Expert answer:Ethics Assignment (2 pages)You have access to the sales and customer information in a flower shop. You discover that the boyfriend of a woman you know is sending roses to three other women on a regular basis. The woman you know is on the flower list, but she believes that she’s the only woman in his romantic life. You really think you should tell the woman. Your dilemma is that you have a professional responsibility to keep the company’s information private. However, you also believe that you have a responsibility to the woman. Do you tell her? Are there factors that would change your decision? Each student should individually consider the additional information below. Indicate whether any one or more of these factors would change your decision. Then form a consensus.
laudon_ethics_pp_chap12.ppt
mist315_ethics_assignment.pdf
Unformatted Attachment Preview
Laudon & Laudon Textbook
“Essentials of Management Information Systems”
Chapter 12
Ethical and Social Issues
in Information Systems
Video Cases:
Case 1 Net Neutrality: Neutral Networks Work
Case 2 Data Mining for Terrorists and Innocents
Instructional Videos:
Instructional Video 1 Big Brother (NSA) is Copying Everything on the Internet
12.1
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
STUDENT OBJECTIVES
• What ethical, social, and political issues are raised
by information systems?
• What specific principles for conduct can be used to
guide ethical decisions?
• Why do contemporary information systems
technology and the Internet pose challenges to the
protection of individual privacy and intellectual
property?
• How have information systems affected everyday
life?
12.2
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Behavioral Targeting and Your Privacy: You’re the Target
• Problem: need
to efficiently
target online ads
• Solution:
Behavioral
targeting allows
businesses and
organizations to
more precisely
target desired
demographics
12.3
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Behavioral Targeting and Your Privacy: You’re the Target
• Google uses tracking files to monitor user
activity on thousands of sites; businesses
monitor activity on their own sites to better
understand customers.
• Demonstrates IT’s role in organizing and
distributing information
• Illustrates the ethical questions inherent in
online information gathering
12.4
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Behavioral Targeting and Your Privacy: You’re the Target
12.5
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
• Recent cases of failed ethical judgment in
business
• Lehman Brothers, IBM, Tyson Foods
• In many, information systems used to bury
decisions from public scrutiny
• Ethics
• Principles of right and wrong that individuals,
acting as free moral agents, use to make
choices to guide their behaviors
12.6
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
• Information systems and ethics
• Information systems raise new ethical
questions because they create
opportunities for:
• Intense social change, threatening existing
distributions of power, money, rights, and
obligations
• New kinds of crime
12.7
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
A Model for Thinking About Ethical, Social, and
Political Issues
• Society as a calm pond
• IT as rock dropped in pond, creating ripples of
new situations not covered by old rules
• Social and political institutions cannot respond
overnight to these ripples—it may take years to
develop etiquette, expectations, laws
• Requires understanding of ethics to make
choices in legally gray areas
12.8
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
The Relationship Among Ethical, Social, Political
Issues in an Information Society
The introduction of new
information technology
has a ripple effect, raising
new ethical, social, and
political issues that must
be dealt with on the
individual, social, and
political levels. These
issues have five moral
dimensions: information
rights and obligations,
property rights and
obligations, system
quality, quality of life, and
accountability and control.
Figure 12-1
12.9
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Five Moral Dimensions of the Information Age
1. Information rights and obligations
2. Property rights and obligations
3. Accountability and control
4. System quality
5. Quality of life
12.10
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Key Technology Trends That Raise Ethical Issues
• Doubling of computer power
• More organizations depend on computer systems for critical
operations
• Rapidly declining data storage costs
• Organizations can easily maintain detailed databases on
individuals
• Networking advances and the Internet
• Copying data from one location to another and accessing
personal data from remote locations are much easier
12.11
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Key Technology Trends That Raise Ethical Issues
• Advances in data analysis techniques
• Profiling
• Combining data from multiple sources to create dossiers of
detailed information on individuals
• Nonobvious relationship awareness (NORA)
• Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists
• Mobile device growth
• Tracking of individual cell phones
12.12
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Credit card purchases
can make personal
information available
to market researchers,
telemarketers, and
direct-mail companies.
Advances in
information
technology facilitate
the invasion of
privacy.
12.13
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Understanding Ethical and Social Issues Related to Systems
Nonobvious Relationship Awareness (NORA)
NORA technology can
take information about
people from disparate
sources and find
obscure, nonobvious
relationships. It might
discover, for example,
that an applicant for a
job at a casino shares a
telephone number with a
known criminal and
issue an alert to the
hiring manager.
Figure 12-2
12.14
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Basic concepts for ethical analysis
• Responsibility:
• Accepting the potential costs, duties, and obligations for decisions
• Accountability:
• Mechanisms for identifying responsible parties
• Liability:
• Permits individuals (and firms) to recover damages done to them
• Due process:
• Laws are well known and understood, with an ability to appeal to
higher authorities
12.15
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Ethical analysis: a five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the
higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably take
5. Identify the potential consequences of your
options
12.16
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Candidate Ethical Principles
•
Golden Rule
•
•
Immanuel Kant’s Categorical Imperative
•
•
If an action is not right for everyone to take, it is not right for
anyone
Descartes’ Rule of Change
•
12.17
Do unto others as you would have them do unto you.
If an action cannot be taken repeatedly, it is not right to take
at all.
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Candidate Ethical Principles (cont.)
•
Utilitarian Principle
•
•
Risk Aversion Principle
•
•
Take the action that produces the least harm or potential cost.
Ethical “No Free Lunch” Rule
•
12.18
Take the action that achieves the higher or greater value.
Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise.
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
Ethics in an Information Society
• Professional codes of conduct
•
Promulgated by associations of professionals
•
•
E.g., AMA, ABA, AITP, ACM
Promises by professions to regulate themselves
in the general interest of society
• Real-world ethical dilemmas
•
One set of interests pitted against another
•
12.19
E.g., right of company to maximize productivity of workers
versus workers right to use Internet for short personal tasks
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Some Real-World Ethical Dilemmas
•
Using information technology to reduce size
of workforce
•
12.20
Voice recognition software
•
Monitoring workers activities on the
computer
•
Facebook sells subscriber information to
advertisers
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Information Rights: Privacy and Freedom in the Internet Age
•
Privacy:
•
•
12.21
Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself.
In the United States, privacy protected by:
•
First Amendment (freedom of speech)
•
Fourth Amendment (unreasonable search and seizure)
•
Additional federal statues (e.g., Privacy Act of 1974)
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Fair information practices:
•
•
•
•
•
Set of principles governing the collection and use of
information
Basis of most U.S. and European privacy laws
Based on mutuality of interest between record holder
and individual
Restated and extended by FTC in 1998 to provide
guidelines for protecting online privacy
Used to drive changes in privacy legislation
•
•
•
12.22
COPPA
Gramm–Leach–Bliley Act
HIPAA
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
•
FTC FIP principles:
•
Notice/awareness (core principle)
•
•
Choice/consent (core principle)
•
•
Consumers must be able to choose how information is used
for secondary purposes
Access/participation
•
12.23
Web sites must disclose practices before collecting data
Consumers must be able to review, contest accuracy of
personal data
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
•
FTC FIP principles (cont.)
•
Security
•
•
Enforcement
•
12.24
Data collectors must take steps to ensure accuracy, security
of personal data
Must be mechanism to enforce FIP principles
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
•
European Directive on Data Protection:
•
Companies must inform people information is
collected and disclose how it is stored and used
•
Requires informed consent of customer
•
EU member nations cannot transfer personal data
to countries without similar privacy protection
(e.g., the United States)
•
U.S. businesses use safe harbor framework
•
Self-regulating policy and enforcement that meets objectives
of government legislation but does not involve government
regulation or enforcement
12.25
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
•
Internet Challenges to Privacy:
• Cookies
•
•
•
•
Super cookies (Flash cookies)
Web beacons (Web bugs)
•
•
•
•
12.26
Tiny files downloaded by Web site to visitor’s hard drive
Identify visitor’s browser and track visits to site
Tiny graphics embedded in e-mail messages and Web pages
Monitor who is reading e-mail message or visiting site
Spyware
•
Surreptitiously installed on user’s computer
•
May transmit user’s keystrokes or display unwanted ads
Google services and behavioral targeting
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Cookies are
written by a
Web site on a
visitor’s hard
drive. When the
visitor returns
to that Web site,
the Web server
requests the ID
number from
the cookie and
uses it to
access the data
stored by that
server on that
visitor. The
Web site can
then use these
data to display
personalized
information.
12.27
How Cookies Identify Web Visitors
Figure 12-3
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
•
The United States allows businesses to gather
transaction information and use this for other
marketing purposes
•
Online industry promotes self-regulation over
privacy legislation
•
However, extent of responsibility taken varies:
•
12.28
•
Statements of information use
•
Opt-out models selected over opt-in
•
Online “seals” of privacy principles
Most online privacy policies cannot be understood
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Technical solutions
•
The Platform for Privacy Preferences (P3P)
•
12.29
•
Intended to provide standard for communicating a Web
site’s privacy policies to visitor’s Web browser
•
User specifies privacy levels desired in browser settings
•
Unsuccessful
Browser features
•
“Private” browsing
•
“Do not track” feature
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Interactive Session: Technology
Life on the Grid: iPhone Becomes iTrack
• Read the Interactive Session and then discuss the
following questions:
• Why do cell phone manufacturers (Apple, Google,
and BlackBerry) want to track where their customers
go?
• Do you think cell phone customers should be able to
turn tracking off? Should customers be informed
when they are being tracked? Why or why not?
• Do you think cell phone tracking is a violation of a
person’s privacy?
12.30
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
Property Rights: Intellectual Property
•
Intellectual property: intangible property of any kind
created by individuals or corporations
•
Three main ways that intellectual property is
protected:
12.31
•
Trade secret: intellectual work or product belonging to business,
not in the public domain
•
Copyright: statutory grant protecting intellectual property from
being copied for the life of the author, plus 70 years
•
Patents: grants creator of invention an exclusive monopoly on
ideas behind invention for 20 years
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Challenges to intellectual property rights
•
Digital media different from physical media (e.g.,
books)
•
•
•
•
•
Ease of replication
Ease of transmission (networks, Internet)
Difficulty in classifying software
Compactness
Difficulties in establishing uniqueness
• Digital Millennium Copyright Act (DMCA)
•
12.32
Makes it illegal to circumvent technology-based
protections of copyrighted materials
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• Accountability, liability, control
•
Computer-related liability problems
•
12.33
If software fails, who is responsible?
•
If seen as part of machine that injures or harms, software
producer and operator may be liable
•
If seen as similar to book, difficult to hold author/publisher
responsible
•
What should liability be if software seen as service? Would
this be similar to telephone systems not being liable for
transmitted messages?
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral Dimensions of Information Systems
• System quality: data quality and system
errors
•
What is an acceptable, technologically feasible
level of system quality?
•
•
12.34
Flawless software is economically unfeasible
Three principal sources of poor system
performance:
•
Software bugs, errors
•
Hardware or facility failures
•
Poor input data quality (most common source of business
system failure)
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of Management Information Systems
Chapter 12 Ethical and Social Issues in Information Systems
The Moral D …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more