Ethical, Social And Security Issues In Information Systems

3y ago
48 Views
3 Downloads
796.42 KB
83 Pages
Last View : 6d ago
Last Download : 3m ago
Upload by : Aarya Seiber
Transcription

Essentials of Business Information SystemsEthical, Social and SecurityIssues in Information SystemsAcknowledgement: Most of the slides ManagementInformation Systems: Managing the Digital Firm, byLaudon, J. and Laudon, K., Published by: Prentice Hall;11th edition (2010)7.1 2007 by Prentice Hall

Some Ethical & Social cases What ethical, social, and political issues areraised by information systems? What are impacts of having and obeying Ethical &Privacy cases?7.2 2007 by Prentice Hall

Some Ethical & Social Issues In Australia– It is illegal to marry before the age of 18– It unethical but not illegal to bear a child at the ageof 15– To live together (male & female) is neither illegalnor unethical Do all countries have the same ethical and social code Name a few international ethical and social codes?7.3 2007 by Prentice Hall

Understanding Ethical and Social Issues Related to Systems In Australia7.4 One doctor can not provide patient data without writtenpermission from the patient Medical labs can not provide report to any one other than thepatient Personal data held in one organization can not be used byanother organization (this includes police, defense, ForeignAffairs and taxation) Australian public doesn't want national ID card for the fear ofprivacy concerns Flight info of one can not be given to other One can not make inquiry on behalf of others Video evidence in courts is not acceptable 2007 by Prentice Hall

A Case Someone was bugging me . I learned that he had .and I also knew that . I was anxious to verify my info from the systems thatI had access to and then perhaps initiate an actionagainst him. But I didn't didn’t access info from thesystems, because . Why?7.5 2007 by Prentice Hall

A Case One person made a mess in the toilet at work while 7.6making ablution (wadhu)Someone objected to itPerson said, my English was poor, could you writeHe didThe person went to court, who ordered acompensation 2007 by Prentice Hall

A Case A friend of mine working in a governmentdepartment, one day, gave me a CD containingmany records of airplane accidents in Australia When I informed of this to my supervisor, hesaid the CD was a problem bomb and I shoulddestroy it immediately, which I did Why did my supervisor warned me?7.7 2007 by Prentice Hall

EthicsPrinciples of right and wrong thatindividuals, acting as free moral agents,use to make choices to guide theirbehaviors7.8 2007 by Prentice Hall

Essentials of Business Information SystemsUnderstanding Ethical and Social Issues Related to Systems Information systems and ethics Information systems raise new ethicalquestions because they createopportunities for: Intense social change, threatening existingdistributions of power, money, rights, andobligations New kinds of crime7.9 2007 by Prentice Hall

A Case While working at an information sensitivegovernment department, I was approached bya friend to find out. What were the privacy issues? What you think could be penalty the penalyhad I provided info7.10 2007 by Prentice Hall

Essentials of Business Information SystemsUnderstanding Ethical and Social Issues Related to SystemsA Model for Thinking About Ethical, Social, andPolitical Issues Society as a calm pond IT as rock dropped in pond, creating ripples ofnew situations not covered by old rules Social and political institutions cannot respondovernight to these ripples—it may take years todevelop etiquette, expectations, laws Requires understanding of ethics to makechoices in legally gray areas7.11 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsUnderstanding Ethical and Social Issues Related to SystemsThe Relationship Among Ethical, Social, PoliticalIssues in an Information SocietyThe introduction of new information technologyhas a ripple effect, raising new ethical, social,and political issues that must be dealt with onthe individual, social, and political levels. Theseissues have five moral dimensions: informationrights and obligations, property rights andobligations, system quality, quality of life, andaccountability and control.7.12Figure 12-1 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsUnderstanding Ethical and Social Issues Related to SystemsFive Moral Dimensions of the Information Age1. Information rights and obligations2. Property rights and obligations3. Accountability and control4. System quality5. Quality of life7.13 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsUnderstanding Ethical and Social Issues Related to SystemsKey Technology Trends That Raise Ethical Issues Doubling of computer power More organizations depend on computer systems forcritical operations Rapidly declining data storage costs Organizations can easily maintain detailed databases onindividuals Networking advances and the Internet Copying data from one location to another and accessingpersonal data from remote locations are much easier7.14 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsUnderstanding Ethical and Social Issues Related to SystemsKey Technology Trends That Raise Ethical Issues Advances in data analysis techniques Companies can analyze vast quantities of data gathered onindividuals for: Profiling Combining data from multiple sources to createdossiers of detailed information on individuals Nonobvious relationship awareness (NORA) Combining data from multiple sources to findobscure hidden connections that might help identifycriminals or terrorists7.15 2007 by Prentice Hall

Airport Abbreviation One fine day I received two ASIO officerswho came to see me at work at the UC At that time I then was the General Secretaryof the Islamic Society of my state The officers talked about general issues forover half an hour At the end they discussed a specific issue withme7.16 2007 by Prentice Hall

Essentials of Business Information SystemsUnderstanding Ethical and Social Issues Related to SystemsCredit card purchasescan make personalinformation availableto market researchers,telemarketers, anddirect-mailcompanies. Advancesin informationtechnology facilitatethe invasion ofprivacy.7.17 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsUnderstanding Ethical and Social Issues Related to SystemsNonobvious Relationship Awareness (NORA)Figure 12-2NORA technology can takeinformation about people fromdisparate sources and findobscure, nonobvious relationships.It might discover, for example, thatan applicant for a job at a casinoshares a telephone number with aknown criminal and issue an alertto the hiring manager.7.18 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsEthics in an Information Society Basic concepts for ethical analysis Responsibility: Accepting the potential costs, duties, and obligations fordecisions Accountability: Mechanisms for identifying responsible parties Liability: Permits individuals (and firms) to recover damages done tothem Due process: Laws are well known and understood, with an ability to appealto higher authorities7.19 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsEthics in an Information Society Ethical analysis: A five-step process1. Identify and clearly describe the facts2. Define the conflict or dilemma and identify thehigher-order values involved3. Identify the stakeholders4. Identify the options that you can reasonably take5. Identify the potential consequences of youroptions7.20 2007 by Prentice Hall

Essentials of Business Information SystemsEthics in an Information Society Candidate Ethical Principles Golden Rule Immanuel Kant’s Categorical Imperative If an action is not right for everyone to take, it is not rightfor anyoneDescartes' rule of change 7.21Do unto others as you would have them do unto youIf an action cannot be taken repeatedly, it is not right totake at all 2007 by Prentice Hall

Essentials of Business Information SystemsEthics in an Information Society Candidate Ethical Principles (cont.) Utilitarian Principle Risk Aversion Principle Take the action that produces the least harm or leastpotential costEthical “no free lunch” rule 7.22Take the action that achieves the higher or greater valueAssume that virtually all tangible and intangible objectsare owned by someone unless there is a specificdeclaration otherwise 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsEthics in an Information Society Professional codes of conduct Promulgated by associations of professionals E.g. AMA, ABA, AITP, ACMPromises by professions to regulate themselvesin the general interest of society Real-world ethical dilemmas7.23 One set of interests pitted against another E.g. Right of company to maximize productivity ofworkers vs. workers right to use Internet for shortpersonal tasks 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age Privacy: 7.24Claim of individuals to be left alone, free fromsurveillance or interference from other individuals,organizations, or state. Claim to be able to controlinformation about yourselfIn U.S., privacy protected by: First Amendment (freedom of speech) Fourth Amendment (unreasonable search and seizure) Additional federal statues (e.g. Privacy Act of 1974) 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems 7.25Fair information practices: Set of principles governing the collection and use ofinformation Basis of most U.S. and European privacy laws Based on mutuality of interest between record holder andindividual Restated and extended by FTC in 1998 to provide guidelinesfor protecting online privacy 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems FTC FIP principles: Notice/awareness (core principle): Choice/consent (core principle): Consumers must be able to choose how information isused for secondary purposesAccess/participation: 7.26Web sites must disclose practices before collectingdataConsumers must be able to review, contest accuracy ofpersonal data 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems FTC FIP principles (cont.) Security: Enforcement: 7.27Data collectors must take steps to ensure accuracy,security of personal dataMust be mechanism to enforce FIP principles 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems European Directive on Data Protection: Requires companies to inform people when theycollect information about them and disclose how itwill be stored and used. Requires informed consent of customer EU member nations cannot transfer personal datato countries without similar privacy protection(e.g. U.S.) U.S. businesses use safe harbor framework Self-regulating policy and enforcement that meetsobjectives of government legislation but does not involvegovernment regulation or enforcement.7.28 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems Internet Challenges to Privacy: 7.29Cookies Tiny files downloaded by Web site to visitor’s hard drive Identify visitor’s browser and track visits to site Allow Web sites to develop profiles on visitorsWeb bugs Tiny graphics embedded in e-mail messages and Web pages Designed to monitor who is reading message and transmitinformation to another computerSpyware Surreptitiously installed on user’s computer May transmit user’s keystrokes or display unwanted ads 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems7.30 U.S. allows businesses to gather transactioninformation and use this for other marketingpurposes (Data selling in India) Online industry promotes self-regulation overprivacy legislation, however, extent ofresponsibility taken varies Most Web sites do not have any privacy policies 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems Technical solutions 7.31The Platform for Privacy Preferences (P3P) Allows Web sites to communicate privacy policies tovisitor’s Web browser – user User specifies privacy levels desired in browsersettings E.g. “medium” level accepts cookies from first-partyhost sites that have opt-in or opt-out policies butrejects third-party cookies that use personallyidentifiable information without an opt-in policy 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsHow Cookies Identify Web VisitorsCookies are written by a Web site on a visitor’shard drive. When the visitor returns to that Website, the Web server requests the ID numberfrom the cookie and uses it to access the datastored by that server on that visitor. The Website can then use these data to displaypersonalized information.7.32Figure 12-3 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsWeb sites are postingtheir privacy policiesfor visitors to review.The TRUSTe sealdesignates Web sitesthat have agreed toadhere to TRUSTe’sestablished privacyprinciples ofdisclosure, choice,access, and security.7.33 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property Intellectual property: Intangible property of any kindcreated by individuals or corporations Three main ways that intellectual property isprotected7.34 Trade secret: Intellectual work or product belonging tobusiness, not in the public domain Copyright: Statutory grant protecting intellectual propertyfrom being copied for the life of the author, plus 70 years Patents: Grants creator of invention an exclusive monopolyon ideas behind invention for 20 years 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems Challenges to Intellectual Property Rights Digital media different from physical media (e.g.books) Ease of replicationEase of transmission (networks, Internet)Difficulty in classifying softwareCompactnessDifficulties in establishing uniqueness Digital Millennium Copyright Act (DMCA) 7.35Makes it illegal to circumvent technology-basedprotections of copyrighted materials 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems Accountability, Liability, Control Computer-related liability problemsIf software fails, who is responsible? 7.36 If seen as part of machine that injures or harms,software producer and operator may be liable If seen as similar to book, difficult to holdauthor/publisher responsible What should liability be if software seen as service?Would this be similar to telephone systems not beingliable for transmitted messages? 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsQuality of Life: Equity, Access, and Boundaries 7.37Negative social consequences of systems Balancing power: Although computing powerdecentralizing, key decision-making remainscentralized Rapidity of change: Businesses may not have enoughtime to respond to global competition Maintaining boundaries: Computing, Internet uselengthens work-day, infringes on family, personal time Dependence and vulnerability: Public and privateorganizations ever more dependent on computersystems 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems Computer crime and abuse Computer crime: Commission of illegal acts through useof compute or against a computer system – computermay be object or instrument of crime Computer abuse: Unethical acts, not illegal Spam: High costs for businesses in dealing with spam Employment: Reengineering work resulting in lost jobs Equity and access – the digital divide:7.38 Certain ethnic and income groups in the United Statesless likely to have computers or Internet access What about poor nations? 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information Systems Health risks:Repetitive stress injury (RSI) 7.39 Largest source is computer keyboards Carpal Tunnel Syndrome (CTS) Computer vision syndrome (CVS) Technostress Role of radiation, screen emissions, low-levelelectromagnetic fields 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsRepetitive stress injury(RSI) is the leadingoccupational diseasetoday. The singlelargest cause of RSI iscomputer keyboardworkPunching bag7.40 2007 by Prentice Hall

Essentials of Business Information SystemsEthical and Social Issues in Information SystemsThe Moral Dimensions of Information SystemsInteractive Session: PeopleFlexible Scheduling at WalWal-Mart: Good or Bad for Employees? Read the Interactive Session and then discuss thefollowing questions: What is the ethical dilemma facing Wal-Mart in thiscase? Do Wal-Mart’s associates also face an ethicaldilemma? If so, what is it? What ethical principles apply to this case? How dothey apply? What are the potential effects of computerizedscheduling on employee morale? What are theconsequences of these effects for Wal-Mart?7.41 2007 by Prentice Hall

Essentials of Business Information SystemsSecuring Information SystemsSTUDENT LEARNING OBJECTIVES Why are information systems vulnerable todestruction, error, and abuse? What is the business value of security andcontrol? What are the components of an organizationalframework for security and control? Evaluate the most important tools andtechnologies for safeguarding informationresources.7.42 2007 by Prentice Hall

Essentials of Business Information SystemsSecuring Information SystemsOnline Games Need Security, Too Problem: Threat ofattacks fromhackers hoping tosteal informationor gaming assets. Solutions: Deployan advancedsecurity system toidentify threatsand reducehacking attempts.7.43 2007 by Prentice Hall

Essentials of Business Information SystemsSecuring Information SystemsOnline Games Need Security, Too NetContinuum’s NC-2000 AG firewall andCenzic’s ClickToSecure service work in tandemto minimize the chance of a security breach. Demonstrates IT’s role in combating cyber crime. Illustrates digital technology’s role in achievingsecurity on the Web.7.44 2007 by Prentice Hall

Essentials of Business Information SystemsSecuring Information SystemsOnline Games Need Security, Too7.45

Key Technology Trends That Raise Ethical Issues Advances in data analysis techniques Companies can analyze vast quantities of data gathered on individuals for: Understanding Ethical and Social Issues Related to Systems Essentials of Business Information Systems Ethical and Social Issues in Information Systems 7.15 2007 by Prentice .

Related Documents:

Chapter Chapter 5 5 Ethical and Social Issues in the Digital FirmEthical and Social Issues in the Digital Firm UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS Key Technology Trends Raise Ethical Issues (Continued) Rapidly declining data storage costs: Lowers the tf ti h ti ldtb Key Technology Trends Raise Ethical Issues (Continued)

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues 4.2 ETHICS IN AN INFORMATION SOCIETY Basic Concepts; Responsibility, Accountability, Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct

Key Technology Trends That Raise Ethical Issues Ethical issues long preceded information technology. Nevertheless, information technology has heightened ethical concerns, taxed existing social arrangements, and made some laws obsolete or severely crippled. There are four key technological trends responsible for these ethical stresses and they .

UK Data Service – Big data and data sharing: Ethical issues This a brief introduction to ethical issues arising in social research with big data. It is not comprehensive, instead, it emphasises ethical issues that are most germane to data curation and data sharing.

Malaysian setting and ethical principles in counseling practices. The main objective of this paper is to apply the code of ethics and ethical principles in solving ethical issues. The impending conclusion and implication will also be discussed. Keyword: Code of ethics, Ethical Principles, Counselor, Board of Counselor, Counseling 1. Introduction

Note: all Web references in these Powerpoint slides verified as at 4-Aug-16. CITS3200: Ethical Issues - Alex Reid 2/96. CONTENTS. A. Why Computer Ethics? B. Some Ethical/Moral/Social Issues . Introduce the Computer Society Code of Ethics/Conduct as a basis. 5. Introduce a Framework for addressing ethical issues. 6. Provide background for your .

EMC Overview 43 Immunity Issues Can Exist Due To The Following Most of today’s electrical and electronic systems rely on active devices such as microprocessors and digital logic for: –Control of system functions. –User convenience / features. –Legislated system requirements (such as mobile telephone location reporting). With today’s vast networks for data communication there .