Management Information Systems: Managing the Digital Firm

Slides:



Advertisements
Similar presentations
Ethical and Social Issues in Information Systems
Advertisements

Information Technology in Organizations
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Ethical and Social Issues Related to Information/Data.
Ethical and Social Issues in Information Systems
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
Ethical and Social Issues. Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior.
Chapter Five Ethical and Social Impact of Information Systems.
1 SESSION 5 ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
5.1. LEARNING OBJECTIVES UNDERSTAND ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSUNDERSTAND ETHICAL, SOCIAL, POLITICAL ISSUES RAISED.
Chapter 4. Understanding Social and Ethical Issues Related to Systems  In the past firms paid for the legal defense of their employees enmeshed in civil.
Ethical and Social Issues in Information Systems
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Ethics Last Update Copyright Kenneth M. Chipps Ph.D
14.1 OF INFORMATION SYSTEMS CHAPTER 14. ETHICAL & SOCIAL IMPACT.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
12.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Ethical and Social Impact of Information Systems
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethical and Legal Issues in Educational Technology Professional Educator Diploma Graduate School of Education – American University in Cairo (AUC) Spring.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3.1 © 2010 by Prentice Hall Ethical and Social Issues in Information Systems Chapter 4.
4/17: Ethical & Social Issues in IS
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Lecture 7 ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM PRESENTED BY: WALTER O Angol.
4.1 © 2010 by Prentice Hall 6 Chapter Ethical and Social Issues in Information Systems.
4-1 Copyright © 2013 Pearson Canada Inc. CHAPTER FOUR Social, Ethical, and Legal Issues in Information Systems.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
4.1 Copyright © 2014 Pearson Education, Inc. Ethical and Social Issues in Information Systems Chapter 4 Video cases: Case 1: “What Net Neutrality Means.
Ethical, Social, and Political Issues in E-commerce
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
ETHICS IN THE INFORMATION AGE
Ethical and Social Issues in the Digital Firm
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Legal and Ethical Issues in E-Commerce
Chapter # 1 Overview of Ethics
ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM
Ethical and Social Issues in Information Systems
Ethical and Social Issues in Information Systems
Ethical and Social Issues in Information Systems
Ethical and Social Issues in Information Systems
Ethical and Social Issues in Information Systems
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Ethical and Social Issues in Information Systems
ETHICAL ISSUES IN INFORMATION TECHNOLOGY (CCI410) PERTEMUAN 7
Chapter 10: Privacy, Security, and Ethics
Management Information Systems: Managing the Digital Firm
Ethical and Social Issues in Information Systems
Ch8 Ethics, law and e-commerce
Ethical, Social and Political Issues
Presentation transcript:

Management Information Systems: Managing the Digital Firm Fifteenth Edition Chapter 4 Ethical and Social Issues in Information Systems If this PowerPoint presentation contains mathematical equations, you may need to check that your computer has the following installed: 1) MathType Plugin 2) Math Player (free versions available) 3) NVDA Reader (free versions available) Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved

What Ethical, Social, and Political Issues Are Raised by Information Systems? (1 of 2) Ethics Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors Advances in data storage techniques and rapidly declining associated costs are responsible for the multiplying databases on individuals, employees, customers, and potential customers There are numerous examples of business ethical failures to ask students about. You could ask how information systems or their absence might have been related to the recent financial crisis in the United States, the investment banks that have suffered heavy losses, and individuals who were able to defraud investors of millions. What role did IS have in this crisis? The Madoff Ponzi scheme is instructive: systems were used for more than twenty years to fool investors, regulators, and investigators about the true nature of Madoff’s business.

Five Moral Dimensions of the Information Age Information rights and obligations – What individuals and organizations can protect. Property rights and obligations Accountability and control – The issue of who can and will be held liable for harm done to property rights. System quality Quality of life Give examples of each of the five major issues. For example, an issue dealing with information rights might be, what rights do individuals possess with respect to themselves? What do they have a right to protect? An issue dealing with quality of life might be: what values should be preserved in an information- and knowledge-based society? An issue dealing with system quality might be: what standards of data and system quality should we demand to protect individual rights and the safety of society?

Basic Concepts: Responsibility, Accountability, and Liability Accepting the potential costs, duties, and obligations for decisions Accountability Mechanisms for identifying responsible parties Liability Permits individuals (and firms) to recover damages done to them Due process Laws are well-known and understood, with an ability to appeal to higher authorities Explain that information systems do not exist in a vacuum and that these concepts are instrumental in understanding the impact of systems and measuring their success. Ask students why liability and due process are such important ethical concepts? (A rough answer would be that they provide recourse to individuals negatively effected by mismanagement of information systems, providing incentive to “play by the rules”.)

Information Rights: Privacy and Freedom in the Internet Age (1 of 3) Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself https://www.today.com/video/how-to-protect-your- privacy-when-apps-and-devices-are-tracking-you- 1280093251754 In the United States, privacy protected by: First Amendment (freedom of speech and association) Fourth Amendment (unreasonable search and seizure) Additional federal statues (e.g., Privacy Act of 1974) Do students believe that there are sufficient protections for privacy in law? If not, what are possible methods of developing appropriate privacy protections? Table 4-3 in the text lists a variety of other laws affecting both the government and private institutions, but few areas of the private sector are as well regulated with respect to privacy. Do an in-class poll and ask students who among them feel they can control the use of their personal information on the Internet. You should get no one raising their hand.

Information Rights: Privacy and Freedom in the Internet Age (2 of 3) Fair information practices Set of principles governing the collection and use of information Basis of most U.S. and European privacy laws Used to drive changes in privacy legislation C O P P A Gramm-Leach-Bliley Act H I P A A Do-Not -Track Online Act of 2011 Explain what is meant by a “mutuality of interest between record holder and individual.” (Briefly, the individual wants to engage in a transaction, and the record holder needs information about the individual to support the transaction—both are interested parties in the transaction.)

Internet Challenges to Privacy (1 of 2) Cookies Identify browser and track visits to site Super cookies (Flash cookies) Web beacons (web bugs) Tiny graphics embedded in e-mails and web pages Monitor who is reading e-mail message or visiting site Spyware Surreptitiously installed on user’s computer May transmit user’s keystrokes or display unwanted ads Google services and behavioral targeting https://www.insecam.org/en/bycountry/US/ What are students attitudes toward these technologies? Emphasize that cookies can be useful at trusted sites, but perhaps invasive at others. Have students had any experience with spyware or web bugs on their own computers? How would they know they are being tracked?

Malware Infection is the most common type of computer security incident

Figure 4.3 How Cookies Identify Web Visitors (2 of 2) The Web server reads the user’s web browser and determines the operating system, browser name, version number, Internet address, and other information. The server transmits a tiny text file with user identification information called a cookie, which the user’s browser receives and stores on the user’s computer hard drive. When the user returns to the website, the server requests the contents of any cookie it deposited previously in the user’s computer. The Web server reads the cookie, identifies the visitor, and calls up data on the user. Figure 4.3, Page 138 Cookies are written by a website on a visitor’s hard drive. When the visitor returns to that website, the web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The website can then use these data to display personalized information. Ask students to pinpoint where potential privacy invasions might occur in the process shown above. Students may suggest that no real privacy violation is occurring in the figure, which is a legitimate point of view. If so, ask them how they might feel about a website they did not trust engaging in the displayed process.

Property Rights: Intellectual Property Intangible property of any kind created by individuals or corporations Three main ways that intellectual property is protected: Trade secret: intellectual work or product belonging to business, not in the public domain Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years Do students believe that the property rights guaranteed by trade secrets, copyrights, and patents are strong enough to avoid the theft of intellectual property online? Give an example of a trade secret (the formula for Coke; a method of doing business or business process). Give an example of a copyright (which could include the copyright of a photo or newspaper article). And give an example of a patent (such as Amazon's One Click shopping as a business process patent, or Kodak‘s claim to have a patent on digital still cameras with digital displays for a viewfinder).

Copyright