SlideShare una empresa de Scribd logo
1 de 22
Article 1-Currently, smartphone, web, and social networking
technology have been commonly used to promote patient-
centered treatment in the healthcare industry. Their
incorporation in this area, however, has led to ethical concerns
such as privacy and confidentiality arising (Denecke et al.,
2015). This is because it is easy to obtain private data from
patients across the internet, leaving it vulnerable to fraudulent
attacks and data breaches.
Article 2-Electronic Health Record (EHR) is one of the
emerging innovations being used to increase healthcare
efficiency. Besides, by streamlining the critical method, the
EHR has minimized healthcare-related expenses and removed
time wastage. Unfortunately, many risks have been introduced
through its broad use. Such threats require safety and secrecy as
personal details may be breached and misused if not managed or
protected properly (Ozair et al., 2015).
Article 3-Managing information in today's society poses the
question of data security and privacy. The recent political
events have exposed the impact of supervision by government-
affiliated agencies (Stahl et al., 2014). This has culminated in
increased friction among human rights and national security.
Data security is an advanced issue that has been closely
correlated with computing ethics. In terms of intellectual
property, this has created privacy issues.
Article 4-Patients with chronic patients who depend on correct
and complete information to enhance better treatment are
concerned. To avoid mistakes, patients exchange sensitive
details with healthcare professionals in the course of receiving
such services. This has posed, though, the issue of privacy. As a
consequence, it is uncertain who can disclose the information,
what kind of information should be shared, and who should
obtain those sensitive details from organizations or departments
(Ancker et al., 2015).
The question of privacy appears to be a dominant topic of the
four posts from the discussion above. As an ethical question,
privacy is often the topic of interest in diverse areas and
occupations concerning information management. The topics of
the articles endorse the topic in chapter 14 as they illustrate
privacy and secrecy of information technology as ethical
concerns. Chapter 14 speaks a lot regarding data security, and
all four papers have highlighted this related topic.
As they have introduced me to significant ethics problems
linked to information security, the posts are insightful and
educational. One of the ethical challenges that may bring
unintended and expensive consequences is protection. To instill
them with information technology expertise, my company has
implemented routine staff preparation. E.g., to produce a
plausible situation, the organization utilizes simulation, and
workers are expected to treat it to the best of knowledge. To
direct the process of handling crucial details, the organization
has also developed a rigorous code of ethics.
Ethical decisions are taken by individuals who control the effect
of their tasks. Responsibility is a central factor that ensures that
you consider the future risks, obligations, and responsibilities
of making your decisions. Accountability is part of the structure
and social structures and ensures the tools are formed to assess
who made a trustworthy step and who is liable (Wangmo et al.,
2019).
Information technology is becoming extremely relevant in
everyday life, as it poses many ethical problems. It is often met
with a lack of protection, anonymity, copyright, and several
other computer crimes. Since data innovation aids tremendously
pace, stream, and access to cybercrime, data has become a
growing career. Many organizations and associations face
becoming a digital victim every day when much, if not all, rely
on computerized arrangements (Wangmo et al., 2019).
Safety: One experiencing many cybercrimes including hackers
hacking their IP addresses and they can reach the user's
computer if they are linked to the network. This contributes to
high IT and financial theft if we try to pass some money hacker s
hack it and send the sums to hackers by disruption (Mahdi,
2020).
Increased pressure on IT experts: is raising the pressure on IT
experts since the computer technologies must operate every
time, otherwise, the quality and availability of those
information systems must be controlled. Many organizations
will stay by the IT team with any issues during the operation
every day. This strain could contribute to tension and job
overload, which affects and is incomplete (Mahdi, 2020).
Similar care of all employees is an indication of workplace
ethics. All should be handled fairly regardless of ethnicity,
gender, tradition, and lifestyle. There is therapy is known as
awareness training, encourages uniformity in an organization
and one example is social accountability. Consideration
includes looking after staff who have any personal issues. This
psychiatric condition would be taken care of by ethical business
people. They also perform awareness-raising activities and give
them participation in this therapy. Staff can have difficulties
that contribute to certain kinds of problems. Subsequently, they
need the ability to explain their situation and seek the assistance
they need (Mahdi, 2020).
IT for Management: On-Demand Strategies for Performance,
Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 14
Ethics, Privacy, and Sustainability
Learning Objectives (1 of 4)
2
Copyright ©2018 John Wiley & Sons, Inc.
IT Ethics
Predicting People’s Behavior
Predicting people’s behavior is big business, but companies may
face backlash from customers or be subject to investigations or
fines.
Mobile Apps and Risky Behaviors
93% top 200 free iOS & Andriod apps exhibited at least one
risky behavior.
Apple policy prohibits user information gathering without
permission, but countless 3rd party apps are unregulated.
3
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Apps and Risky Behavior
Risky Behaviors
Location tracking
Accessing the device’s address book or contact list
Identifying user or phone unique identifier (UDID)
Recording in-app purchases
Sharing data with ad networks and analytics companies
Twitter, Foursquare, and Instagram routinely gather information
from personal address books and other places on your phone.
4
Copyright ©2018 John Wiley & Sons, Inc.
Google Street View
Risky Behavior
Wardriving
Driving around sniffing out and mapping the physical location
of the world’s Wi-Fi routers (see Wi-Spy).
Open Wi-Fi Networks
Non-password protected routers that provide access over
wireless networks.
The FCC posted, “…collecting information sent over Wi-Fi
networks clearly infringes on consumer privacy.”
5
Copyright ©2018 John Wiley & Sons, Inc.
Additive Manufacturing Dilemmas
3D Printing
Depositing tiny layers of material to create computer-assisted
design and/or computer-assisted manufacturing blueprints.
Bioprinting
Using DNA to 3D print human body parts using bioprinting
technology.
6
Copyright ©2018 John Wiley & Sons, Inc.
IT Ethics
By avoiding illegal conduct, do companies also act responsibly?
Explain your Answer
What types of companies can benefit from predicting people’s
behavior?
When is predicting people’s behavior a violation of privacy?
Give an example.
When is predicting people’s behavior not a violation of privacy?
Give an example.
What are the ethical challenges attached to 3D printing and 3D
bioprinting?
Research the current debate about 3D printing and bioprinting.
7
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1. No. What is legal is not necessarily ethical or responsible.
Laws lag behind what is possible to do because laws change
slowly whereas technology changes rapidly.
2. Virtually any type. The most benefit is for those at the end of
the supply chain (retailers, etc.)
3. Answers may vary. Certainly when personal data upon which
the prediction relies are collected without consent, as appears
with Target, especially for those underage.
4. Answers may vary. It depends on the level of intrusiveness,
and that can be very subjective. One might argue that Canadian
Tire’s credit card business inherently has purchase information
and can analyze to determine risk of missed payments.
5. Answers may vary. There are many. They range from legal to
illegal activities (e.g., theft of intellectual property.) When
demand is high, will living and/or nonliving medical
organs/devices go to the highest bidder? Who is legally
responsible for ensuring the quality of the resulting organs and
devices? In some cases, 3D printing may be the only mechanism
to produce an item. 3D printing is costly. In cases where non-
additive manufacturing can do the same at less cost, which will
be used?
6. Answers will vary.
7
Learning Objectives (2 of 4)
8
Copyright ©2018 John Wiley & Sons, Inc.
Privacy and Civil Rights
Privacy
Right, or freedom of choice and control to self-determine what
information about you is made accessible, to whom, when, and
for what use or purpose.
Breach of Privacy
Unauthorized disclosure of personal information.
Privacy Paradox
Phenomenon where social users are concerned about privacy but
their behaviors contradict these concerns to an extreme degree.
9
Copyright ©2018 John Wiley & Sons, Inc.
Figure 14.2: Major Data Breaches Reported by 1,040 Adult
Americans in 2016 Pew Research Privacy and Security Study
10
Copyright ©2018 John Wiley & Sons, Inc.
Privacy Paradox: Social Recruitment
Social Recruitment
Use of social media to engage, share knowledge among, and
recruit and hire employees.
Often involving information the candidate did not want
considered (or is illegal) to use in the hiring process.
Typical recruitment includes all job levels:
11
Copyright ©2018 John Wiley & Sons, Inc.
Social Recruitment: Best Practices
Best practice provisions for recruiters:
Have either a third party or a designated person within the
company who does not make hiring decisions do the background
check.
Use only publicly available information. Do not friend someone
to get access to private information.
Do not request username or passwords for social media
accounts.
Recruiters are also social stalkers!
12
Copyright ©2018 John Wiley & Sons, Inc.
Civil Rights: Protected Classes
Civil Rights
Rights protected by federal law, such as freedom of speech,
press, and assembly; the right to vote, etc.
EEOC (Equal Employment Opportunity Commission)
Enforces federal laws prohibiting discrimination in
employment.
Protected classes
Characteristics identified by law that cannot be used in the
hiring process.
13
Copyright ©2018 John Wiley & Sons, Inc.
Civil Rights: Discrimination
Discrimination
Biased or prejudicial treatment in recruitment, hiring, or
employment based on certain characteristics, such as age,
gender, and genetic information, and is illegal in the United
States.
Corporate Social Media Discrimination
The use of protected class information to weed out candidates.
Social Media Discrimination
Visiting a person’s social media sites, however, clearly creates
the opportunity to view large amounts of information going
against these nondiscriminatory practices.
14
Copyright ©2018 John Wiley & Sons, Inc.
Civil Rights: Negligent Hiring
Competing Legal Concerns
Two competing legal concerns are discrimination & negligent
hiring.
Negligent Hiring
If a workplace violence incident occurred and the attacker’s
public social networking profile contained information that
could have predicted that behavior, the employer may be held
liable for negligence in not using readily available information
during the hiring decision.
15
Copyright ©2018 John Wiley & Sons, Inc.
Reducing Risk of Negligent Hiring
Ask candidates to sign a disclosure statement
Allow self-disclosure
Create a standard process and document it
Consistent well-documented processes
Avoid coercive practices
Eliminate recruiter pressure for applicant disclosure
Training
Emphasize related compliance
16
Copyright ©2018 John Wiley & Sons, Inc.
16
Privacy Paradox, Privacy, and Civil Rights
Describe privacy.
What is the phenomenon where social users are concerned about
privacy but their behaviors contradict these concerns?
What is the use of social media to find, screen, and select job
candidates?
Rejecting a job candidate because of concerns about the
person’s health from information on his or her Facebook page is
an example of what?
Age, disability, gender, religion, and race are examples of
what?
Why are the legal concepts of discrimination and negligent
hiring competing demands on a business?
17
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1. Privacy is the right to self-determine what information about
you is made accessible, to whom, when, and for what use or
purpose. Privacy means we have freedom of choice and control
over our personal information, including what we do not want
shared with or used by others.
2. The privacy paradox refers to this phenomenon where social
users are concerned about privacy but their behaviors contradict
these concerns to an extreme degree. Users of social sites often
claim that they are concerned about their privacy. At the same
time, they disclose their highly personal lives, even content that
is incriminating or illegal, in their profiles or posts.
3. Social recruitment refers to use of social media to find,
screen, and select job candidates. Often it involves searching
information the job candidate did not want considered or that is
illegal to use in the hiring process.
4. This is an example of corporate social media discrimination.
5. Protected classes.
6. Two competing legal concerns are discrimination and
negligent hiring. These put pressure on prospective employers
to find out what they can about a potential employee, to avoid
negligence in hiring, yet not cross the line into discrimination.
Discrimination. Most employers have stringent employment
policies that prevent their recruiters and hiring managers from
learning potentially discriminatory information about
candidates. Visiting a person’s social media sites, however,
clearly creates the opportunity to view large amounts of
information going against these nondiscriminatory practices.
Negligent hiring. Employers must consider the potential risk of
a negligent hiring or negligent retention lawsuit related to
social networking profile information. It is possible that if a
workplace violence incident occurred and the attacker’s public
social networking profile contained information that could have
predicted that behavior, the employer may be held liable for
negligence in not using readily available information during the
hiring decision.
17
Learning Objectives (3 of 4)
18
Copyright ©2018 John Wiley & Sons, Inc.
Technology Addictions: Cognitive Overload
Cognitive Overload
Interferes with our ability to focus and be productive.
Potential modern causes:
Mobile apps
Wearable technology
Constant updates
Desire to stay connected
50% of American teens suffer from Fear Of Missing Out
(FOMO)
19
Copyright ©2018 John Wiley & Sons, Inc.
Focus Management
Being Able to Focus Counts
An inability to concentrate for longer periods reduces an ability
to distinguish important information from trivia.
Some researchers estimate that distraction costs hundreds of
billions of dollars a year in lost productivity.
Heavy online users (media high multitaskers) scored poorly on
cognitive tests.
20
Copyright ©2018 John Wiley & Sons, Inc.
Focus Recovery
Lost focus can take about 25 minutes recovery time.
Noradrenaline, a chemical that helps us concentrate, is released
by focusing.
The best strategy to improve focus: practice doing it.
There is disagreement if multitaskers are working as well as
they could, or they could improve their focus.
21
Copyright ©2018 John Wiley & Sons, Inc.
Technology Addictions and Focus Management
What are several potential causes of cognitive overload?
What are the consequences of constant distractions?
When a person is distracted, how long does it take to return to
the task at hand and get focused again?
Why are senior managers interested in focus management?
What is the difference between the performance of high and low
multitaskers on cognitive tests?
How can multitaskers improve their ability to focus?
22
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1. Tweets, texts, e-mail, social media, and annoying electronic
static are potential causes.
2. Distractions cause a loss of focus and a loss of productivity.
3. Gloria Mark, a professor of informatics at the University of
California, Irvine, says a worker distracted by a Web search that
goes rogue or a new text or tweet can take about 25 minutes to
return to the task at hand and get focused again (Dumaine,
2014).
4. To improve creativity and productivity. If your mind is free
of distraction, your mind is better able to absorb data,
interactions, and trends and synthesize the new information with
what you already know. As a result, you are more likely to come
up with innovative ideas.
5. In contrast to widely held assumptions, subjects who were
Media (high) multitaskers scored poorly on cognitive tests.
6. The best strategy to improve focus is to practice doing it.
22
Learning Objectives (4 of 4)
23
Copyright ©2018 John Wiley & Sons, Inc.
23
ICT and Sustainable Development
Being profit-motivated without concern for damage to the
environment is unacceptable.
Companies should conduct themselves in an ethical, socially
responsible, and environmentally sustainable manner.
The IT industry sector is called the Information and
Communications Technology, or ICT, in emissions reports.
24
Copyright ©2018 John Wiley & Sons, Inc.
Figure 14.1: The 4 R’s of environmental sustainability
24
IT and Global Warming
Global warming refers to the upward trend in Global Mean
Temperature (GMT).
This is driven by the greenhouse effect, which is the holding of
heat within the earth’s atmosphere.
Carbon emissions directly contribute to the greenhouse effect.
25
Copyright ©2018 John Wiley & Sons, Inc.
Figure 14.1: The 4 R’s of environmental sustainability
25
Global Warming IT Sector Actions
McKinsey & Company conclude the following:
IT sector’s own footprint of 2 percent of global emissions could
double by 2020 because of increased use of tablets,
smartphones, apps, and services.
IT sector must continue to reduce emissions from data centers,
telecom networks, and the manufacture and use of its products.
IT has the unique ability to monitor and maximize energy
efficiency both within and outside of its own industry sector to
cut CO2 emissions by up to 5 times this amount.
26
Copyright ©2018 John Wiley & Sons, Inc.
Sustainability Through Climate Change Mitigation
Every IT user, enterprise, and nation plays a role in climate
change mitigation.
Wired and mobile networks enable limitless data creation and
consumption
Energy used to power data centers, cell towers, base stations,
and recharge devices is damaging the environment and depleting
natural resources.
Innovative sustainability initiatives hold the key to curbing
these emissions and carbon footprint, thereby reducing
environmental impact.
27
Copyright ©2018 John Wiley & Sons, Inc.
Technology to Transform Business and Society
People hold the power to shape and apply technology to create
positive change, improve lives and transform business and
society.
Accenture’s Technology Vision 2017 is an analysis of key IT
trends that are expected to disrupt business and society over the
next three years.
According to Vision 2017, taking a people first approach by
empowering people with more human technology will allow
organizations to improve performance by redefining their
relationship with customers and employees from provider to
partner.
28
Copyright ©2018 John Wiley & Sons, Inc.
Top Five Disruptive Technologies 2015-2017Vision 2015Vision
2016Vision 2017Internet of MeIntelligent AutomationArtificial
Intelligence as the new User InterfaceOutcome EconomyLiquid
WorkforceDesign for HumansPlatform EvoluationPlatform
EconomyEcosystems as MacrocosmsIntelligent
EnterprisePredictable DisruptionWorkforce
MarketplaceWorkplace ReimaginedDigital TrustThe Uncharted
29
Copyright ©2018 John Wiley & Sons, Inc.
Top Five Disruptive Technologies (1 of 2)
AI is the new UI
AI is becoming the new user interface (UI), underpinning the
way we transact and interact with systems.
AI will revolutionize the way businesses gain information from
and interact with customers.
Design for Humans
Technology design decisions are being made by humans, for
humans.
Organizations need to understand not only where people are
today, but also where they want to be.
30
Copyright ©2018 John Wiley & Sons, Inc.
Top Five Disruptive Technologies (2 of 2)
Ecosystems as Macrocosms.
Digital ecosystems are transforming the way organizations
deliver value.
Workforce Marketplace.
Companies are dissolving traditional hierarchies and replacing
them with talent marketplaces of independent freelance workers.
The Uncharted.
Businesses must delve into uncharted territory, seizing
opportunities to establish rules and standards for entirely new
industries.
31
Copyright ©2018 John Wiley & Sons, Inc.
The Next Wave of Disruption
Next…More Disruptive Disruption
High-performing business leaders now accept that their
organizations’ future success is tied to their ability to keep pace
with technology.
Technology is more important than ever to their business
success.
Biggest IT innovations will not be in the technology tools
themselves, but in how they are designed with people in mind.
A people first approach is the key to any organization’s digital
success.
32
Copyright ©2018 John Wiley & Sons, Inc.
ICT and Sustainable Development
Why do some experts warn that carbon emission reductions
between 50 percent and 85 percent are necessary by 2050?
What contributes to the rise of global mean temperature?
What is the greenhouse effect?
How does the use of mobile devices contribute to the level of
greenhouse gases?
What is ICT’s role in global warming?
Why is global warming hotly debated?
What is the role of IT in sustainable development?
Why is it important for organizations to take a people first
approach to IT?
33
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
Carbon emission reductions between 50 percent and 85 percent
are necessary by 2050 to prevent the global temperature from
rising too much too fast because of the greenhouse effect.
Increases in CO2 resulting from human activities that generate
carbon emissions have thrown the earth’s natural carbon cycle
off balance, increasing global temperatures and changing the
planet’s climate. Climatologists estimated that countries must
keep the global mean temperature (GMT) from rising by more
than 2°C (3.6°F) above the preindustrial GMT in order to avoid
profound damage to life on the earth. Damage includes water
and food scarcity, rising sea levels, and greater incidence and
severity of disease.
The greenhouse effect is the holding of heat within the earth’s
atmosphere. CO2 and other greenhouse gases (GHGs) trap the
sun’s heat with-in the earth’s atmosphere, warming it and
keeping it at habitable temperatures.
The surge in energy used to power data centers, cell towers,
base stations, and recharge devices, all of which support mobile
devices, is damaging the environment and depleting natural
resources.
ICT plays a key role in reducing global warming. Transforming
the way people and businesses use IT could reduce annual
human-generated global emissions by 15 percent by 2020 and
deliver energy efficiency savings to global businesses of over
500 billion euros, or $800 billion U.S. And using social media,
for example, to inform consumers of the grams (g) of carbon
emissions associated with the products they buy could change
buyer behavior and ultimately have a positive eco-effect.
Many scientists and experts are extremely alarmed by global
warming and climate change, but other experts outright deny
that they are occurring.
Every IT user, enterprise, and nation plays a role in climate
change mitigation. Climate change mitigation is any action to
limit the magnitude of long-term cli-mate change. Examples of
mitigation include switching to low-carbon renewable energy
sources and reducing the amount of energy consumed by power
stations by increasing their efficiency.
According to Accenture’s Vision 2017, taking a people first
approach by empowering people with more human technology
will allow organizations to improve performance by redefining
their relationship with customers and employees from provider
to partner. This will require organizations to change the way
they develop their business models and provide technology that
support them to promote social responsibility.
33
Copyright
Copyright © 2018 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work
beyond that permitted in Section 117 of the 1976 United States
Act without the express written permission of the copyright
owner is unlawful. Request for further information should be
addressed to the Permissions Department, John Wiley & Sons,
Inc. The purchaser may make back-up copies for his/her own
use only and not for distribution or resale. The Publisher
assumes no responsibility for errors, omissions, or damages,
caused by the use of these programs or from the use of the
information contained herein.
34
Copyright ©2018 John Wiley & Sons, Inc.
34

Más contenido relacionado

La actualidad más candente

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...Tonmoy zahid Rishad
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...J. David Morris
 

La actualidad más candente (18)

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Review questions
Review questionsReview questions
Review questions
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
 

Similar a Article 1 currently, smartphone, web, and social networking techno

Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdfAroraRajinder1
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Readnicolleszkyj
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 

Similar a Article 1 currently, smartphone, web, and social networking techno (13)

Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 

Más de honey690131

PaperSelect one of the quality topics in healthcare from th.docx
PaperSelect one of the quality topics in healthcare from th.docxPaperSelect one of the quality topics in healthcare from th.docx
PaperSelect one of the quality topics in healthcare from th.docxhoney690131
 
Part 1 - Microsoft AccessView GlossaryUse Access to create a.docx
Part 1 - Microsoft AccessView GlossaryUse Access to create a.docxPart 1 - Microsoft AccessView GlossaryUse Access to create a.docx
Part 1 - Microsoft AccessView GlossaryUse Access to create a.docxhoney690131
 
Part 1 - Microsoft Access 2019Use Access to create a database to.docx
Part 1 - Microsoft Access 2019Use Access to create a database to.docxPart 1 - Microsoft Access 2019Use Access to create a database to.docx
Part 1 - Microsoft Access 2019Use Access to create a database to.docxhoney690131
 
ParkinsonsPathophysiology, progression of disease, complication.docx
ParkinsonsPathophysiology, progression of disease, complication.docxParkinsonsPathophysiology, progression of disease, complication.docx
ParkinsonsPathophysiology, progression of disease, complication.docxhoney690131
 
Parenting Practices among DepressedMothers in the Child Welf.docx
Parenting Practices among DepressedMothers in the Child Welf.docxParenting Practices among DepressedMothers in the Child Welf.docx
Parenting Practices among DepressedMothers in the Child Welf.docxhoney690131
 
Parental InfluencesMerging science and business, selective bre.docx
Parental InfluencesMerging science and business, selective bre.docxParental InfluencesMerging science and business, selective bre.docx
Parental InfluencesMerging science and business, selective bre.docxhoney690131
 
Paragraph Structure with Use of Text(P) Topic Sentence-(I).docx
Paragraph Structure with Use of Text(P) Topic Sentence-(I).docxParagraph Structure with Use of Text(P) Topic Sentence-(I).docx
Paragraph Structure with Use of Text(P) Topic Sentence-(I).docxhoney690131
 
Paper should explain the difficulties on the Use of government trave.docx
Paper should explain the difficulties on the Use of government trave.docxPaper should explain the difficulties on the Use of government trave.docx
Paper should explain the difficulties on the Use of government trave.docxhoney690131
 
paper should be between 750 – 1500 words. APA formatting is required.docx
paper should be between 750 – 1500 words. APA formatting is required.docxpaper should be between 750 – 1500 words. APA formatting is required.docx
paper should be between 750 – 1500 words. APA formatting is required.docxhoney690131
 
Paper Requirements 4 pages (including title page, 2 pages .docx
Paper Requirements 4 pages (including title page, 2 pages .docxPaper Requirements 4 pages (including title page, 2 pages .docx
Paper Requirements 4 pages (including title page, 2 pages .docxhoney690131
 
Paper RequirementsRequired topic headings for your paper shou.docx
Paper RequirementsRequired topic headings for your paper shou.docxPaper RequirementsRequired topic headings for your paper shou.docx
Paper RequirementsRequired topic headings for your paper shou.docxhoney690131
 
Paper must be double spaced, with 12 point font and include section .docx
Paper must be double spaced, with 12 point font and include section .docxPaper must be double spaced, with 12 point font and include section .docx
Paper must be double spaced, with 12 point font and include section .docxhoney690131
 
Paper OrganizationStart with a title page and organize your pa.docx
Paper OrganizationStart with a title page and organize your pa.docxPaper OrganizationStart with a title page and organize your pa.docx
Paper OrganizationStart with a title page and organize your pa.docxhoney690131
 
Paper on topic  Date visualization A critical evaluation of its ar.docx
Paper on topic  Date visualization A critical evaluation of its ar.docxPaper on topic  Date visualization A critical evaluation of its ar.docx
Paper on topic  Date visualization A critical evaluation of its ar.docxhoney690131
 
PAPER EXPECTATIONSFollow the instructions.Make your ideas .docx
PAPER EXPECTATIONSFollow the instructions.Make your ideas .docxPAPER EXPECTATIONSFollow the instructions.Make your ideas .docx
PAPER EXPECTATIONSFollow the instructions.Make your ideas .docxhoney690131
 
Paper Instructions 5) Paper should be 5-7 pages (excluding title pag.docx
Paper Instructions 5) Paper should be 5-7 pages (excluding title pag.docxPaper Instructions 5) Paper should be 5-7 pages (excluding title pag.docx
Paper Instructions 5) Paper should be 5-7 pages (excluding title pag.docxhoney690131
 
Paper format and information4-5 pages in length.Papers mu.docx
Paper format and information4-5 pages in length.Papers mu.docxPaper format and information4-5 pages in length.Papers mu.docx
Paper format and information4-5 pages in length.Papers mu.docxhoney690131
 
Paper in Health care quality management strategies - recent arti.docx
Paper in Health care quality management strategies - recent arti.docxPaper in Health care quality management strategies - recent arti.docx
Paper in Health care quality management strategies - recent arti.docxhoney690131
 
Paper 2 Assignment POT 2002.Assignment Write a 1000 wor.docx
Paper 2 Assignment POT 2002.Assignment Write a 1000 wor.docxPaper 2 Assignment POT 2002.Assignment Write a 1000 wor.docx
Paper 2 Assignment POT 2002.Assignment Write a 1000 wor.docxhoney690131
 
Paper detailsUnit 4 Discussion Prompt1. What is the .docx
Paper detailsUnit 4 Discussion Prompt1. What is the .docxPaper detailsUnit 4 Discussion Prompt1. What is the .docx
Paper detailsUnit 4 Discussion Prompt1. What is the .docxhoney690131
 

Más de honey690131 (20)

PaperSelect one of the quality topics in healthcare from th.docx
PaperSelect one of the quality topics in healthcare from th.docxPaperSelect one of the quality topics in healthcare from th.docx
PaperSelect one of the quality topics in healthcare from th.docx
 
Part 1 - Microsoft AccessView GlossaryUse Access to create a.docx
Part 1 - Microsoft AccessView GlossaryUse Access to create a.docxPart 1 - Microsoft AccessView GlossaryUse Access to create a.docx
Part 1 - Microsoft AccessView GlossaryUse Access to create a.docx
 
Part 1 - Microsoft Access 2019Use Access to create a database to.docx
Part 1 - Microsoft Access 2019Use Access to create a database to.docxPart 1 - Microsoft Access 2019Use Access to create a database to.docx
Part 1 - Microsoft Access 2019Use Access to create a database to.docx
 
ParkinsonsPathophysiology, progression of disease, complication.docx
ParkinsonsPathophysiology, progression of disease, complication.docxParkinsonsPathophysiology, progression of disease, complication.docx
ParkinsonsPathophysiology, progression of disease, complication.docx
 
Parenting Practices among DepressedMothers in the Child Welf.docx
Parenting Practices among DepressedMothers in the Child Welf.docxParenting Practices among DepressedMothers in the Child Welf.docx
Parenting Practices among DepressedMothers in the Child Welf.docx
 
Parental InfluencesMerging science and business, selective bre.docx
Parental InfluencesMerging science and business, selective bre.docxParental InfluencesMerging science and business, selective bre.docx
Parental InfluencesMerging science and business, selective bre.docx
 
Paragraph Structure with Use of Text(P) Topic Sentence-(I).docx
Paragraph Structure with Use of Text(P) Topic Sentence-(I).docxParagraph Structure with Use of Text(P) Topic Sentence-(I).docx
Paragraph Structure with Use of Text(P) Topic Sentence-(I).docx
 
Paper should explain the difficulties on the Use of government trave.docx
Paper should explain the difficulties on the Use of government trave.docxPaper should explain the difficulties on the Use of government trave.docx
Paper should explain the difficulties on the Use of government trave.docx
 
paper should be between 750 – 1500 words. APA formatting is required.docx
paper should be between 750 – 1500 words. APA formatting is required.docxpaper should be between 750 – 1500 words. APA formatting is required.docx
paper should be between 750 – 1500 words. APA formatting is required.docx
 
Paper Requirements 4 pages (including title page, 2 pages .docx
Paper Requirements 4 pages (including title page, 2 pages .docxPaper Requirements 4 pages (including title page, 2 pages .docx
Paper Requirements 4 pages (including title page, 2 pages .docx
 
Paper RequirementsRequired topic headings for your paper shou.docx
Paper RequirementsRequired topic headings for your paper shou.docxPaper RequirementsRequired topic headings for your paper shou.docx
Paper RequirementsRequired topic headings for your paper shou.docx
 
Paper must be double spaced, with 12 point font and include section .docx
Paper must be double spaced, with 12 point font and include section .docxPaper must be double spaced, with 12 point font and include section .docx
Paper must be double spaced, with 12 point font and include section .docx
 
Paper OrganizationStart with a title page and organize your pa.docx
Paper OrganizationStart with a title page and organize your pa.docxPaper OrganizationStart with a title page and organize your pa.docx
Paper OrganizationStart with a title page and organize your pa.docx
 
Paper on topic  Date visualization A critical evaluation of its ar.docx
Paper on topic  Date visualization A critical evaluation of its ar.docxPaper on topic  Date visualization A critical evaluation of its ar.docx
Paper on topic  Date visualization A critical evaluation of its ar.docx
 
PAPER EXPECTATIONSFollow the instructions.Make your ideas .docx
PAPER EXPECTATIONSFollow the instructions.Make your ideas .docxPAPER EXPECTATIONSFollow the instructions.Make your ideas .docx
PAPER EXPECTATIONSFollow the instructions.Make your ideas .docx
 
Paper Instructions 5) Paper should be 5-7 pages (excluding title pag.docx
Paper Instructions 5) Paper should be 5-7 pages (excluding title pag.docxPaper Instructions 5) Paper should be 5-7 pages (excluding title pag.docx
Paper Instructions 5) Paper should be 5-7 pages (excluding title pag.docx
 
Paper format and information4-5 pages in length.Papers mu.docx
Paper format and information4-5 pages in length.Papers mu.docxPaper format and information4-5 pages in length.Papers mu.docx
Paper format and information4-5 pages in length.Papers mu.docx
 
Paper in Health care quality management strategies - recent arti.docx
Paper in Health care quality management strategies - recent arti.docxPaper in Health care quality management strategies - recent arti.docx
Paper in Health care quality management strategies - recent arti.docx
 
Paper 2 Assignment POT 2002.Assignment Write a 1000 wor.docx
Paper 2 Assignment POT 2002.Assignment Write a 1000 wor.docxPaper 2 Assignment POT 2002.Assignment Write a 1000 wor.docx
Paper 2 Assignment POT 2002.Assignment Write a 1000 wor.docx
 
Paper detailsUnit 4 Discussion Prompt1. What is the .docx
Paper detailsUnit 4 Discussion Prompt1. What is the .docxPaper detailsUnit 4 Discussion Prompt1. What is the .docx
Paper detailsUnit 4 Discussion Prompt1. What is the .docx
 

Último

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Último (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Article 1 currently, smartphone, web, and social networking techno

  • 1. Article 1-Currently, smartphone, web, and social networking technology have been commonly used to promote patient- centered treatment in the healthcare industry. Their incorporation in this area, however, has led to ethical concerns such as privacy and confidentiality arising (Denecke et al., 2015). This is because it is easy to obtain private data from patients across the internet, leaving it vulnerable to fraudulent attacks and data breaches. Article 2-Electronic Health Record (EHR) is one of the emerging innovations being used to increase healthcare efficiency. Besides, by streamlining the critical method, the EHR has minimized healthcare-related expenses and removed time wastage. Unfortunately, many risks have been introduced through its broad use. Such threats require safety and secrecy as personal details may be breached and misused if not managed or protected properly (Ozair et al., 2015). Article 3-Managing information in today's society poses the question of data security and privacy. The recent political events have exposed the impact of supervision by government- affiliated agencies (Stahl et al., 2014). This has culminated in increased friction among human rights and national security. Data security is an advanced issue that has been closely correlated with computing ethics. In terms of intellectual property, this has created privacy issues. Article 4-Patients with chronic patients who depend on correct and complete information to enhance better treatment are concerned. To avoid mistakes, patients exchange sensitive details with healthcare professionals in the course of receiving such services. This has posed, though, the issue of privacy. As a consequence, it is uncertain who can disclose the information, what kind of information should be shared, and who should obtain those sensitive details from organizations or departments (Ancker et al., 2015). The question of privacy appears to be a dominant topic of the
  • 2. four posts from the discussion above. As an ethical question, privacy is often the topic of interest in diverse areas and occupations concerning information management. The topics of the articles endorse the topic in chapter 14 as they illustrate privacy and secrecy of information technology as ethical concerns. Chapter 14 speaks a lot regarding data security, and all four papers have highlighted this related topic. As they have introduced me to significant ethics problems linked to information security, the posts are insightful and educational. One of the ethical challenges that may bring unintended and expensive consequences is protection. To instill them with information technology expertise, my company has implemented routine staff preparation. E.g., to produce a plausible situation, the organization utilizes simulation, and workers are expected to treat it to the best of knowledge. To direct the process of handling crucial details, the organization has also developed a rigorous code of ethics. Ethical decisions are taken by individuals who control the effect of their tasks. Responsibility is a central factor that ensures that you consider the future risks, obligations, and responsibilities of making your decisions. Accountability is part of the structure and social structures and ensures the tools are formed to assess who made a trustworthy step and who is liable (Wangmo et al., 2019). Information technology is becoming extremely relevant in everyday life, as it poses many ethical problems. It is often met with a lack of protection, anonymity, copyright, and several other computer crimes. Since data innovation aids tremendously pace, stream, and access to cybercrime, data has become a growing career. Many organizations and associations face becoming a digital victim every day when much, if not all, rely on computerized arrangements (Wangmo et al., 2019). Safety: One experiencing many cybercrimes including hackers hacking their IP addresses and they can reach the user's
  • 3. computer if they are linked to the network. This contributes to high IT and financial theft if we try to pass some money hacker s hack it and send the sums to hackers by disruption (Mahdi, 2020). Increased pressure on IT experts: is raising the pressure on IT experts since the computer technologies must operate every time, otherwise, the quality and availability of those information systems must be controlled. Many organizations will stay by the IT team with any issues during the operation every day. This strain could contribute to tension and job overload, which affects and is incomplete (Mahdi, 2020). Similar care of all employees is an indication of workplace ethics. All should be handled fairly regardless of ethnicity, gender, tradition, and lifestyle. There is therapy is known as awareness training, encourages uniformity in an organization and one example is social accountability. Consideration includes looking after staff who have any personal issues. This psychiatric condition would be taken care of by ethical business people. They also perform awareness-raising activities and give them participation in this therapy. Staff can have difficulties that contribute to certain kinds of problems. Subsequently, they need the ability to explain their situation and seek the assistance they need (Mahdi, 2020). IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability Eleventh Edition Turban, Pollard, Wood Chapter 14 Ethics, Privacy, and Sustainability
  • 4. Learning Objectives (1 of 4) 2 Copyright ©2018 John Wiley & Sons, Inc. IT Ethics Predicting People’s Behavior Predicting people’s behavior is big business, but companies may face backlash from customers or be subject to investigations or fines. Mobile Apps and Risky Behaviors 93% top 200 free iOS & Andriod apps exhibited at least one risky behavior. Apple policy prohibits user information gathering without permission, but countless 3rd party apps are unregulated. 3 Copyright ©2018 John Wiley & Sons, Inc. Mobile Apps and Risky Behavior Risky Behaviors Location tracking Accessing the device’s address book or contact list Identifying user or phone unique identifier (UDID) Recording in-app purchases Sharing data with ad networks and analytics companies Twitter, Foursquare, and Instagram routinely gather information from personal address books and other places on your phone. 4 Copyright ©2018 John Wiley & Sons, Inc.
  • 5. Google Street View Risky Behavior Wardriving Driving around sniffing out and mapping the physical location of the world’s Wi-Fi routers (see Wi-Spy). Open Wi-Fi Networks Non-password protected routers that provide access over wireless networks. The FCC posted, “…collecting information sent over Wi-Fi networks clearly infringes on consumer privacy.” 5 Copyright ©2018 John Wiley & Sons, Inc. Additive Manufacturing Dilemmas 3D Printing Depositing tiny layers of material to create computer-assisted design and/or computer-assisted manufacturing blueprints. Bioprinting Using DNA to 3D print human body parts using bioprinting technology. 6 Copyright ©2018 John Wiley & Sons, Inc. IT Ethics By avoiding illegal conduct, do companies also act responsibly? Explain your Answer What types of companies can benefit from predicting people’s
  • 6. behavior? When is predicting people’s behavior a violation of privacy? Give an example. When is predicting people’s behavior not a violation of privacy? Give an example. What are the ethical challenges attached to 3D printing and 3D bioprinting? Research the current debate about 3D printing and bioprinting. 7 Copyright ©2018 John Wiley & Sons, Inc. Suggested Answers: 1. No. What is legal is not necessarily ethical or responsible. Laws lag behind what is possible to do because laws change slowly whereas technology changes rapidly. 2. Virtually any type. The most benefit is for those at the end of the supply chain (retailers, etc.) 3. Answers may vary. Certainly when personal data upon which the prediction relies are collected without consent, as appears with Target, especially for those underage. 4. Answers may vary. It depends on the level of intrusiveness, and that can be very subjective. One might argue that Canadian Tire’s credit card business inherently has purchase information and can analyze to determine risk of missed payments. 5. Answers may vary. There are many. They range from legal to illegal activities (e.g., theft of intellectual property.) When demand is high, will living and/or nonliving medical organs/devices go to the highest bidder? Who is legally responsible for ensuring the quality of the resulting organs and
  • 7. devices? In some cases, 3D printing may be the only mechanism to produce an item. 3D printing is costly. In cases where non- additive manufacturing can do the same at less cost, which will be used? 6. Answers will vary. 7 Learning Objectives (2 of 4) 8 Copyright ©2018 John Wiley & Sons, Inc. Privacy and Civil Rights Privacy Right, or freedom of choice and control to self-determine what information about you is made accessible, to whom, when, and for what use or purpose. Breach of Privacy Unauthorized disclosure of personal information. Privacy Paradox Phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree. 9 Copyright ©2018 John Wiley & Sons, Inc. Figure 14.2: Major Data Breaches Reported by 1,040 Adult Americans in 2016 Pew Research Privacy and Security Study
  • 8. 10 Copyright ©2018 John Wiley & Sons, Inc. Privacy Paradox: Social Recruitment Social Recruitment Use of social media to engage, share knowledge among, and recruit and hire employees. Often involving information the candidate did not want considered (or is illegal) to use in the hiring process. Typical recruitment includes all job levels: 11 Copyright ©2018 John Wiley & Sons, Inc. Social Recruitment: Best Practices Best practice provisions for recruiters: Have either a third party or a designated person within the company who does not make hiring decisions do the background check. Use only publicly available information. Do not friend someone to get access to private information. Do not request username or passwords for social media accounts. Recruiters are also social stalkers! 12 Copyright ©2018 John Wiley & Sons, Inc.
  • 9. Civil Rights: Protected Classes Civil Rights Rights protected by federal law, such as freedom of speech, press, and assembly; the right to vote, etc. EEOC (Equal Employment Opportunity Commission) Enforces federal laws prohibiting discrimination in employment. Protected classes Characteristics identified by law that cannot be used in the hiring process. 13 Copyright ©2018 John Wiley & Sons, Inc. Civil Rights: Discrimination Discrimination Biased or prejudicial treatment in recruitment, hiring, or employment based on certain characteristics, such as age, gender, and genetic information, and is illegal in the United States. Corporate Social Media Discrimination The use of protected class information to weed out candidates. Social Media Discrimination Visiting a person’s social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices. 14 Copyright ©2018 John Wiley & Sons, Inc.
  • 10. Civil Rights: Negligent Hiring Competing Legal Concerns Two competing legal concerns are discrimination & negligent hiring. Negligent Hiring If a workplace violence incident occurred and the attacker’s public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision. 15 Copyright ©2018 John Wiley & Sons, Inc. Reducing Risk of Negligent Hiring Ask candidates to sign a disclosure statement Allow self-disclosure Create a standard process and document it Consistent well-documented processes Avoid coercive practices Eliminate recruiter pressure for applicant disclosure Training Emphasize related compliance 16 Copyright ©2018 John Wiley & Sons, Inc. 16
  • 11. Privacy Paradox, Privacy, and Civil Rights Describe privacy. What is the phenomenon where social users are concerned about privacy but their behaviors contradict these concerns? What is the use of social media to find, screen, and select job candidates? Rejecting a job candidate because of concerns about the person’s health from information on his or her Facebook page is an example of what? Age, disability, gender, religion, and race are examples of what? Why are the legal concepts of discrimination and negligent hiring competing demands on a business? 17 Copyright ©2018 John Wiley & Sons, Inc. Suggested Answers: 1. Privacy is the right to self-determine what information about you is made accessible, to whom, when, and for what use or purpose. Privacy means we have freedom of choice and control over our personal information, including what we do not want shared with or used by others. 2. The privacy paradox refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree. Users of social sites often claim that they are concerned about their privacy. At the same time, they disclose their highly personal lives, even content that is incriminating or illegal, in their profiles or posts. 3. Social recruitment refers to use of social media to find, screen, and select job candidates. Often it involves searching information the job candidate did not want considered or that is
  • 12. illegal to use in the hiring process. 4. This is an example of corporate social media discrimination. 5. Protected classes. 6. Two competing legal concerns are discrimination and negligent hiring. These put pressure on prospective employers to find out what they can about a potential employee, to avoid negligence in hiring, yet not cross the line into discrimination. Discrimination. Most employers have stringent employment policies that prevent their recruiters and hiring managers from learning potentially discriminatory information about candidates. Visiting a person’s social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices. Negligent hiring. Employers must consider the potential risk of a negligent hiring or negligent retention lawsuit related to social networking profile information. It is possible that if a workplace violence incident occurred and the attacker’s public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision. 17 Learning Objectives (3 of 4) 18 Copyright ©2018 John Wiley & Sons, Inc. Technology Addictions: Cognitive Overload Cognitive Overload
  • 13. Interferes with our ability to focus and be productive. Potential modern causes: Mobile apps Wearable technology Constant updates Desire to stay connected 50% of American teens suffer from Fear Of Missing Out (FOMO) 19 Copyright ©2018 John Wiley & Sons, Inc. Focus Management Being Able to Focus Counts An inability to concentrate for longer periods reduces an ability to distinguish important information from trivia. Some researchers estimate that distraction costs hundreds of billions of dollars a year in lost productivity. Heavy online users (media high multitaskers) scored poorly on cognitive tests. 20 Copyright ©2018 John Wiley & Sons, Inc. Focus Recovery Lost focus can take about 25 minutes recovery time. Noradrenaline, a chemical that helps us concentrate, is released by focusing. The best strategy to improve focus: practice doing it. There is disagreement if multitaskers are working as well as
  • 14. they could, or they could improve their focus. 21 Copyright ©2018 John Wiley & Sons, Inc. Technology Addictions and Focus Management What are several potential causes of cognitive overload? What are the consequences of constant distractions? When a person is distracted, how long does it take to return to the task at hand and get focused again? Why are senior managers interested in focus management? What is the difference between the performance of high and low multitaskers on cognitive tests? How can multitaskers improve their ability to focus? 22 Copyright ©2018 John Wiley & Sons, Inc. Suggested Answers: 1. Tweets, texts, e-mail, social media, and annoying electronic static are potential causes. 2. Distractions cause a loss of focus and a loss of productivity. 3. Gloria Mark, a professor of informatics at the University of California, Irvine, says a worker distracted by a Web search that goes rogue or a new text or tweet can take about 25 minutes to return to the task at hand and get focused again (Dumaine, 2014). 4. To improve creativity and productivity. If your mind is free
  • 15. of distraction, your mind is better able to absorb data, interactions, and trends and synthesize the new information with what you already know. As a result, you are more likely to come up with innovative ideas. 5. In contrast to widely held assumptions, subjects who were Media (high) multitaskers scored poorly on cognitive tests. 6. The best strategy to improve focus is to practice doing it. 22 Learning Objectives (4 of 4) 23 Copyright ©2018 John Wiley & Sons, Inc. 23 ICT and Sustainable Development Being profit-motivated without concern for damage to the environment is unacceptable. Companies should conduct themselves in an ethical, socially responsible, and environmentally sustainable manner. The IT industry sector is called the Information and Communications Technology, or ICT, in emissions reports. 24 Copyright ©2018 John Wiley & Sons, Inc.
  • 16. Figure 14.1: The 4 R’s of environmental sustainability 24 IT and Global Warming Global warming refers to the upward trend in Global Mean Temperature (GMT). This is driven by the greenhouse effect, which is the holding of heat within the earth’s atmosphere. Carbon emissions directly contribute to the greenhouse effect. 25 Copyright ©2018 John Wiley & Sons, Inc. Figure 14.1: The 4 R’s of environmental sustainability 25 Global Warming IT Sector Actions McKinsey & Company conclude the following: IT sector’s own footprint of 2 percent of global emissions could double by 2020 because of increased use of tablets, smartphones, apps, and services. IT sector must continue to reduce emissions from data centers, telecom networks, and the manufacture and use of its products. IT has the unique ability to monitor and maximize energy efficiency both within and outside of its own industry sector to cut CO2 emissions by up to 5 times this amount. 26 Copyright ©2018 John Wiley & Sons, Inc.
  • 17. Sustainability Through Climate Change Mitigation Every IT user, enterprise, and nation plays a role in climate change mitigation. Wired and mobile networks enable limitless data creation and consumption Energy used to power data centers, cell towers, base stations, and recharge devices is damaging the environment and depleting natural resources. Innovative sustainability initiatives hold the key to curbing these emissions and carbon footprint, thereby reducing environmental impact. 27 Copyright ©2018 John Wiley & Sons, Inc. Technology to Transform Business and Society People hold the power to shape and apply technology to create positive change, improve lives and transform business and society. Accenture’s Technology Vision 2017 is an analysis of key IT trends that are expected to disrupt business and society over the next three years. According to Vision 2017, taking a people first approach by empowering people with more human technology will allow organizations to improve performance by redefining their relationship with customers and employees from provider to partner. 28 Copyright ©2018 John Wiley & Sons, Inc. Top Five Disruptive Technologies 2015-2017Vision 2015Vision
  • 18. 2016Vision 2017Internet of MeIntelligent AutomationArtificial Intelligence as the new User InterfaceOutcome EconomyLiquid WorkforceDesign for HumansPlatform EvoluationPlatform EconomyEcosystems as MacrocosmsIntelligent EnterprisePredictable DisruptionWorkforce MarketplaceWorkplace ReimaginedDigital TrustThe Uncharted 29 Copyright ©2018 John Wiley & Sons, Inc. Top Five Disruptive Technologies (1 of 2) AI is the new UI AI is becoming the new user interface (UI), underpinning the way we transact and interact with systems. AI will revolutionize the way businesses gain information from and interact with customers. Design for Humans Technology design decisions are being made by humans, for humans. Organizations need to understand not only where people are today, but also where they want to be. 30 Copyright ©2018 John Wiley & Sons, Inc. Top Five Disruptive Technologies (2 of 2) Ecosystems as Macrocosms. Digital ecosystems are transforming the way organizations deliver value. Workforce Marketplace. Companies are dissolving traditional hierarchies and replacing them with talent marketplaces of independent freelance workers. The Uncharted.
  • 19. Businesses must delve into uncharted territory, seizing opportunities to establish rules and standards for entirely new industries. 31 Copyright ©2018 John Wiley & Sons, Inc. The Next Wave of Disruption Next…More Disruptive Disruption High-performing business leaders now accept that their organizations’ future success is tied to their ability to keep pace with technology. Technology is more important than ever to their business success. Biggest IT innovations will not be in the technology tools themselves, but in how they are designed with people in mind. A people first approach is the key to any organization’s digital success. 32 Copyright ©2018 John Wiley & Sons, Inc. ICT and Sustainable Development Why do some experts warn that carbon emission reductions between 50 percent and 85 percent are necessary by 2050? What contributes to the rise of global mean temperature? What is the greenhouse effect? How does the use of mobile devices contribute to the level of greenhouse gases? What is ICT’s role in global warming? Why is global warming hotly debated? What is the role of IT in sustainable development?
  • 20. Why is it important for organizations to take a people first approach to IT? 33 Copyright ©2018 John Wiley & Sons, Inc. Suggested Answers: Carbon emission reductions between 50 percent and 85 percent are necessary by 2050 to prevent the global temperature from rising too much too fast because of the greenhouse effect. Increases in CO2 resulting from human activities that generate carbon emissions have thrown the earth’s natural carbon cycle off balance, increasing global temperatures and changing the planet’s climate. Climatologists estimated that countries must keep the global mean temperature (GMT) from rising by more than 2°C (3.6°F) above the preindustrial GMT in order to avoid profound damage to life on the earth. Damage includes water and food scarcity, rising sea levels, and greater incidence and severity of disease. The greenhouse effect is the holding of heat within the earth’s atmosphere. CO2 and other greenhouse gases (GHGs) trap the sun’s heat with-in the earth’s atmosphere, warming it and keeping it at habitable temperatures. The surge in energy used to power data centers, cell towers, base stations, and recharge devices, all of which support mobile devices, is damaging the environment and depleting natural resources. ICT plays a key role in reducing global warming. Transforming the way people and businesses use IT could reduce annual
  • 21. human-generated global emissions by 15 percent by 2020 and deliver energy efficiency savings to global businesses of over 500 billion euros, or $800 billion U.S. And using social media, for example, to inform consumers of the grams (g) of carbon emissions associated with the products they buy could change buyer behavior and ultimately have a positive eco-effect. Many scientists and experts are extremely alarmed by global warming and climate change, but other experts outright deny that they are occurring. Every IT user, enterprise, and nation plays a role in climate change mitigation. Climate change mitigation is any action to limit the magnitude of long-term cli-mate change. Examples of mitigation include switching to low-carbon renewable energy sources and reducing the amount of energy consumed by power stations by increasing their efficiency. According to Accenture’s Vision 2017, taking a people first approach by empowering people with more human technology will allow organizations to improve performance by redefining their relationship with customers and employees from provider to partner. This will require organizations to change the way they develop their business models and provide technology that support them to promote social responsibility. 33 Copyright Copyright © 2018 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Act without the express written permission of the copyright owner is unlawful. Request for further information should be
  • 22. addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. 34 Copyright ©2018 John Wiley & Sons, Inc. 34