MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell

Slides:



Advertisements
Similar presentations
CHAPTER 10. ETHICAL IMPLICATIONS OF INFORMATION TECHNOLOGY
Advertisements

Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
1 Pertemuan 22 Implikasi etika dalam TI Matakuliah: M0084/Sistem Informasi dalam Manajemen Tahun: 2005 Versi: 1/1.
Ethical, Social and Environmental Responsibilities Unit 3 June 20131Dr Vidya Kumar.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
COMP427 Business Ethics. Objectives 1.To understand ethics and why its important in ways that are consistent with a code of principles. 2.Understand why.
Social Responsibility and Ethics in Strategic Management
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Texas City Municipal Police Association 2012 Satisfaction Survey.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
Strategic Planning and the Marketing Management Process
Chapter 29 Ethics in Accounting
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and.
Software Engineering Code Of Ethics And Professional Practice
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Economics, Ethics and Markets
Learning Objective Chapter 19 Values and Ethics Copyright © 2001 South-Western College Publishing Co. Objectives O U T L I N E Defining Business Ethics.
Guiding principles for the Federal acquisition system
Professional Codes of Ethics Professionalism and Codes of Ethics.
Business Ethics and Social Responsibility
Chapter 2 Business Ethics and Social Responsibility Learning Goals 5 1
Ethics and Social Responsibility
Basic Principles: Ethics and Business
5-1 Ethics To examine the role of ethical behavior in business finance. 2. To illustrate the role of unethical behavior in the downfall of.
© 2013 South-Western, a part of Cengage Learning. All rights reserved. Chapter 2 | Slide 1 Being Ethical and Socially Responsible Chapter2.
1-1 Strategic Planning and the Marketing Management Process Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
2- Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 11 Organizational Theory, Design, and Change Sixth Edition Gareth R. Jones Chapter.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
S OFTWARE E NGINEERING C ODE O F E THICS A ND P ROFESSIONAL P RACTICE Software Engineering Ethics and Professional Practices © 1999 by the Institute of.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
By: M.Nadeem Akhtar1 CHAPTER 05. ETHICAL IMPLICATIONS OF INFORMATION TECHNOLOGY.
Business Ethics and Social Responsibility Chapter 2.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Chapter 5: Social Responsibility
Ethics.
McGraw-Hill© 2003 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill© 2003 The McGraw-Hill Companies, Inc. All rights reserved Chapter.
Part Two: The Culture of Management Chapter 3: Managing Social Responsibility and Ethics Chapter 4: Managing Employee Diversity Chapter 5: Managing Organizational.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 13 Evaluating Corporate Ethics Understanding Business Ethics Stanwick.
From Obligation to Responsiveness to Responsibility
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2015 Pearson Education, Inc. 2-1 # Understanding Business Ethics and Social.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Management, Eleventh Edition by Stephen P. Robbins & Mary Coulter ©2012 Pearson Education,
Ethics. What are ethics Ethics is the study of our notions of right and wrong In essence ethics are our moral compass.
An Overview of Ethics. L E A R N I N G O B J E C T I V E S What is ethics, and why is it important to act according to a code of ethics? Why is business.
Basic Principles: Ethics and Business
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Chapter 4 Ethics and Social Responsibility. Social responsibility - a business’s intention, beyond its legal and economic obligations, to do the right.
Professional Ethics and Responsibilities Part-II
1 Management Information Systems M Agung Ali Fikri, SE. MM.

MGMT 452 Corporate Social Responsibility
Chapter # 1 Overview of Ethics
CHAPTER 10 ETHICAL IMPLICATIONS OF INFORMATION TECHNOLOGY
Management Information Systems, 10/e
Professional Codes of Ethics
MANAGEMENT INFORMATION SYSTEMS 7/E
Chapter 8 Developing an Effective Ethics Program
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell
Ethical Use of Computers
How An Organization Influences Ethical Decision-Making
Computer Ethics.
Ethics IN PRIVATE SECURITY
Chapter # 2 Ethics for IT workers & IT Users
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell
CS-480b Network Security Dick Steflik
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell
Presentation transcript:

MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell Chapter 5 Ethical Implications of Information Technology 5-1 Copyright 2001 Prentice-Hall, Inc. 1

Socially Conscionable Citizens Morals Traditions of right and wrong Ethics Suite of guiding beliefs, standards, or ideals that promote an individual or community Laws Formal rules of conduct that a sovereign authority imposes on its citizens 5-2 2

Pirated Software Software that is illegally copied and then used or sold 35% in U.S. 92% in Japan 99% in Thailand Some cultures encourage sharing 5-3

Laws Lag Behind First computer crime In 1966, a programmer used computer code to keep his checking account from being flagged as overdrawn. When the bank discovered the crime the programmer could not be charged with a computer crime because no computer crime law existed. He was charged with making false bank records. 5-4

U.S. Computer Legislation Freedom of Information Act of 1966 Gave citizens and organizations the right to access data held by the federal government Fair Credit Reporting Act of 1970 Dealt with handling of credit data Right to Federal Privacy Act of 1978 Limited government’s ability to search bank records 5-5

U.S. Computer Legislation (cont.) Small Business Computer Security and Education Act (1984) Advises Congress on matters relating to computer crime against small businesses Counterfeit Access Device and Computer Fraud and Abuse Act Makes it a crime to gain unauthorized information pertaining to national security or foreign relations and provides other protection 5-6

U.S. Computer Legislation (cont.) In 1986, Electronic Communications Privacy Act was rewritten to cover digital, data, and video communications Included special section on email Computer Matching and Privacy Act of 1988 Restricts government’s right to match computer files for the purpose of determining eligibility for government programs or identifying debtors 5-7

Imposing an Ethics Culture Corporate credo Succinct statement of values a firm seeks to uphold Ethics programs System of multiple activities designed to provide employees with direction in carrying out corporate credo Tailored corporate codes Codes of ethics for a particular organization or industry 5-8 4

Imposes the Ethics Culture Top-level Management Imposes the Ethics Culture In a Top-down Manner 2. Establish ethics programs 3. Establish corporate ethics code 1. Establish credo An Ethics Culture 5-9 5

Example of a Corporate Credo Commitment to customer: The first commitment is to provide our customers with quality products and services that are innovative and technologically responsive to their current requirements at appropriate prices. To perform these tasks with integrity requires that we maintain confidentiality and protect customer privacy, promote customer satisfaction, and serve customer needs. We strive to serve qualified customers and industries that are socially responsible according to broadly accepted community and company standards. 5-10

Ethics Audit Internal auditor meets with a manager for the purpose of learning how the manager’s unit is carrying out the corporate credo 5-11

Computer Ethics Analysis of the nature and social impact of computer technology as well as corresponding formulation and justification of policies for the ethical use of such technology 5-12 7

Responsibility for Computer Ethics CIO holds primary responsibility CIO Must: Be aware of how the computer is affecting society Do something about this by formulating policies to ensure technology is being used in the right way 5-13

Importance of Computer Ethics Logical malleability Ability to program computer to do anything you want it to do The transformation factor Computers can change the way things are done The invisibility factor Invisible programming Invisible complex calculations Invisible abuse 5-14 7

Rights to the Computer Right to computer access Right to computer skills Right to computer specialists Right to computer decision making 5-15 8

Rights to Information PAPA Right to privacy Right to accuracy Right to property Right to access PAPA 5-16 9

Social Contract of IS The computer will not be used to unduly invade a person’s privacy Every measure will be taken to ensure the accuracy of computer processing The sanctity of intellectual property will be protected The computer will be made accessible to society so that its members can avoid the indignities of information illiteracy and deprivation 5-17 10

Ethics and the CIO Perceptions of the CIO’s Ethics Do not take advantage of opportunities to act unethically Ethics breeds success Firms and managers have social responsibilities Managers back up their ethics beliefs with action 5-18 18

The CIO is Influenced by a Hierarchy of Factors Laws Professional codes of ethics Corporate ethics culture Office of the CIO Social pressure Personal pressures 5-19

CIOs Usually Do Not Act Unethically Question Agree Disagree There are many opportunities for 47.5 37.7 MIS managers in my company to engage in unethical behavior. MIS managers in my company 19.7 80.3 engage in behaviors that I consider to be unethical. 5-20

Ethics and Success Question Agree Disagree Percent Percent Successful MIS managers in my company are generally more ethical than unsuccessful managers. 73.8 13.1 In order to succeed in my company it is often necessary to compromise one's ethics. 18.0 75.4 Successful managers in my company withhold information that is detrimental to their self-interest. 21.3 50.8 5-21 21

Ethics (cont.) Question Agree Disagree Percent Percent Successful managers in my company make rivals look bad in the eyes of important people in my company. 23.0 59.0 Successful managers in my company look for a scapegoat when they feel they may be associated with failure. 23.0 67.2 Successful managers in my company take credit for the ideas and accomplishments of others. 16.4 75.4 5-22 21

Corporate Social Responsibility Percent Percent Question Agree Disagree The socially responsible manager must occasionally place the interests of society over the interests of the company. 68.9 21.3 The fact that corporations have great economic power in our society means that they have a social responsibility beyond the interests of the shareholders. 96.7 3.3 As long as corporations generate acceptable shareholder returns, managers have a social responsibility beyond the interests of shareholders. 70.5 16.4 5-23 21

Achieving an Ethical Computer Operation 1. Formulate a code of conduct. 2. Establish rules of procedure relating to such issues as personal use of computer services and proprietary rights to computer programs and data. 3. Make clear the sanctions that will be taken against offenders-such as reprimands, termination, and civil action. 4. Recognize ethical behavior. Parker’s 10-Step Action Plan 5-24 24

Achieving an Ethical Computer Operation (cont.) 5. Focus attention on ethics by means of such programs as training sessions and required reading. 6. Promote computer crime laws by keeping employees informed. 7. Keep a formal record that establishes accountability of each information specialist for her or his actions, and also minimizes the temptations for violations by means of such programs as ethics audits. Parker’s 10-Step Action Plan 5-25 25

Achieving an Ethical Computer Operation (cont.) 8. Encourage the use of rehabilitation programs that treat ethics violators in the same way that corporations show concern for the recovery of alcoholics or drug offenders. 9. Encourage participation in professional societies. 10. Set an example. Parker’s 10-Step Action Plan 5-26 26

Ethics Perspective Severe social problems exist because government and business organizations have failed to uphold the highest ethical standards in computer use Invasion of privacy Software piracy CIOs can make a difference 5-27

An Information Services Code of Conduct Conduct all activities in a manner that precludes any form of dishonesty Avoid any act that compromises integrity Avoid any act that might create a dangerous situation Not use alcohol or drugs while at work See Figure 5.4 5-28

An Information Services Code of Conduct (cont.) Maintain courteous and professional relations with users, associates, and supervisors Adhere to the no-solicitation rule and any other employment policy See Figure 5.4 5-29

An Information Services Code of Conduct (cont.) Protect confidentiality of sensitive information about the organization’s competitive position, trade secrets, or assets Exercise sound business practice in the management of such company resources such as personnel, computer use, outside services, travel, and entertainment See Figure 5.4 5-30

Summary Morals, laws, and ethics govern behavior Early years No computer laws Easy to bypass regulation Executives impose ethical culture Computer ethics require executive to put proper policies in place 5-31

Summary [cont.] Society places importance on computer ethics Logical malleability Transforming ways of living Processes are hidden from view Societal rights in relation to the computer 5-32