Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 Human and Ethical Issues.

Slides:



Advertisements
Similar presentations
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Advertisements

Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 9 Social and Ethical Issues in Computing: Doing the Right Thing.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Ethical and Social Issues in Information Systems
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Presented by Student Name Workplace Issues – Lecture 4.
Human and Ethical Issues 4 Technology and People 4 Positive and Negative Impacts on People at Work 4 Dependence on People for Information System Success.
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
CS 415 Social Implications of Computing Coordinator: Leo Finkelstein, Jr. Course Review.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Introduction to Computer Science
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Legislation The need for computer laws Go to Contents.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Concept #14.  In order to be successful on the job, what technology skills do you think you should develop?
Copyright Basics. Intellectual Property Intellectual Property is a unique product or idea created by an individual or organization. Common types of protection.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Epilogue The Future of Knowledge Management.
Digital Citizenship: Active Participants in a Digital World.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Custom Software Development Intellectual Property and Other Key Issues © 2006 Jeffrey W. Nelson and Iowa Department of Justice (Attach G)
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Security and Ethics Safeguards and Codes of Conduct.
Copyright Donna Min Shiroma School Library Services Advanced Technology Research Branch Office of Curriculum, Instruction and Student Support © September.
Professional Ethics and Responsibilities
The International Dimension, Part II Global Communications © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Information Design Trends Unit 4 : Sources and Standards Lecture 1: Content Management Part 1.
Ethical Implications In The Age Of Information
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Social and Professional Issues in IT Roshan Chitrakar.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition.
Chapter 16 – Careers in Information Technology
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Module 6: Computer-Augmented Environment: The Workplace
Computers: Tools for an Information Age
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
PowerPoint® Slides to Accompany
GEC 0113 Ethics in IT Practices
Chapter 13 Security and Ethical Challenges.
Presentation transcript:

Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 Human and Ethical Issues

Alter – Information Systems 4th ed. © 2002 Prentice Hall 2 Technology and People

Alter – Information Systems 4th ed. © 2002 Prentice Hall 3 Human-centered Design Vs. Machine-centered Design Human-centered design: The technology or business process is designed to make participants’ work as effective as possible Machine-centered design: The technology or business process is designed to simplify the machine’s work, and people are expected to adjust

Alter – Information Systems 4th ed. © 2002 Prentice Hall 4 User Friendliness Nature of what the user must learn and remember Intuitive and simple to use, same interface shared by multiple applications, etc. Nature of the applications Reusability and flexibility Nature of the interface Flexible, well-structured menus, easy to understand, etc.

Alter – Information Systems 4th ed. © 2002 Prentice Hall 5 Positive and Negative Impacts on People at Work

Alter – Information Systems 4th ed. © 2002 Prentice Hall 6 Health and Safety Information overload Using video display terminals at work New ergonomical issues Repetitive strain injuries Are electromagnetic emissions from the screen causing a problem?

Alter – Information Systems 4th ed. © 2002 Prentice Hall 7 Autonomy and Power Autonomy Autonomy -the degree of discretion individuals or groups have in controlling their own work Power Power – the ability to tell other people to do things

Alter – Information Systems 4th ed. © 2002 Prentice Hall 8 Use of Valued Skills IT has enhanced the skills in a wide range of jobs IT has also led to de-skilling because of computer-enforced consistency and control IT may require that workers learn new skills

Alter – Information Systems 4th ed. © 2002 Prentice Hall 9 Meaningfulness of Work Variety and scope of work Task variety – the range of different types of things people do at work Task scope – the size of the task relative to the overall purpose of the organization The nature of computer mediated work Abstractness of work

Alter – Information Systems 4th ed. © 2002 Prentice Hall 10 Dependence on People for Information System Success Skills and judgment Involvement and commitment Resistance to change Unanticipated innovations

Alter – Information Systems 4th ed. © 2002 Prentice Hall 11 Systems and Ethics

Alter – Information Systems 4th ed. © 2002 Prentice Hall 12 Ethical vs. Legal Issues

Alter – Information Systems 4th ed. © 2002 Prentice Hall 13 Privacy Physical privacy Protected by state and federal laws Can be helped by IT, e.g., caller ID Information privacy IT makes it a much broader issue Information collected for one purpose can be used for another purpose Code of fair information practices (1973)

Alter – Information Systems 4th ed. © 2002 Prentice Hall 14 Accuracy Databases containing personal data may cause harm if the data are incorrect Increased risk of identity theft

Alter – Information Systems 4th ed. © 2002 Prentice Hall 15 Property Difficult legal and ethical issues related to property rights for information, e.g., Copying and modification of creative work Posting of decryption software on the Web Cybersquatting Registering a domain in order to sell it later Unauthorized “framing” of material Hiring of employees to obtain trade secrets

Alter – Information Systems 4th ed. © 2002 Prentice Hall 16 Access Intellectual skills Access to information technology Access to information The “digital divide”