1 Chapter 11. Using Information Ethically Managing and Using Information Systems: A Strategic Approach by Keri Pearlson PowerPoint Slides prepared by Gene.

Slides:



Advertisements
Similar presentations
Slide F 1. Slide F 2 Appendix F Payroll Accounting Learning Objectives After studying this chapter, you should be able to: 1.Compute and record the payroll.
Advertisements

Slide 1-1 Chapter 2 Principles of Accounting Analyzing Business Transactions.
Chapter 4: Income Statement and Related Information
Chapter 4: Income Statement and Related Information Intermediate Accounting, 11th ed. Kieso, Weygandt, and Warfield Prepared by Jep Robertson and Renae.
By Edgar K. Browning & Mark A. Zupan John Wiley & Sons, Inc.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Copyright 2006 John Wiley & Sons, Inc. Chapter 8 Using Information Ethically Managing and Using Information Systems: A Strategic Approach by Keri Pearlson.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
7-1 Impacts of IT Organizations, Individuals, and Society.
Schermerhorn- Chapter 61 Management, 6e Schermerhorn Prepared by Cheryl Wyrick California State Polytechnic University Pomona John Wiley & Sons, Inc.
OPERATIONS MANAGEMENT for MBAs Fourth Edition
1 OPERATIONS MANAGEMENT for MBAs Second Edition Prepared by Scott M. Shafer Wake Forest University Meredith and Shafer John Wiley and Sons, Inc.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
9-1 Supporting Management and Decision Making 9-2 The Managers and Decision Making The Manager’s job Manager decisions and computerized support Modeling.
12-1 Planning for Information Technology and Systems.
What Is Computer Ethics?
Business Process Reengineering and Information Technology
2-1 Information Technologies Concepts and Management.
Computer ethics.
TECHNOLOGY GUIDE 2: Software 1. 2 TG2.1 Introduction to Software TG2.2 Software Issues TG2.3 Systems Software TG2.4 Application Software TECHNOLOGY GUIDE.
Organizational Behavior, 9/E Schermerhorn, Hunt, and Osborn
13-1 Information Technology Economics Information Technology: Economic and Financial Trends Internal IT versus outsourcing Expanding power / declining.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
1-1 Organizations, Environments, and Information Technology.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Financial Accounting A Decision-Making Approach, 2nd Edition King, Lembke, and Smith John Wiley & Sons, Inc. Prepared by Dr. Denise English, Boise State.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
CHAPTER 1: THE PURPOSE AND USE OF FINANCIAL STATEMENTS
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
Chapter 111 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
CURRENT LIABILITIES AND CONTINGENCIES
14-1 Systems Development Concept of Systems Development Life Cycle (SDLC) Definition of SDLC Stages of SDLC Traditional versus modern SDLCs.
Financial Accounting A Decision-Making Approach, 2nd Edition King, Lembke, and Smith John Wiley & Sons, Inc. Prepared by Dr. Denise English, Boise State.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Chapter 14 Venture Capital Copyright¸ 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Chapter 31 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 14 – Information Systems, First Edition John Wiley & Sons, Inc by France Belanger and Craig Van Slyke Contributor: Brian West, University of Louisiana.
Project Management in Practice
THE ACCOUNTING INFORMATION SYSTEM Financial Accounting, Seventh Edition 3.
Chapter 5: Income Statement and Related Information Fundamentals of Intermediate Accounting Weygandt, Kieso, and Warfield Prepared by Bonnie Harrison,
Chapter 2: The Manager, the Organization, and the Team 1 Project Management in Practice Prepared by Scott M. Shafer Wake Forest University Mantel, Meredith,
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Copyright 2006 John Wiley & Sons, Inc. Beni Asllani University of Tennessee at Chattanooga Operations Management - 5 th Edition Chapter 10 Supplement Roberta.
Slide 8-1 Chapter 8 Terms Programming Languages Introduction to Information Systems Judith C. Simon.
Chapter 171 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
I- 1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
I-1. I-2 I ACCOUNTING FOR SOLE PROPRIETORSHIPS Accounting, Fifth Edition.
8-1 Transaction Processing, Innovative Functional Systems, and Supply Chain Integration.
Chapter 41 People and Quality Chapter 4 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Slide 13-2 CHAPTER 13 Statement of Cash Flows Learning objective 1: Explain the need for the statement of cash flows and identify the three types of.
Information Technology Economics
Impacts on Individuals, Organizations & Society
liquidation of a partnership.
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Module 1: Decision Making,
Data Management: Data, Databases and Warehousing
Data Management: Data, Databases and Warehousing
Presentation transcript:

1 Chapter 11. Using Information Ethically Managing and Using Information Systems: A Strategic Approach by Keri Pearlson PowerPoint Slides prepared by Gene Mesher Copyright © 2001 John Wiley & Sons, Inc.

2 Copyright  John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. Adopters of the textbook are granted permission to make back-up copies for their own use only, to make copies for distribution to students of the course the textbook is used in, and to modify this material to best suit their instructional needs. Under no circumstances can copies be made for resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

3 CONTROL OF INFORMATION

4 Figure 11.1 Mason’s areas of managerial concern zPrivacy: What information must a person reveal about one’s self to others? What info should others be able to access? What safeguards exist for your protection? zAccuracy: Who is responsible for the reliability and accuracy of information? Who will be accountable for errors? zProperty: Who owns information? Who owns the channels of distribution, and now should they be regulated? zAccessibility: What information does a person or an organization have a right to obtain, under what conditions and with what safeguards?

5 NORMATIVE THEORIES OF BUSINESS ETHICS

6 Normative theory zMeaning doing the “right” thing: principles expressed in ordinary language that can be applied to moral quandaries in business. zStockholder theory zStakeholder theory zSocial Contract theory

7 Stockholder theory zBiz. goal: maximize stockholder value. zM.Friedman: “sole resp. of business is to increase profits through open and free competition without deception or fraud” z1. Managers must employ legal means to achieve this goal. z2. Managers must take the long view of shareholder interest, forgoing short-term gains so as to maximize long term value.

8 Stakeholder theory zBiz. goal: maximize benefits to all stakeholders zStakeholder: any group whose interests the corporation vitally affects zIncludes: stockholders, customers, employees, suppliers, the local community zManagement must balance the rights of all stockholders without impinging the rights of any one particular stockholder

9 Social Contract theory zDerived from needs of managers to consider their social responsibilities to society. zSocial contract = social welfare + justice zSocial contract  managers must pursue profits in a way compatible with societal well-being zJustice  corporations must pursue profits legally, without fraud or deception, avoiding activities that injure society.

10 EMERGING ISSUES IN THE ETHICAL GOVERNANCE OF INFORMATION SYSTEMS

11 Inner and outer ethical spheres of managerial overview zOutward transactions of the business. Focus is on the customer zExample: selling [private?] customer preference information for marketing purposes zUse of information inside the corporation. Includes: internal surveillance and monitoring, deskilling, and workplace rigidity. zExample: conducting private business on company time (e.g., sending personal ).

12 Figure 11.3 Some causal connections between identified areas of ethical concern (cf. Leal (1995)) Loss of Skills Loss of Control Loss of Identity Loss of Privacy

13 FOOD FOR THOUGHT: ETHICS AND THE INTERNET

14 Ethics and the Internet zNow an issue of public debate. zE.g., consider a pornographic website: y Does the website have a responsibility to make sure only appropriate visitors view it? yWho is resp. to keep children from seeing it: yThe web author? The website host? The access site (e.g., school)? Parents? zConsider Rinaldi’s ethical rules regarding using computers (see figure 11.4). zSecurity measures may also have unforeseen consequences (see figure 11.5).

15 Fig Ten commandments of computer ethics (cf. Rinaldi, 2000) z1. Thou shalt not use a computer to harm other people. z2. Thou shalt not interfere with other people’s computer work. z3. Thou shalt not snoop around in other people’s files. z4. Thou shalt not use to steal. z5. Thou shalt not use use a computer to bear false witness. z6. Thou shalt not use or copy software for which you have not paid. z7. Thou shalt not use other people’s computer resources without authorization. z8. Thou shalt not appropriate other people’s intellectual output. z9. Thou shalt think about the social consequences of the program you write. z10. Thou shalt use a computer in ways that show consideration and respect.

16 Figure 11.5 Security and control tools (cf. Duquenoy and Whitehouse, 1999) zFirewalls zEncryption zNet OS zSecurity Info Mgmt zServer and Browser sfwe security zLabeling and Rating sfwe zFiltering/Blocking sfwe

17 End of Chapter 11