION ACT OF 1988VIDEO PRIVACY PROTECTION ACT OF 1988 CONSUMER INTERNET PRIVACY PROTECTIONCONSUMER INTERNET PRIVACY PROTECTION ACT OF 1997ACT OF 1997 COMMUNICATIONS PRIVACY & CONSUMERCOMMUNICATIONS PRIVACY & CONSUMER EMPOWERMENT ACT OF 1997EMPOWERMENT ACT OF 1997 DATA PRIVACY ACT OF 1997DATA PRIVACY ACT OF 1997 CONSUMER INTERNET PRIVACY PROTECTIONCONSUMER INTERNET PRIVACY PROTECTION ACT OF 1999ACT OF 1999 ** U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
  • 16. 15.15.1616 © 2002 by Prentice Hall ETHICAL ISSUES:ETHICAL ISSUES: Who is morallyWho is morally responsible for consequences ofresponsible for consequences of use?use? SOCIAL ISSUES:SOCIAL ISSUES: What should societyWhat should society expect and allow?expect and allow? POLITICAL ISSUES:POLITICAL ISSUES: To what extentTo what extent should government intervene,should government intervene, protect?protect? ** ACCOUNTABILITY, LIABILITY &ACCOUNTABILITY, LIABILITY & CONTROLCONTROL
  • 17. 15.15.1717 © 2002 by Prentice Hall INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY INTELLECTUAL PROPERTY:INTELLECTUAL PROPERTY: IntangibleIntangible creations protected by lawcreations protected by law TRADE SECRET:TRADE SECRET: Intellectual work orIntellectual work or product belonging to business, not inproduct belonging to business, not in public domainpublic domain COPYRIGHT:COPYRIGHT: Statutory grant protectingStatutory grant protecting intellectual property from copying byintellectual property from copying by others for 28 yearsothers for 28 years **
  • 18. 15.15.1818 © 2002 by Prentice Hall INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY TRADE MARK:TRADE MARK: Legally registered mark,Legally registered mark, device, or name to distinguish one’sdevice, or name to distinguish one’s goodsgoods PATENT:PATENT: Legal document granting ownerLegal document granting owner exclusive monopoly on an invention for 17exclusive monopoly on an invention for 17 yearsyears **
  • 19. 15.15.1919 © 2002 by Prentice Hall ETHICAL ISSUES:ETHICAL ISSUES: When is software orWhen is software or service ready for release?service ready for release? SOCIAL ISSUES:SOCIAL ISSUES: Can people trust quality ofCan people trust quality of software, services, data?software, services, data? POLITICAL ISSUES:POLITICAL ISSUES: Should congress orShould congress or industry develop standards for software,industry develop standards for software, hardware, data quality?hardware, data quality? ** SYSTEM QUALITY:SYSTEM QUALITY: DATA QUALITY &DATA QUALITY & SYSTEM ERRORSSYSTEM ERRORS
  • 20. 15.15.2020 © 2002 by Prentice Hall QUALITY OF LIFEQUALITY OF LIFE CENTRALIZATION VS. DECENTRALIZATIONCENTRALIZATION VS. DECENTRALIZATION RAPID CHANGE:RAPID CHANGE: Reduced response time toReduced response time to competitioncompetition MAINTAINING BOUNDARIES:MAINTAINING BOUNDARIES: Family, work,Family, work, leisureleisure DEPENDENCE AND VULNERABILITYDEPENDENCE AND VULNERABILITY COMPUTER CRIME & ABUSECOMPUTER CRIME & ABUSE **
  • 21. 15.15.2121 © 2002 by Prentice Hall QUALITY OF LIFEQUALITY OF LIFE EMPLOYMENT:EMPLOYMENT: Trickle-downTrickle-down technology; reengineering job losstechnology; reengineering job loss EQUITY & ACCESS:EQUITY & ACCESS: Increasing racialIncreasing racial & social class cleavages& social class cleavages HEALTH RISKSHEALTH RISKS **
  • 22. 15.15.2222 © 2002 by Prentice Hall QUALITY OF LIFEQUALITY OF LIFE HEALTH RISKS:HEALTH RISKS: • REPETITIVE STRESS INJURY (RSI)REPETITIVE STRESS INJURY (RSI) • CARPAL TUNNEL SYNDROME (CTS)CARPAL TUNNEL SYNDROME (CTS) • COMPUTER VISION SYNDROME (CVS)COMPUTER VISION SYNDROME (CVS) • TECHNOSTRESS: Irritation, hostility,TECHNOSTRESS: Irritation, hostility, impatience, enervation, fearimpatience, enervation, fear • VDT RADIATIONVDT RADIATION **
  • 23. 15.15.2323 © 2002 by Prentice Hall INTERNET CRIME & ABUSEINTERNET CRIME & ABUSE • HACKING:HACKING: Access to proprietary dataAccess to proprietary data • JAMMING:JAMMING: Tie up host computerTie up host computer • MALICIOUS SOFTWARE:MALICIOUS SOFTWARE: Viruses disableViruses disable computercomputer • SNIFFING:SNIFFING: Intercept data passing throughIntercept data passing through system, e.g. credit card datasystem, e.g. credit card data • SPOOFING:SPOOFING: Fraudulent misrepresentationFraudulent misrepresentation **