MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 1: The Context of SA&D Methods
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER.
Copyright ©2016 Cengage Learning. All Rights Reserved
E-Commerce: Regulatory, Ethical, and Social Environments
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Issues in Implementing Technology in Schools
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS CHAPTER 3
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved E-Commerce Specialist.
Computer Ethics for Computer Users
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS Do you know the difference between right and wrong?
1 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER.
Class Discussion Notes MKT April 10, 2001.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Monitoring Employees on Networks: Unethical or Good Business?
Ethics, Computing, and the Internet
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
System Users and Developers
Security and Ethics Safeguards and Codes of Conduct.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Unit 5 Ethics. Set of moral principles that govern decisions and actions.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computers Are Your Future Twelfth Edition
Copyright ©2016 Cengage Learning. All Rights Reserved
Chapter 16 – Careers in Information Technology
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
E-Commerce: Regulatory, Ethical, and Social Environments
Copyright ©2016 Cengage Learning. All Rights Reserved
Ethics & Privacy CSCI 101.
Intellectual Property Rights
Presentation transcript:

MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI

Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems l e a r n i n g o u t c o m e s LO1 Discuss information privacy and methods for improving the privacy of information. LO2 Explain the effects on information privacy of e-mail, data collection, and censorship. LO3 Discuss the ethical issues related to information technology . LO4 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.

l e a r n i n g o u t c o m e s (cont’d.) Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems l e a r n i n g o u t c o m e s (cont’d.) LO5 Discuss information system issues that affect organizations, including the digital divide, electronic publishing, and on the connection between the workplace and employees’ health. LO6 Describe green computing and the ways it can improve the quality of the environment.

Privacy Issues Concerns about privacy in the workplace Employers search social networking sites Employee monitoring systems Misuse and abuse of information gathered by: Healthcare organizations Financial institutions Legal firms Defining privacy is difficult Information technologies have increased ease of access to information

Social Networking Sites and Privacy Issues Stacy Snyder Former student at Millersville University of Pennsylvania Posted a photo of herself on MySpace, wearing a pirate’s hat and drinking Millersville administrators Considered the image unprofessional Refused to grant her an education degree and teaching certificate

Privacy Issues (cont’d.) Number of databases increasing rapidly Enforcement of federal laws has been lax Index and link databases using Social Security numbers Direct marketing companies major user of this information U.S. government began linking large databases to find information

Privacy Issues (cont’d.) Federal laws now regulate collecting and using information on people and corporations 1970 Fair Credit Reporting Act Acceptable use policies Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance Accountability Issues involving both the user’s and the organization’s responsibilities and liabilities

Privacy Issues (cont’d.) Nonrepudiation Method for binding all the parties to a contract Hardware or software controls Determine what personal information is provided on the Web

E-mail Presents some serious privacy issues Spam Ease of access Unsolicited e-mail sent for advertising purposes Sent in bulk by using automated mailing software Ease of access People should assume that others have access to their messages Any e-mails sent on company-owned computers are the property of the organization

Data Collection on the Web Number of people shopping online is increasing Many customers reluctant to make online purchases Concerns about hackers getting access to their credit card numbers Many credit card companies reimburse fraudulent charges Other electronic payment systems are being developed

Data Collection on the Web (cont’d.) Concerned about computers’ contents being searched while they’re connected to the Web Information users provide on the Web Combined with other information and technologies to produce new information Cookies Small text files with a unique ID tag Embedded in a Web browser Saved on the user’s hard drive Many users disable cookies

Data Collection on the Web (cont’d.) Log files Generated by Web server software Record a user’s actions on a Web site Data collected on the Web must be used and interpreted with caution

Ethical Issues of Information Technologies Ethics means doing the right thing What is “right” can vary from one culture to another and even from one person to another More difficult to determine than legal versus illegal

Ethical Issues of Information Technologies (cont’d.) Information technology offers many opportunities for unethical behavior Cybercrime, cyberfraud, identity theft, and intellectual property theft Many experts believe management can reduce employees’ unethical behavior Codes of ethics Many associations promote ethically responsible use of information systems and technologies

Ten Commandments of Computer Ethics Thou shalt not use a computer to harm other people Thou shalt not interfere with other people’s computer work Thou shalt not snoop around in other people’s files Thou shalt not use a computer to steal Thou shalt not use a computer to bear false witness

Ten Commandments of Computer Ethics (cont’d.) Thou shalt not use or copy software for which you have not paid Thou shalt not use other people’s computer resources without authorization Thou shalt not appropriate other people’s intellectual output Thou shalt think about the social consequences of the program you write Thou shalt use a computer in ways that show consideration and respect

Censorship Who decides what should be on the Web? Types of information Public Private Whether or not something can be censored depends in part on who is doing the censoring Restricted access to the Web Burma, China, and Singapore U.S. citizens don’t want the government controlling Web access

Censorship (cont’d.) Parents are concerned about what their children are exposed to Pornography, violence, and adult language Search keywords Guidelines to teach their children to use good judgment while on the Web Programs such as CyberPatrol, CyberSitter, Net Nanny, and SafeSurf

Intellectual Property Protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses Industrial property Inventions, trademarks, logos, and industrial designs Copyrighted material Literary and artistic works May apply to online materials Exceptions under Fair Use Doctrine

Intellectual Property (cont’d.) Trademark Protects product names and identifying marks Patent Protects new processes Organizations can benefit from patents Software piracy Laws Telecommunications Act of 1996 Communications Decency Act (CDA) Laws against spamming

Intellectual Property (cont’d.) Internet use policy Avoid legal risks Cybersquatting Registering, selling, or using a domain name to profit from someone else’s trademark

Verizon’s Cybersquatting Suit Verizon sued OnlineNic OnlineNic registered domain names containing Verizon trademarks myverizonwireless.com iphoneverizonplans.com verizon-cellular. com Verizon won this suit

Social Divisions and the Digital Divide Computers still aren’t affordable for many people Companies installing cables for Internet connections might subject their communities to a type of economic “red-lining” Children are often victims of this divide Funding for computers at schools and libraries Loaner programs

The Impact of Information Technology in the Workplace New jobs for: Programmers Systems analysts Database and network administrators Network engineers Webmasters Web page developers e-commerce specialists Chief information officers (CIOs) Technicians

The Impact of Information Technology in the Workplace (cont’d.) Web designers Java programmers Web troubleshooters Telecommuting and virtual work Job deskilling Skilled labor eliminated by introducing high technology Job downgraded from a skilled to a semiskilled or unskilled position

Table 4.1 Potential benefits and potential drawbacks of telecommuting

The Impact of Information Technology in the Workplace (cont’d.) Job upgrading Clerical workers who now use computers One skilled worker might be capable doing the job of several workers Virtual organizations Networks of independent companies, suppliers, customers, and manufacturers Connected via information technologies Share skills and costs Have access to each other’s market

Information Technology and Health Issues Reports of health-related issues caused by video display terminals (VDTs) No conclusive study Health problems associated with the environment in which computers are used

Information Technology and Health Issues (cont’d.) Other reports of health problems Vision Musculoskeletal Skin Reproductive Stress-related Amount of time some people spend on the Web

Health and Social Issues of Online Gaming Online games World of Warcraft and EverQuest blamed for a host of problems Poor academic performance, divorce, suicide, and the death of a child because of parental neglect Fantasy worlds in online games believed to be addictive and to affect marriages and careers

Green Computing Computing that promotes a sustainable environment and consumes the least amount of energy Helps an organization save on energy costs Improves the quality of the environment in which we live and work

Green Computing (cont’d.) Involves the design, manufacture, use, and disposal of computers, servers, and computing devices Monitors, printers, storage devices, and networking and communications equipment Minimal impact on the environment Implemented without the cooperation of both the private and the public sector Goals

Summary Privacy issues related to information technologies Methods for protecting privacy: Personal information and organizations’ data resources Ethical issues related to information systems Censorship, intellectual property laws, digital divide Effect of information systems on the workplace and possible heath issues Green computing Impact on the environment