Expert answer:Ethics Assignment

Expert answer:Ethics Assignment (2 pages)You have access to the sales and customer information in a flower shop. You discover that the boyfriend of a woman you know is sending roses to three other women on a regular basis. The woman you know is on the flower list, but she believes that she’s the only woman in his romantic life. You really think you should tell the woman. Your dilemma is that you have a professional responsibility to keep the company’s information private. However, you also believe that you have a responsibility to the woman. Do you tell her? Are there factors that would change your decision? Each student should individually consider the additional information below. Indicate whether any one or more of these factors would change your decision. Then form a consensus.
laudon_ethics_pp_chap12.ppt

mist315_ethics_assignment.pdf

Unformatted Attachment Preview

Laudon & Laudon Textbook
“Essentials of Management Information Systems”
Chapter 12
Ethical and Social Issues
in Information Systems
Video Cases:
Case 1 Net Neutrality: Neutral Networks Work
Case 2 Data Mining for Terrorists and Innocents
Instructional Videos:
Instructional Video 1 Big Brother (NSA) is Copying Everything on the Internet
12.1
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
STUDENT OBJECTIVES
• What ethical, social, and political issues are raised
by information systems?
• What specific principles for conduct can be used to
guide ethical decisions?
• Why do contemporary information systems
technology and the Internet pose challenges to the
protection of individual privacy and intellectual
property?
• How have information systems affected everyday
life?
12.2
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Behavioral Targeting and Your Privacy: You’re the Target
• Problem: need
to efficiently
target online ads
• Solution:
Behavioral
targeting allows
businesses and
organizations to
more precisely
target desired
demographics
12.3
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Behavioral Targeting and Your Privacy: You’re the Target
• Google uses tracking files to monitor user
activity on thousands of sites; businesses
monitor activity on their own sites to better
understand customers.
• Demonstrates IT’s role in organizing and
distributing information
• Illustrates the ethical questions inherent in
online information gathering
12.4
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Behavioral Targeting and Your Privacy: You’re the Target
12.5
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
• Recent cases of failed ethical judgment in
business
• Lehman Brothers, IBM, Tyson Foods
• In many, information systems used to bury
decisions from public scrutiny
• Ethics
• Principles of right and wrong that individuals,
acting as free moral agents, use to make
choices to guide their behaviors
12.6
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
• Information systems and ethics
• Information systems raise new ethical
questions because they create
opportunities for:
• Intense social change, threatening existing
distributions of power, money, rights, and
obligations
• New kinds of crime
12.7
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
A Model for Thinking About Ethical, Social, and
Political Issues
• Society as a calm pond
• IT as rock dropped in pond, creating ripples of
new situations not covered by old rules
• Social and political institutions cannot respond
overnight to these ripples—it may take years to
develop etiquette, expectations, laws
• Requires understanding of ethics to make
choices in legally gray areas
12.8
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
The Relationship Among Ethical, Social, Political
Issues in an Information Society
The introduction of new
information technology
has a ripple effect, raising
new ethical, social, and
political issues that must
be dealt with on the
individual, social, and
political levels. These
issues have five moral
dimensions: information
rights and obligations,
property rights and
obligations, system
quality, quality of life, and
accountability and control.
Figure 12-1
12.9
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Five Moral Dimensions of the Information Age
1. Information rights and obligations
2. Property rights and obligations
3. Accountability and control
4. System quality
5. Quality of life
12.10
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Key Technology Trends That Raise Ethical Issues
• Doubling of computer power
• More organizations depend on computer systems for critical
operations
• Rapidly declining data storage costs
• Organizations can easily maintain detailed databases on
individuals
• Networking advances and the Internet
• Copying data from one location to another and accessing
personal data from remote locations are much easier
12.11
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Key Technology Trends That Raise Ethical Issues
• Advances in data analysis techniques
• Profiling
• Combining data from multiple sources to create dossiers of
detailed information on individuals
• Nonobvious relationship awareness (NORA)
• Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists
• Mobile device growth
• Tracking of individual cell phones
12.12
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Credit card purchases
can make personal
information available
to market researchers,
telemarketers, and
direct-mail companies.
Advances in
information
technology facilitate
the invasion of
privacy.
12.13
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Nonobvious Relationship Awareness (NORA)
NORA technology can
take information about
people from disparate
sources and find
obscure, nonobvious
relationships. It might
discover, for example,
that an applicant for a
job at a casino shares a
telephone number with a
known criminal and
issue an alert to the
hiring manager.
Figure 12-2
12.14
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Basic concepts for ethical analysis
• Responsibility:
• Accepting the potential costs, duties, and obligations for decisions
• Accountability:
• Mechanisms for identifying responsible parties
• Liability:
• Permits individuals (and firms) to recover damages done to them
• Due process:
• Laws are well known and understood, with an ability to appeal to
higher authorities
12.15
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Ethical analysis: a five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the
higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably take
5. Identify the potential consequences of your
options
12.16
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Candidate Ethical Principles

Golden Rule


Immanuel Kant’s Categorical Imperative


If an action is not right for everyone to take, it is not right for
anyone
Descartes’ Rule of Change

12.17
Do unto others as you would have them do unto you.
If an action cannot be taken repeatedly, it is not right to take
at all.
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Candidate Ethical Principles (cont.)

Utilitarian Principle


Risk Aversion Principle


Take the action that produces the least harm or potential cost.
Ethical “No Free Lunch” Rule

12.18
Take the action that achieves the higher or greater value.
Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise.
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Professional codes of conduct

Promulgated by associations of professionals


E.g., AMA, ABA, AITP, ACM
Promises by professions to regulate themselves
in the general interest of society
• Real-world ethical dilemmas

One set of interests pitted against another

12.19
E.g., right of company to maximize productivity of workers
versus workers right to use Internet for short personal tasks
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Some Real-World Ethical Dilemmas

Using information technology to reduce size
of workforce

12.20
Voice recognition software

Monitoring workers activities on the
computer

Facebook sells subscriber information to
advertisers
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Information Rights: Privacy and Freedom in the Internet Age

Privacy:


12.21
Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself.
In the United States, privacy protected by:

First Amendment (freedom of speech)

Fourth Amendment (unreasonable search and seizure)

Additional federal statues (e.g., Privacy Act of 1974)
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Fair information practices:





Set of principles governing the collection and use of
information
Basis of most U.S. and European privacy laws
Based on mutuality of interest between record holder
and individual
Restated and extended by FTC in 1998 to provide
guidelines for protecting online privacy
Used to drive changes in privacy legislation



12.22
COPPA
Gramm–Leach–Bliley Act
HIPAA
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems

FTC FIP principles:

Notice/awareness (core principle)


Choice/consent (core principle)


Consumers must be able to choose how information is used
for secondary purposes
Access/participation

12.23
Web sites must disclose practices before collecting data
Consumers must be able to review, contest accuracy of
personal data
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems

FTC FIP principles (cont.)

Security


Enforcement

12.24
Data collectors must take steps to ensure accuracy, security
of personal data
Must be mechanism to enforce FIP principles
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems

European Directive on Data Protection:

Companies must inform people information is
collected and disclose how it is stored and used

Requires informed consent of customer

EU member nations cannot transfer personal data
to countries without similar privacy protection
(e.g., the United States)

U.S. businesses use safe harbor framework

Self-regulating policy and enforcement that meets objectives
of government legislation but does not involve government
regulation or enforcement
12.25
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems

Internet Challenges to Privacy:
• Cookies




Super cookies (Flash cookies)
Web beacons (Web bugs)




12.26
Tiny files downloaded by Web site to visitor’s hard drive
Identify visitor’s browser and track visits to site
Tiny graphics embedded in e-mail messages and Web pages
Monitor who is reading e-mail message or visiting site
Spyware

Surreptitiously installed on user’s computer

May transmit user’s keystrokes or display unwanted ads
Google services and behavioral targeting
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Cookies are
written by a
Web site on a
visitor’s hard
drive. When the
visitor returns
to that Web site,
the Web server
requests the ID
number from
the cookie and
uses it to
access the data
stored by that
server on that
visitor. The
Web site can
then use these
data to display
personalized
information.
12.27
How Cookies Identify Web Visitors
Figure 12-3
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems

The United States allows businesses to gather
transaction information and use this for other
marketing purposes

Online industry promotes self-regulation over
privacy legislation

However, extent of responsibility taken varies:

12.28

Statements of information use

Opt-out models selected over opt-in

Online “seals” of privacy principles
Most online privacy policies cannot be understood
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Technical solutions

The Platform for Privacy Preferences (P3P)

12.29

Intended to provide standard for communicating a Web
site’s privacy policies to visitor’s Web browser

User specifies privacy levels desired in browser settings

Unsuccessful
Browser features

“Private” browsing

“Do not track” feature
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Interactive Session: Technology
Life on the Grid: iPhone Becomes iTrack
• Read the Interactive Session and then discuss the
following questions:
• Why do cell phone manufacturers (Apple, Google,
and BlackBerry) want to track where their customers
go?
• Do you think cell phone customers should be able to
turn tracking off? Should customers be informed
when they are being tracked? Why or why not?
• Do you think cell phone tracking is a violation of a
person’s privacy?
12.30
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Property Rights: Intellectual Property

Intellectual property: intangible property of any kind
created by individuals or corporations

Three main ways that intellectual property is
protected:
12.31

Trade secret: intellectual work or product belonging to business,
not in the public domain

Copyright: statutory grant protecting intellectual property from
being copied for the life of the author, plus 70 years

Patents: grants creator of invention an exclusive monopoly on
ideas behind invention for 20 years
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Challenges to intellectual property rights

Digital media different from physical media (e.g.,
books)





Ease of replication
Ease of transmission (networks, Internet)
Difficulty in classifying software
Compactness
Difficulties in establishing uniqueness
• Digital Millennium Copyright Act (DMCA)

12.32
Makes it illegal to circumvent technology-based
protections of copyrighted materials
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Accountability, liability, control

Computer-related liability problems

12.33
If software fails, who is responsible?

If seen as part of machine that injures or harms, software
producer and operator may be liable

If seen as similar to book, difficult to hold author/publisher
responsible

What should liability be if software seen as service? Would
this be similar to telephone systems not being liable for
transmitted messages?
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• System quality: data quality and system
errors

What is an acceptable, technologically feasible
level of system quality?


12.34
Flawless software is economically unfeasible
Three principal sources of poor system
performance:

Software bugs, errors

Hardware or facility failures

Poor input data quality (most common source of business
system failure)
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral D …
Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP