Académique Documents
Professionnel Documents
Culture Documents
4.1
Analyze the relationships among ethical, social, and political issues that are raised by information systems. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
Problem: New opportunities from new technology and need for greater security. Solutions: Redesigning business processes and products to support location monitoring increases sales and security.
Deploying GPS and RFID tracking devices with a location tracking database enables location monitoring.
Demonstrates ITs role in creating new opportunities for improved business performance Illustrates how technology can be a double-edged sword by providing benefits such as increased sales and security while compromising privacy.
4.3
2007 by Prentice Hall
Understanding Ethical and Social Issues Related to Systems In the past decade we have seen one of the most ethically challenged period in the history of global business. In the past, the employers used to pay for the legal defense of their employees but now they are encouraged to cooperate with the prosecutors to reduce charges against the firms. These development means that, as a manger or an employee, you will have to decide yourself what constitutes proper legal and ethical conduct
4.4
Understanding Ethical and Social Issues Related to Systems ETHICS- refers to the principle of right and wrong that, individual, acting as free moral agents, use to make choices to guide their behaviors. IS raise new ethical questions because they create opportunities for social change, and thus threaten existing distribution of power, money, rights and obligations.
4.5
Ethical, social and political issues are closely linked. A model for thinking about ethical, social, and political issues Five moral dimensions of the information age
Information rights and obligations-know how of information rights and obligations firms and individuals have Property rights and obligations-traditional intellectual property rights be protected in the digital world Accountability and control-who can and will be held accountable and liable for the harm done to individual and collectively System quality-data and system quality should we demand to protect individual rights and safety of society Quality of life-values to be preserved in the information world
4.6
2007 by Prentice Hall
The Relationship Between Ethical, Social, and Political Issues in an Information Society
The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control.
Figure 4-1
2007 by Prentice Hall
4.7
IMPACT
More organizations depend on computer systems for critical operations, which has increased the system errors and poor data quality
4.8
Think of all the ways you generate computer information about yourself-credit card purchases, bank statements, magazine subscriptions, telephone calls, government records etc; Companies with products to sell purchase relevant information to help them more finely target their marketing campaigns. The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called profiling. Nonobvious relationship awareness NORA
4.9
2007 by Prentice Hall
4.10
Ethical analysis
Known five step process should help in ethical analysis
Identify and describe the facts clearly Define the conflict or dilemma and identify the higher-order values involved Identify the stakeholders Identify the options you can reasonably take Identify the potential consequences of your options
4.12
4.13
4. Take the action that achieves the higher or greater value (the Utilitarian Principle). This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action. 5. Take the action that produces the least harm or the least potential cost (Risk Aversion Principle). Some actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area) or extremely high failure costs of moderate probability (speeding and automobile accidents). Avoid these high-failure-cost actions. 6. Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical no free lunch rule.)
4.14
4.15
4.16
4.17
4.18
Google and G-mail, chrome (web browser)Google has been scanning the contents of the messages through its free email service. Profiles re developed on individual users based on the content of their e-mails.
4.19
Technical solutions- P3P (Platform for Privacy Preferences)- automatic communication of privacy policies between an e-commerce site and the visitor.
Internet Explorer enable user to adjust their computers to screen out all cookies or let in selected cookies based on specific levels. E.g, the medium level accepts cookies from first party host sites that have opt in and opt out policies, but reject cookies that personally identifiable information without an opt-in policy.
4.20
4.21
Property rights: Intellectual property Trade secrets- any intellectual work product- a formula,
device, pattern or compilation of data- used for a business purpose. Software that contain unique elements, procedures, or compilations can be included as a trade secret Copyright-statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during his life plus an additional 70 years after his death.
4.22
4.23
As the publishers, authors are not held responsible for the content of the books etc;. Then should the software producers held accountable?
ATM software as service Telephone systems are not held liable for the messages they carry but the broadcasters and cable operators are subject to wide variety of restrictions and laws.
4.24
Though system errrors are reported widely but the common source of system failure is data quality where error rate ranges from 0.5 to 30 percent
4.25
Rapidity of change: Reduced response time to competition- efficient national and international markets Maintaining boundaries: Family, work, and leisure- work umbrella now extends far beyond the eight hour day. Dependence and vulnerability of businesses as are more reliant on information system.
4.26
Computer crime commission of an illegal act through the use of the computer or against the computer system.
Computer abuse- not illegal but unethical Spam- junk e-mail sent by individual or organization to a mass audience who are not interested in the product Employment: Trickle-down technology and reengineering job loss- redesigning the business processes could potentially cause millions of middle level managers and workers to lose their jobs
4.27
2007 by Prentice Hall
Equity and access: Increasing racial and social class gaps Health risks: RSI ( repetitive stress injury) - the single largest source of RS is computer keyboard Most common computer related RSI is carpal tunnel syndrome CTS wrist bone injury CVS (Computer vision syndrome), and Technostress- stress due to radiations of computer
4.28
This figure shows the major types of products and services hawked through spam e-mail messages and the industries that receive the most spam.
Figure 4-5
4.29
2007 by Prentice Hall