SlideShare una empresa de Scribd logo
1 de 32
Management Information
Systems
Course Code 51458
by
Dr. Muath Asmar
Faculty of Economics and
Administrative Sciences
Management Information SystemsManagement Information Systems
MANAGING THE DIGITAL FIRM, 12TH
EDITION
ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
Chapter 4
Management Information SystemsManagement Information Systems
• What ethical, social, and political issues are raised
by information systems?
• What specific principles for conduct can be used to
guide ethical decisions?
• Why do contemporary information systems
technology and the Internet pose challenges to the
protection of individual privacy and intellectual
property?
• How have information systems affected everyday
life?
Learning Objectives
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20113
Management Information SystemsManagement Information Systems
• Recent cases of failed ethical judgment in business
– Lehman Brothers, Minerals Management Service,
Pfizer
– In many, information systems used to bury decisions
from public scrutiny
• Ethics
– Principles of right and wrong that individuals, acting
as free moral agents, use to make choices to guide
their behaviors
Understanding Ethical and Social Issues Related to Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20114
Management Information SystemsManagement Information Systems
• Information systems and ethics
–Information systems raise new ethical
questions because they create
opportunities for:
• Intense social change, threatening
existing distributions of power, money,
rights, and obligations
• New kinds of crime
Understanding Ethical and Social Issues Related to Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20115
Management Information SystemsManagement Information Systems
• Model for thinking about ethical, social, political
issues:
– Society as a calm pond
– IT as rock dropped in pond, creating ripples of new
situations not covered by old rules
– Social and political institutions cannot respond
overnight to these ripples—it may take years to
develop etiquette, expectations, laws
• Requires understanding of ethics to make choices in
legally gray areas
Understanding Ethical and Social Issues Related to Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20116
Management Information SystemsManagement Information Systems
Understanding Ethical and Social Issues Related to Systems
THE RELATIONSHIP
BETWEEN ETHICAL,
SOCIAL, AND
POLITICAL ISSUES IN
AN INFORMATION
SOCIETY
The introduction of new
information technology has a
ripple effect, raising new
ethical, social, and political
issues that must be dealt with
on the individual, social, and
political levels. These issues
have five moral dimensions:
information rights and
obligations, property rights and
obligations, system quality,
quality of life, and
accountability and control.
FIGURE 4-1
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20117
Management Information SystemsManagement Information Systems
• Five moral dimensions of the
information age
1. Information rights and obligations
2. Property rights and obligations
3. Accountability and control
4. System quality
5. Quality of life
Understanding Ethical and Social Issues Related to Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20118
Management Information SystemsManagement Information Systems
• Key technology trends that raise ethical issues
1. Doubling of computer power
• More organizations depend on computer systems for
critical operations
1. Rapidly declining data storage costs
• Organizations can easily maintain detailed databases
on individuals
1. Networking advances and the Internet
• Copying data from one location to another and
accessing personal data from remote locations is much
easier
Understanding Ethical and Social Issues Related to Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 20119
Management Information SystemsManagement Information Systems
• Key technology trends that raise ethical issues (cont.)
4. Advances in data analysis techniques
• Companies can analyze vast quantities of data gathered
on individuals for:
– Profiling
» Combining data from multiple sources to create dossiers
of detailed information on individuals
– Nonobvious relationship awareness (NORA)
» Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists
Understanding Ethical and Social Issues Related to Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201110
Management Information SystemsManagement Information Systems
Understanding Ethical and Social Issues Related to Systems
NONOBVIOUS
RELATIONSHIP
AWARENESS (NORA)
NORA technology can take
information about people from
disparate sources and find
obscure, nonobvious
relationships. It might
discover, for example, that an
applicant for a job at a casino
shares a telephone number
with a known criminal and
issue an alert to the hiring
manager.
FIGURE 4-2
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201111
Management Information SystemsManagement Information Systems
• Basic concepts for ethical analysis
– Responsibility:
• Accepting the potential costs, duties, and obligations for
decisions
– Accountability:
• Mechanisms for identifying responsible parties
– Liability:
• Permits individuals (and firms) to recover damages done to
them
– Due process:
• Laws are well known and understood, with an ability to
appeal to higher authorities
Ethics in an Information Society
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201112
Management Information SystemsManagement Information Systems
• Ethical analysis: A five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the
higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably
take
5. Identify the potential consequences of your
options
Ethics in an Information Society
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201113
Management Information SystemsManagement Information Systems
• Six Candidate Ethical Principles
1. Golden Rule
• Do unto others as you would have them do unto you
1. Immanuel Kant’s Categorical Imperative
• If an action is not right for everyone to take, it is not
right for anyone
1. Descartes’ Rule of Change
• If an action cannot be taken repeatedly, it is not right
to take at all
Ethics in an Information Society
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201114
Management Information SystemsManagement Information Systems
• Six Candidate Ethical Principles (cont.)
4. Utilitarian Principle
• Take the action that achieves the higher or greater
value
4. Risk Aversion Principle
• Take the action that produces the least harm or least
potential cost
4. Ethical “no free lunch” Rule
• Assume that virtually all tangible and intangible objects
are owned by someone unless there is a specific
declaration otherwise
Ethics in an Information Society
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201115
Management Information SystemsManagement Information Systems
• Professional codes of conduct
– Promulgated by associations of professionals
• E.g. AMA, ABA, AITP, ACM
– Promises by professions to regulate themselves in
the general interest of society
• Real-world ethical dilemmas
– One set of interests pitted against another
– E.g. Right of company to maximize productivity of
workers vs. workers right to use Internet for short
personal tasks
Ethics in an Information Society
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201116
Management Information SystemsManagement Information Systems
• Privacy:
– Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself
• In U.S., privacy protected by:
– First Amendment (freedom of speech)
– Fourth Amendment (unreasonable search and
seizure)
– Additional federal statues (e.g. Privacy Act of 1974)
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201117
Management Information SystemsManagement Information Systems
• Fair information practices:
– Set of principles governing the collection and use of
information
– Basis of most U.S. and European privacy laws
– Based on mutuality of interest between record holder
and individual
– Restated and extended by FTC in 1998 to provide
guidelines for protecting online privacy
– Used to drive changes in privacy legislation
• COPPA
• Gramm-Leach-Bliley Act
• HIPAA
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201118
Management Information SystemsManagement Information Systems
• Fair Information Practices principles:
1. Notice/awareness (core principle)
2. Choice/consent (core principle)
3. Access/participation
4. Security
5. Enforcement
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201119
Management Information SystemsManagement Information Systems
• European Directive on Data Protection:
– Requires companies to inform people when they
collect information about them and disclose how it
will be stored and used.
– Requires informed consent of customer
– EU member nations cannot transfer personal data to
countries with no similar privacy protection (e.g. U.S.)
– U.S. businesses use safe harbor framework
• Self-regulating policy to meet objectives of government
legislation without involving government regulation or
enforcement.
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201120
Management Information SystemsManagement Information Systems
• Internet Challenges to Privacy:
– Cookies
• Tiny files downloaded by Web site to visitor’s hard drive to help
identify visitor’s browser and track visits to site
• Allow Web sites to develop profiles on visitors
– Web beacons/bugs
• Tiny graphics embedded in e-mail and Web pages to monitor who
is reading message
– Spyware
• Surreptitiously installed on user’s computer
• May transmit user’s keystrokes or display unwanted ads
• Google’s collection of private data; behavioral
targeting
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201121
Management Information SystemsManagement Information Systems
The Moral Dimensions of Information Systems
HOW COOKIES IDENTIFY WEB VISITORS
Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web
server requests the ID number from the cookie and uses it to access the data stored by that server on that
visitor. The Web site can then use these data to display personalized information.
FIGURE 4-3
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201122
Management Information SystemsManagement Information Systems
• U.S. allows businesses to gather transaction
information and use this for other marketing
purposes
• Online industry promotes self-regulation over
privacy legislation
• However, extent of responsibility taken varies
– Statements of information use
– Opt-out selection boxes
– Online “seals” of privacy principles
• Most Web sites do not have any privacy policies
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201123
Management Information SystemsManagement Information Systems
• Technical solutions
– The Platform for Privacy Preferences (P3P)
• Allows Web sites to communicate privacy policies
to visitor’s Web browser – user
• User specifies privacy levels desired in browser
settings
• E.g. “medium” level accepts cookies from first-
party host sites that have opt-in or opt-out policies
but rejects third-party cookies that use personally
identifiable information without an opt-in policy
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201124
Management Information SystemsManagement Information Systems
The Moral Dimensions of Information Systems
THE P3P STANDARD
P3P enables Web sites to translate their privacy policies into a standard format that can be read by the
user’s Web browser software. The browser software evaluates the Web site’s privacy policy to determine
whether it is compatible with the user’s privacy preferences.
FIGURE 4-4
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201125
Management Information SystemsManagement Information Systems
• Property rights: Intellectual property
– Intellectual property: Intangible property of any kind
created by individuals or corporations
– Three main ways that protect intellectual property
1. Trade secret: Intellectual work or product belonging
to business, not in the public domain
2. Copyright: Statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years
3. Patents: Grants creator of invention an exclusive
monopoly on ideas behind invention for 20 years
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201126
Management Information SystemsManagement Information Systems
• Challenges to intellectual property rights
– Digital media different from physical media (e.g.
books)
• Ease of replication
• Ease of transmission (networks, Internet)
• Difficulty in classifying software
• Compactness
• Difficulties in establishing uniqueness
• Digital Millennium Copyright Act (DMCA)
– Makes it illegal to circumvent technology-based
protections of copyrighted materials
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201127
Management Information SystemsManagement Information Systems
• Accountability, Liability, Control
– Computer-related liability problems
• If software fails, who is responsible?
– If seen as part of machine that injures or harms,
software producer and operator may be liable
– If seen as similar to book, difficult to hold
author/publisher responsible
– What should liability be if software seen as service?
Would this be similar to telephone systems not
being liable for transmitted messages?
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201128
Management Information SystemsManagement Information Systems
• System Quality: Data Quality and System Errors
– What is an acceptable, technologically feasible level of
system quality?
• Flawless software is economically unfeasible
– Three principal sources of poor system performance:
• Software bugs, errors
• Hardware or facility failures
• Poor input data quality (most common source of
business system failure)
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201129
Management Information SystemsManagement Information Systems
• Quality of life: Equity, access, and boundaries
– Negative social consequences of systems
• Balancing power: Although computing power
decentralizing, key decision-making remains
centralized
• Rapidity of change: Businesses may not have enough
time to respond to global competition
• Maintaining boundaries: Computing, Internet use
lengthens work-day, infringes on family, personal time
• Dependence and vulnerability: Public and private
organizations ever more dependent on computer
systems
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201130
Management Information SystemsManagement Information Systems
• Computer crime and abuse
– Computer crime: Commission of illegal acts through use
of compute or against a computer system – computer
may be object or instrument of crime
– Computer abuse: Unethical acts, not illegal
• Spam: High costs for businesses in dealing with spam
• Employment:
– Reengineering work resulting in lost jobs
• Equity and access – the digital divide:
– Certain ethnic and income groups in the United States
less likely to have computers or Internet access
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201131
Management Information SystemsManagement Information Systems
• Health risks:
– Repetitive stress injury (RSI)
• Largest source is computer keyboards
• Carpal Tunnel Syndrome (CTS)
– Computer vision syndrome (CVS)
– Technostress
– Role of radiation, screen emissions, low-level
electromagnetic fields
The Moral Dimensions of Information Systems
CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN
INFORMATION SYSTEMS
© Prentice Hall 201132

Más contenido relacionado

La actualidad más candente

MIS-CH01: IS in Business Today
MIS-CH01: IS in Business TodayMIS-CH01: IS in Business Today
MIS-CH01: IS in Business TodaySukanya Ben
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationSukanya Ben
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsSukanya Ben
 
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISMIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISSukanya Ben
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingSukanya Ben
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeSukanya Ben
 
Chapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyChapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyVan Chau
 
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsMIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsSukanya Ben
 
Chapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayChapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayVan Chau
 

La actualidad más candente (20)

MIS-CH01: IS in Business Today
MIS-CH01: IS in Business TodayMIS-CH01: IS in Business Today
MIS-CH01: IS in Business Today
 
Chapter 3 MIS
Chapter 3 MISChapter 3 MIS
Chapter 3 MIS
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
 
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISMIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
 
Chapter 2 MIS
Chapter 2 MISChapter 2 MIS
Chapter 2 MIS
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
Laudon mis14 ch01
Laudon mis14 ch01Laudon mis14 ch01
Laudon mis14 ch01
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing Knowledge
 
Chapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyChapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategy
 
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsMIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
 
Chapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayChapter 01 Information systems in global business today
Chapter 01 Information systems in global business today
 
Chapter 6 MIS
Chapter 6 MISChapter 6 MIS
Chapter 6 MIS
 
Laudon Ch09
Laudon Ch09Laudon Ch09
Laudon Ch09
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Laudon Ch13
Laudon Ch13Laudon Ch13
Laudon Ch13
 

Destacado (20)

Mis chapter 8
Mis chapter 8Mis chapter 8
Mis chapter 8
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
 
Happy Resorts - HumRes
Happy Resorts - HumResHappy Resorts - HumRes
Happy Resorts - HumRes
 
Resorts (Travel Management Prelim Notes)
Resorts (Travel Management Prelim Notes)Resorts (Travel Management Prelim Notes)
Resorts (Travel Management Prelim Notes)
 
Resort
ResortResort
Resort
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
International and Domestic Planning, Packaging and Pricing week 1
International and Domestic Planning, Packaging and Pricing week 1International and Domestic Planning, Packaging and Pricing week 1
International and Domestic Planning, Packaging and Pricing week 1
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Resort management
Resort managementResort management
Resort management
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Mis ch01
Mis ch01Mis ch01
Mis ch01
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
World Class Benchmarking: Bloomberry Resorts Corp (BLOOM PM)
World Class Benchmarking: Bloomberry Resorts Corp (BLOOM PM)World Class Benchmarking: Bloomberry Resorts Corp (BLOOM PM)
World Class Benchmarking: Bloomberry Resorts Corp (BLOOM PM)
 
Mis ppt unit 3 & 4
Mis ppt unit 3 & 4Mis ppt unit 3 & 4
Mis ppt unit 3 & 4
 
management information system MIS MBA PPT
management information system  MIS MBA PPT management information system  MIS MBA PPT
management information system MIS MBA PPT
 
TRAVEL 103 session 1
TRAVEL 103 session 1TRAVEL 103 session 1
TRAVEL 103 session 1
 
Tour costing
Tour costingTour costing
Tour costing
 
Grade 10 arts q2
Grade 10 arts q2Grade 10 arts q2
Grade 10 arts q2
 

Similar a MIS Chapter 4

mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfAliMurat5
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...Tonmoy zahid Rishad
 
Ethical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxEthical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxMICHAELJOHNPEDRASA1
 
Chapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsChapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsVan Chau
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptRogerPrimo2
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docxtamicawaysmith
 

Similar a MIS Chapter 4 (20)

mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdf
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Ethical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxEthical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptx
 
Chapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsChapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systems
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
 
MISch04
MISch04MISch04
MISch04
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
MIS Wk-12.ppt
MIS Wk-12.pptMIS Wk-12.ppt
MIS Wk-12.ppt
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Mis9 ch05 ppt
Mis9 ch05 pptMis9 ch05 ppt
Mis9 ch05 ppt
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
 

Más de Dr. Muath Asmar

Más de Dr. Muath Asmar (20)

Saunders 8e ppt_chapter22
Saunders 8e ppt_chapter22Saunders 8e ppt_chapter22
Saunders 8e ppt_chapter22
 
Saunders 8e ppt_chapter21
Saunders 8e ppt_chapter21Saunders 8e ppt_chapter21
Saunders 8e ppt_chapter21
 
Saunders 8e ppt_chapter20
Saunders 8e ppt_chapter20Saunders 8e ppt_chapter20
Saunders 8e ppt_chapter20
 
Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19
 
Saunders 8e ppt_chapter18
Saunders 8e ppt_chapter18Saunders 8e ppt_chapter18
Saunders 8e ppt_chapter18
 
Saunders 8e ppt_chapter17
Saunders 8e ppt_chapter17Saunders 8e ppt_chapter17
Saunders 8e ppt_chapter17
 
Saunders 8e ppt_chapter16
Saunders 8e ppt_chapter16Saunders 8e ppt_chapter16
Saunders 8e ppt_chapter16
 
Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15
 
Saunders 8e ppt_chapter14
Saunders 8e ppt_chapter14Saunders 8e ppt_chapter14
Saunders 8e ppt_chapter14
 
Saunders 8e ppt_chapter12
Saunders 8e ppt_chapter12Saunders 8e ppt_chapter12
Saunders 8e ppt_chapter12
 
Saunders 8e ppt_chapter11
Saunders 8e ppt_chapter11Saunders 8e ppt_chapter11
Saunders 8e ppt_chapter11
 
Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15
 
Saunders 8e ppt_chapter01
Saunders 8e ppt_chapter01Saunders 8e ppt_chapter01
Saunders 8e ppt_chapter01
 
Chapter (11).
Chapter (11).Chapter (11).
Chapter (11).
 
Chapter (10).
Chapter (10).Chapter (10).
Chapter (10).
 
Chapter (9).
Chapter (9).Chapter (9).
Chapter (9).
 
Chapter (8).
Chapter (8).Chapter (8).
Chapter (8).
 
Chapter (7).
Chapter (7).Chapter (7).
Chapter (7).
 
Chapter (1).
Chapter (1).Chapter (1).
Chapter (1).
 
Chapter (25).
Chapter (25).Chapter (25).
Chapter (25).
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

MIS Chapter 4

  • 1. Management Information Systems Course Code 51458 by Dr. Muath Asmar Faculty of Economics and Administrative Sciences
  • 2. Management Information SystemsManagement Information Systems MANAGING THE DIGITAL FIRM, 12TH EDITION ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS Chapter 4
  • 3. Management Information SystemsManagement Information Systems • What ethical, social, and political issues are raised by information systems? • What specific principles for conduct can be used to guide ethical decisions? • Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? • How have information systems affected everyday life? Learning Objectives CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20113
  • 4. Management Information SystemsManagement Information Systems • Recent cases of failed ethical judgment in business – Lehman Brothers, Minerals Management Service, Pfizer – In many, information systems used to bury decisions from public scrutiny • Ethics – Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors Understanding Ethical and Social Issues Related to Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20114
  • 5. Management Information SystemsManagement Information Systems • Information systems and ethics –Information systems raise new ethical questions because they create opportunities for: • Intense social change, threatening existing distributions of power, money, rights, and obligations • New kinds of crime Understanding Ethical and Social Issues Related to Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20115
  • 6. Management Information SystemsManagement Information Systems • Model for thinking about ethical, social, political issues: – Society as a calm pond – IT as rock dropped in pond, creating ripples of new situations not covered by old rules – Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws • Requires understanding of ethics to make choices in legally gray areas Understanding Ethical and Social Issues Related to Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20116
  • 7. Management Information SystemsManagement Information Systems Understanding Ethical and Social Issues Related to Systems THE RELATIONSHIP BETWEEN ETHICAL, SOCIAL, AND POLITICAL ISSUES IN AN INFORMATION SOCIETY The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control. FIGURE 4-1 CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20117
  • 8. Management Information SystemsManagement Information Systems • Five moral dimensions of the information age 1. Information rights and obligations 2. Property rights and obligations 3. Accountability and control 4. System quality 5. Quality of life Understanding Ethical and Social Issues Related to Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20118
  • 9. Management Information SystemsManagement Information Systems • Key technology trends that raise ethical issues 1. Doubling of computer power • More organizations depend on computer systems for critical operations 1. Rapidly declining data storage costs • Organizations can easily maintain detailed databases on individuals 1. Networking advances and the Internet • Copying data from one location to another and accessing personal data from remote locations is much easier Understanding Ethical and Social Issues Related to Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 20119
  • 10. Management Information SystemsManagement Information Systems • Key technology trends that raise ethical issues (cont.) 4. Advances in data analysis techniques • Companies can analyze vast quantities of data gathered on individuals for: – Profiling » Combining data from multiple sources to create dossiers of detailed information on individuals – Nonobvious relationship awareness (NORA) » Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists Understanding Ethical and Social Issues Related to Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201110
  • 11. Management Information SystemsManagement Information Systems Understanding Ethical and Social Issues Related to Systems NONOBVIOUS RELATIONSHIP AWARENESS (NORA) NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job at a casino shares a telephone number with a known criminal and issue an alert to the hiring manager. FIGURE 4-2 CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201111
  • 12. Management Information SystemsManagement Information Systems • Basic concepts for ethical analysis – Responsibility: • Accepting the potential costs, duties, and obligations for decisions – Accountability: • Mechanisms for identifying responsible parties – Liability: • Permits individuals (and firms) to recover damages done to them – Due process: • Laws are well known and understood, with an ability to appeal to higher authorities Ethics in an Information Society CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201112
  • 13. Management Information SystemsManagement Information Systems • Ethical analysis: A five-step process 1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher-order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options Ethics in an Information Society CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201113
  • 14. Management Information SystemsManagement Information Systems • Six Candidate Ethical Principles 1. Golden Rule • Do unto others as you would have them do unto you 1. Immanuel Kant’s Categorical Imperative • If an action is not right for everyone to take, it is not right for anyone 1. Descartes’ Rule of Change • If an action cannot be taken repeatedly, it is not right to take at all Ethics in an Information Society CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201114
  • 15. Management Information SystemsManagement Information Systems • Six Candidate Ethical Principles (cont.) 4. Utilitarian Principle • Take the action that achieves the higher or greater value 4. Risk Aversion Principle • Take the action that produces the least harm or least potential cost 4. Ethical “no free lunch” Rule • Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise Ethics in an Information Society CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201115
  • 16. Management Information SystemsManagement Information Systems • Professional codes of conduct – Promulgated by associations of professionals • E.g. AMA, ABA, AITP, ACM – Promises by professions to regulate themselves in the general interest of society • Real-world ethical dilemmas – One set of interests pitted against another – E.g. Right of company to maximize productivity of workers vs. workers right to use Internet for short personal tasks Ethics in an Information Society CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201116
  • 17. Management Information SystemsManagement Information Systems • Privacy: – Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself • In U.S., privacy protected by: – First Amendment (freedom of speech) – Fourth Amendment (unreasonable search and seizure) – Additional federal statues (e.g. Privacy Act of 1974) The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201117
  • 18. Management Information SystemsManagement Information Systems • Fair information practices: – Set of principles governing the collection and use of information – Basis of most U.S. and European privacy laws – Based on mutuality of interest between record holder and individual – Restated and extended by FTC in 1998 to provide guidelines for protecting online privacy – Used to drive changes in privacy legislation • COPPA • Gramm-Leach-Bliley Act • HIPAA The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201118
  • 19. Management Information SystemsManagement Information Systems • Fair Information Practices principles: 1. Notice/awareness (core principle) 2. Choice/consent (core principle) 3. Access/participation 4. Security 5. Enforcement The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201119
  • 20. Management Information SystemsManagement Information Systems • European Directive on Data Protection: – Requires companies to inform people when they collect information about them and disclose how it will be stored and used. – Requires informed consent of customer – EU member nations cannot transfer personal data to countries with no similar privacy protection (e.g. U.S.) – U.S. businesses use safe harbor framework • Self-regulating policy to meet objectives of government legislation without involving government regulation or enforcement. The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201120
  • 21. Management Information SystemsManagement Information Systems • Internet Challenges to Privacy: – Cookies • Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site • Allow Web sites to develop profiles on visitors – Web beacons/bugs • Tiny graphics embedded in e-mail and Web pages to monitor who is reading message – Spyware • Surreptitiously installed on user’s computer • May transmit user’s keystrokes or display unwanted ads • Google’s collection of private data; behavioral targeting The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201121
  • 22. Management Information SystemsManagement Information Systems The Moral Dimensions of Information Systems HOW COOKIES IDENTIFY WEB VISITORS Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. FIGURE 4-3 CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201122
  • 23. Management Information SystemsManagement Information Systems • U.S. allows businesses to gather transaction information and use this for other marketing purposes • Online industry promotes self-regulation over privacy legislation • However, extent of responsibility taken varies – Statements of information use – Opt-out selection boxes – Online “seals” of privacy principles • Most Web sites do not have any privacy policies The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201123
  • 24. Management Information SystemsManagement Information Systems • Technical solutions – The Platform for Privacy Preferences (P3P) • Allows Web sites to communicate privacy policies to visitor’s Web browser – user • User specifies privacy levels desired in browser settings • E.g. “medium” level accepts cookies from first- party host sites that have opt-in or opt-out policies but rejects third-party cookies that use personally identifiable information without an opt-in policy The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201124
  • 25. Management Information SystemsManagement Information Systems The Moral Dimensions of Information Systems THE P3P STANDARD P3P enables Web sites to translate their privacy policies into a standard format that can be read by the user’s Web browser software. The browser software evaluates the Web site’s privacy policy to determine whether it is compatible with the user’s privacy preferences. FIGURE 4-4 CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201125
  • 26. Management Information SystemsManagement Information Systems • Property rights: Intellectual property – Intellectual property: Intangible property of any kind created by individuals or corporations – Three main ways that protect intellectual property 1. Trade secret: Intellectual work or product belonging to business, not in the public domain 2. Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years 3. Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201126
  • 27. Management Information SystemsManagement Information Systems • Challenges to intellectual property rights – Digital media different from physical media (e.g. books) • Ease of replication • Ease of transmission (networks, Internet) • Difficulty in classifying software • Compactness • Difficulties in establishing uniqueness • Digital Millennium Copyright Act (DMCA) – Makes it illegal to circumvent technology-based protections of copyrighted materials The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201127
  • 28. Management Information SystemsManagement Information Systems • Accountability, Liability, Control – Computer-related liability problems • If software fails, who is responsible? – If seen as part of machine that injures or harms, software producer and operator may be liable – If seen as similar to book, difficult to hold author/publisher responsible – What should liability be if software seen as service? Would this be similar to telephone systems not being liable for transmitted messages? The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201128
  • 29. Management Information SystemsManagement Information Systems • System Quality: Data Quality and System Errors – What is an acceptable, technologically feasible level of system quality? • Flawless software is economically unfeasible – Three principal sources of poor system performance: • Software bugs, errors • Hardware or facility failures • Poor input data quality (most common source of business system failure) The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201129
  • 30. Management Information SystemsManagement Information Systems • Quality of life: Equity, access, and boundaries – Negative social consequences of systems • Balancing power: Although computing power decentralizing, key decision-making remains centralized • Rapidity of change: Businesses may not have enough time to respond to global competition • Maintaining boundaries: Computing, Internet use lengthens work-day, infringes on family, personal time • Dependence and vulnerability: Public and private organizations ever more dependent on computer systems The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201130
  • 31. Management Information SystemsManagement Information Systems • Computer crime and abuse – Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime – Computer abuse: Unethical acts, not illegal • Spam: High costs for businesses in dealing with spam • Employment: – Reengineering work resulting in lost jobs • Equity and access – the digital divide: – Certain ethnic and income groups in the United States less likely to have computers or Internet access The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201131
  • 32. Management Information SystemsManagement Information Systems • Health risks: – Repetitive stress injury (RSI) • Largest source is computer keyboards • Carpal Tunnel Syndrome (CTS) – Computer vision syndrome (CVS) – Technostress – Role of radiation, screen emissions, low-level electromagnetic fields The Moral Dimensions of Information Systems CHAPTER 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS © Prentice Hall 201132