0% found this document useful (0 votes)
17 views37 pages

CH 04

The document discusses several ethical and social issues raised by information systems, including privacy concerns, data collection and analysis techniques, and principles of responsibility and accountability. It also covers regulations and laws around data use and privacy such as the EU's General Data Protection Regulation.

Uploaded by

Md Ali Ashraf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views37 pages

CH 04

The document discusses several ethical and social issues raised by information systems, including privacy concerns, data collection and analysis techniques, and principles of responsibility and accountability. It also covers regulations and laws around data use and privacy such as the EU's General Data Protection Regulation.

Uploaded by

Md Ali Ashraf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

Management Information Systems:

Managing the Digital Firm


Sixteenth Edition • Global Edition

Chapter 4
Ethical and Social Issues in
Information Systems

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Are Cars Becoming Big Brother on
Wheels? (1 of 2)
• Problem
– Opportunities from new technology
– Undeveloped legal environment
• Solutions
– Develop big data strategy
– Develop privacy policies
– Collect car-generated data
– Analyze car/driver data
– Smartphones, event data recorders
– In-car diagnostics/navigation/entertainment
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
Are Cars Becoming Big Brother on
Wheels? (2 of 2)
• Vehicle and driver monitoring systems
• Demonstrates how technological innovations can be a
double-edged sword
• Illustrates how I T systems create consumer benefits and
costs

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


What Ethical, Social, and Political
Issues are Raised by Information
Systems? (1 of 2)
• Recent cases of failed ethical judgment in business
– Wells Fargo, Deerfield Management, General Motors,
Takata Corporation
– In many, information systems used to bury decisions
from public scrutiny
• Ethics
– Principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their
behaviors
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
What Ethical, Social, and Political
Issues are Raised by Information
Systems? (2 of 2)
• Information systems raise new ethical questions because
they create opportunities for:
– Intense social change, threatening existing distributions
of power, money, rights, and obligations
• New opportunities for crime
• New kinds of crimes

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


A Model for Thinking About Ethical,
Social, and Political Issues
• Society as a calm pond
• I T as rock dropped in pond, creating ripples of new
situations not covered by old rules
• Social and political institutions cannot respond overnight to
these ripples—it may take years to develop etiquette,
expectations, laws
– Requires understanding of ethics to make choices in
legally gray areas

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Figure 4.1 The Relationship Between
Ethical, Social, and Political Issues in
an Information Society

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Five Moral Dimensions of the
Information Age
• Information rights and obligations - What information rights
do individuals and organizations possess with respect to
themselves? What can they protect?
• Property rights and obligations - How will traditional
intellectual property rights be protected in a digital society in
which tracing and accounting for ownership are difficult, and
ignoring such property rights is so easy?
• Accountability and control - Who can and will be held
accountable and liable for the harm done to individual and
collective information and property rights?

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Five Moral Dimensions of the
Information Age
• System quality - What standards of data and system quality
should we demand to protect individual rights and the safety of
society?
• Quality of life - What values should be preserved in an
information and knowledge-based society? Which institutions
should we protect from violation? Which cultural values and
practices does the new information technology support?

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Key Technology Trends That Raise
Ethical Issues
• Computing power doubles every 18 months
• Data storage costs rapidly decline
• Data analysis advances
• Networking advances
• Mobile device growth impact

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Advances in Data Analysis
Techniques
• Profiling
– Combining data from multiple sources to create
dossiers of detailed information on individuals
• Nonobvious relationship awareness (NO RA)
– Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Figure 4.2 Nonobvious Relationship
Awareness (NOR A)

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Basic Concepts: Responsibility,
Accountability, and Liability
• Responsibility
– Accepting the potential costs, duties, and obligations for
decisions
• Accountability
– Mechanisms for identifying responsible parties
• Liability
– Permits individuals (and firms) to recover damages done to
them
• Due process
– Laws are well-known and understood, with an ability to
appeal to higher authorities
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
Ethical Analysis
• Five-step process for ethical analysis
1. Identify and clearly describe the facts.
2. Define the conflict or dilemma and identify the higher-
order values involved.
3. Identify the stakeholders.
4. Identify the options that you can reasonably take.
5. Identify the potential consequences of your options.

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Candidate Ethical Principles (1 of 2)
• Golden Rule
– Do unto others as you would have them do unto you
• Immanuel Kant’s Categorical Imperative
– If an action is not right for everyone to take, it is not
right for anyone
• Slippery Slope Rule
– If an action cannot be taken repeatedly, it is not right to
take at all

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Candidate Ethical Principles (2 of 2)
• Utilitarian Principle
– Take the action that achieves the higher or greater
value
• Risk Aversion Principle
– Take the action that produces the least harm or
potential cost
• Ethical “No Free Lunch” Rule
– Assume that virtually all tangible and intangible objects
are owned by someone unless there is a specific
declaration otherwise

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Professional Codes of Conduct
• Promulgated by associations of professionals
– American Medical Association (AM A)
– American Bar Association (AB A)
– Association for Computing Machinery (AC M)
• Promises by professions to regulate themselves in the
general interest of society

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Real-World Ethical Dilemmas
• One set of interests pitted against another
• Examples
– Monitoring employees: Right of company to maximize
productivity of workers versus workers’ desire to use
Internet for short personal tasks
– Facebook monitors users and sells information to
advertisers and app developers

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Information Rights: Privacy and
Freedom in the Internet Age (1 of 3)
• Privacy
– Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state; claim to be able to control
information about yourself
• In the United States, privacy protected by:
– First Amendment (freedom of speech and association)
– Fourth Amendment (unreasonable search and seizure)
– Additional federal statues (e.g., Privacy Act of 1974)

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Information Rights: Privacy and
Freedom in the Internet Age (2 of 3)
• Fair information practices
– Set of principles governing the collection and use of
information
 Basis of most U.S. and European privacy laws
– Used to drive changes in privacy legislation
 C O PP A
 Gramm-Leach-Bliley Act
 HI PA A

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Information Rights: Privacy and
Freedom in the Internet Age (3 of 3)
• FT C F I P principles
– Notice/awareness (core principle)
– Choice/consent (core principle)
– Access/participation
– Security
– Enforcement

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


EU General Data Protection
Regulation (GDP R)
• Requires unambiguous explicit informed consent of
customer
• E U member nations cannot transfer personal data to
countries without similar privacy protection
– Applies across all E U countries to any firms operating
in E U or processing data on E U citizens or residents
– Strengthens right to be forgotten
• Privacy Shield: All countries processing E U data must
conform to G DP R requirements
• Heavy fines: 4% of global daily revenue
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
Internet Challenges to Privacy (1 of 2)
• Cookies
– Identify browser and track visits to site
– Super cookies (Flash cookies)
• Web beacons (web bugs)
– Tiny graphics embedded in e-mails and web pages
– Monitor who is reading email message or visiting site
• Spyware
– Surreptitiously installed on user’s computer
– May transmit user’s keystrokes or display unwanted
ads
• Google services and behavioral targeting
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
Internet Challenges to Privacy (2 of 2)
• The United States allows businesses to gather transaction
information and use this for other marketing purposes.
• Opt-out v s. opt-in model
• Online industry promotes self-regulation over privacy
legislation.
– Complex/ambiguous privacy statements
– Opt-out models selected over opt-in
– Online “seals” of privacy principles

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Figure 4.3 How Cookies Identify Web
Visitors

1. The Web server reads the user's Web browser and determines the operating system,
browser name, version number, Internet address, and other information.
2. The server transmits a tiny text file with user identification information called a cookie,
which the user's browser receives and stores on the user's computer.
3. When the user returns to the Web site, the server requests the contents of any cookie
it deposited previously in the user's computer.
4. The Web server reads the cookie, identifies the visitor, and calls up data on the user.
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
Technical Solutions
• Solutions include:
– Email encryption
– Anonymity tools
– Anti-spyware tools
• Overall, technical solutions have failed to protect users
from being tracked from one site to another
– Browser features
 “Private” browsing
 “Do not track” options

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Property Rights: Intellectual Property
• Intellectual property
– Tangible and intangible products of the mind created by
individuals or corporations
• Protected in four main ways:
– Copyright
– Patents
– Trademarks
– Trade secret

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Challenges to Intellectual Property
Rights
• Digital media different from physical media
– Ease of replication
– Ease of transmission (networks, Internet)
– Ease of alteration
– Compactness
– Difficulties in establishing uniqueness
• Digital Millennium Copyright Act (DM C A)

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Computer-Related Liability Problems
• If software fails, who is responsible?
• If seen as part of a machine that injures or harms, software
producer and operator may be liable
• If seen as similar to book, difficult to hold author/publisher
responsible
• If seen as a service, would this be similar to telephone
systems not being liable for transmitted messages?

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


System Quality: Data Quality and
System Errors
• What is an acceptable, technologically feasible level of
system quality?
– Flawless software is economically unfeasible
• Three principal sources of poor system performance
– Software bugs, errors
– Hardware or facility failures
– Poor input data quality (most common source of
business system failure)

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Quality of Life: Equity, Access,
Boundaries (1 of 3)
• Negative social consequences of systems
• Balancing power: center versus periphery
• Rapidity of change: reduced response time to competition
• Maintaining boundaries: family, work, and leisure
• Dependence and vulnerability
• Computer crime and abuse

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Quality of Life: Equity, Access,
Boundaries (2 of 3)
• Computer crime and abuse
– Computer crime
– Computer abuse
– Spam
– CAN-SPAM Act of 2003
• Employment
– Trickle-down technology
– Reengineering job loss

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Quality of Life: Equity, Access,
Boundaries (3 of 3)
• Equity and access
– The digital divide
• Health risks
– Repetitive stress injury (RS I)
– Carpal tunnel syndrome (CT S)
– Computer vision syndrome (CV S)
– Technostress

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Interactive Session: Organizations:
Will AI Kill Jobs?
• Class discussion
– Identify the problem described in this case study. In
what sense is it an ethical dilemma?
– Should more tasks be given to AI? Why or why not?
Explain your answer.
– Can the problem of AI reducing employment be
solved? Explain your answer.

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Interactive Session: Technology:
Volkswagen Pollutes its Reputation
• Class discussion
– Does the Volkswagen emission crisis pose an ethical
dilemma? Why or why not? If so, who are the
stakeholders?
– Describe the role of management, organization, and
technology factors in creating VW’s software cheating
problem. To what extent was management
responsible? Explain your answer.
– Should all software-controlling machines be available
for public inspection? Why or why not?

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


How Will MI S Help My Career?
• The Organization: Pinnacle Air Force Base
• Position Description: Junior privacy analyst
• Job Requirements
• Interview Questions
• Author Tips

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved


Copyright

This work is protected by United States copyright laws and is


provided solely for the use of instructors in teaching their
courses and assessing student learning. Dissemination or sale of
any part of this work (including on the World Wide Web) will
destroy the integrity of the work and is not permitted. The work
and materials from it should never be made available to students
except by instructors using the accompanying text in their
classes. All recipients of this work are expected to abide by these
restrictions and to honor the intended pedagogical purposes and
the needs of other instructors who rely on these materials.

Copyright © 2020 Pearson Education, Ltd. All Rights Reserved

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy