View
623
Download
1
Tags:
Embed Size (px)
Citation preview
15.15.11 © 2002 by Prentice Hall
c h a p t e r
15ETHICAL & SOCIAL ETHICAL & SOCIAL
IMPACT OF IMPACT OF INFORMATION INFORMATION
SYSTEMSSYSTEMS
15.15.22 © 2002 by Prentice Hall
LEARNING OBJECTIVESLEARNING OBJECTIVES
• ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSRAISED BY INFORMATION SYSTEMS
• IDENTIFY, APPLY MORAL DIMENSIONS OF IDENTIFY, APPLY MORAL DIMENSIONS OF INFORMATION SOCIETYINFORMATION SOCIETY
15.15.33 © 2002 by Prentice Hall
LEARNING OBJECTIVESLEARNING OBJECTIVES
• APPLY ETHICAL ANALYSISAPPLY ETHICAL ANALYSIS
• EXAMINE ETHICAL PRINCIPLES EXAMINE ETHICAL PRINCIPLES FOR CONDUCTFOR CONDUCT
• DESIGN CORPORATE POLICIES DESIGN CORPORATE POLICIES FOR ETHICAL CONDUCTFOR ETHICAL CONDUCT
15.15.44 © 2002 by Prentice Hall
MANAGEMENT CHALLENGESMANAGEMENT CHALLENGES
• UNDERSTAND ETHICAL & SOCIAL UNDERSTAND ETHICAL & SOCIAL ISSUES RELATED TO SYSTEMSISSUES RELATED TO SYSTEMS
• ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY
• MORAL DIMENSION OF MORAL DIMENSION OF INFORMATION SYSTEMSINFORMATION SYSTEMS
**
15.15.55 © 2002 by Prentice Hall
ETHICSETHICS
PRINCIPLES OF RIGHT AND WRONGPRINCIPLES OF RIGHT AND WRONG
USED BY INDIVIDUALSUSED BY INDIVIDUALS
AS FREE MORAL AGENTSAS FREE MORAL AGENTS
TO GUIDE BEHAVIORTO GUIDE BEHAVIOR
**
15.15.66 © 2002 by Prentice Hall
INDIVIDUAL
SOCIETY
POLITY
ETHICAL ISSUES
SOCIAL ISSUES
POLITICAL ISSUES
QUALITY OF LIFEQUALITY OF LIFE
INFORMATION INFORMATION RIGHTS & RIGHTS & OBLIGATIONSOBLIGATIONS
PROPERTY PROPERTY RIGHTS & RIGHTS & OBLIGATIONSOBLIGATIONS
ACCOUNTABILITY ACCOUNTABILITY & CONTROL& CONTROL
SYSTEM SYSTEM QUALITYQUALITY
ETHICAL, SOCIAL & POLITICAL ISSUESETHICAL, SOCIAL & POLITICAL ISSUES
INFORMATION INFORMATION & &
TECHNOLOGYTECHNOLOGY
15.15.77 © 2002 by Prentice Hall
• INFORMATION RIGHTS & OBLIGATIONSINFORMATION RIGHTS & OBLIGATIONS• PROPERTY RIGHTSPROPERTY RIGHTS• ACCOUNTABILITY & CONTROLACCOUNTABILITY & CONTROL
• SYSTEM QUALITYSYSTEM QUALITY
• QUALITY OF LIFEQUALITY OF LIFE
**
MORAL DIMENSIONS OF THE MORAL DIMENSIONS OF THE INFORMATION AGEINFORMATION AGE
15.15.88 © 2002 by Prentice Hall
TECHNOLOGY TRENDS & ETHICAL TECHNOLOGY TRENDS & ETHICAL ISSUESISSUES
• COMPUTING POWER DOUBLES EVERY 18 COMPUTING POWER DOUBLES EVERY 18 MONTHSMONTHS
• DECLINING COSTS OF DATA STORAGEDECLINING COSTS OF DATA STORAGE• DATA MINING ADVANCES DATA MINING ADVANCES • NETWORKING ADVANCES & INTERNETNETWORKING ADVANCES & INTERNET
**
15.15.99 © 2002 by Prentice Hall
ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY
• RESPONSIBILITY:RESPONSIBILITY: Accepting costs, Accepting costs, duties, obligations for decisionsduties, obligations for decisions
• ACCOUNTABILITY:ACCOUNTABILITY: Assessing Assessing responsibilities for decisions & actionsresponsibilities for decisions & actions
• LIABILITY:LIABILITY: Must pay for legal damages Must pay for legal damages• DUE PROCESS:DUE PROCESS: Insures laws are applied Insures laws are applied
properlyproperly
**
15.15.1010 © 2002 by Prentice Hall
ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY
ETHICAL ANALYSIS:ETHICAL ANALYSIS:• IDENTIFY, DESCRIBE FACTSIDENTIFY, DESCRIBE FACTS
• DEFINE CONFLICT, IDENTIFY VALUESDEFINE CONFLICT, IDENTIFY VALUES• IDENTIFY STAKEHOLDERSIDENTIFY STAKEHOLDERS• IDENTIFY OPTIONSIDENTIFY OPTIONS• IDENTIFY POTENTIAL CONSEQUENCESIDENTIFY POTENTIAL CONSEQUENCES
**
15.15.1111 © 2002 by Prentice Hall
ETHICAL PRINCIPLES:ETHICAL PRINCIPLES:• TREAT OTHERS AS YOU WANT TO BE TREATEDTREAT OTHERS AS YOU WANT TO BE TREATED• IF ACTION NOT RIGHT FOR EVERYONE, NOT IF ACTION NOT RIGHT FOR EVERYONE, NOT
RIGHT FOR ANYONE (KANT)RIGHT FOR ANYONE (KANT)
• IF ACTION NOT REPEATABLE, NOT RIGHT AT IF ACTION NOT REPEATABLE, NOT RIGHT AT ANY TIME (DESCARTES)ANY TIME (DESCARTES)
• PUT VALUE ON OUTCOMES, UNDERSTAND PUT VALUE ON OUTCOMES, UNDERSTAND CONSEQUENCESCONSEQUENCES
• INCUR LEAST HARM OR COSTINCUR LEAST HARM OR COST• NO FREE LUNCHNO FREE LUNCH
**
ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY
15.15.1212 © 2002 by Prentice Hall
INFORMATION RIGHTSINFORMATION RIGHTS
PRIVACY:PRIVACY: Right to be left alone Right to be left alone
FAIR INFORMATION PRACTICESFAIR INFORMATION PRACTICES (FIP)(FIP)::• NO SECRET PERSONAL RECORDSNO SECRET PERSONAL RECORDS• INDIVIDUALS CAN ACCESS, AMEND INDIVIDUALS CAN ACCESS, AMEND
INFORMATION ABOUT THEMINFORMATION ABOUT THEM• USE INFO ONLY WITH PRIOR CONSENTUSE INFO ONLY WITH PRIOR CONSENT
• MANAGERS ACCOUNTABLE FOR MANAGERS ACCOUNTABLE FOR DAMAGE DONE BY SYSTEMSDAMAGE DONE BY SYSTEMS
• GOVERNMENTS CAN INTERVENEGOVERNMENTS CAN INTERVENE
**
15.15.1313 © 2002 by Prentice Hall
U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
GENERAL FEDERAL PRIVACY LAWS:GENERAL FEDERAL PRIVACY LAWS:
FREEDOM OF INFORMATION ACT, 1968FREEDOM OF INFORMATION ACT, 1968
PRIVACY ACT OF 1974PRIVACY ACT OF 1974
ELECTRONIC COMMUNICATIONS PRIVACY ACT OF ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 19861986
COMPUTER MATCHING AND PRIVACY COMPUTER MATCHING AND PRIVACY PROTECTION ACT OF 1988PROTECTION ACT OF 1988
COMPUTER SECURITY ACT OF 1987COMPUTER SECURITY ACT OF 1987
FEDERAL MANAGERS FINANCIAL INTEGRITY ACT FEDERAL MANAGERS FINANCIAL INTEGRITY ACT OF 1982OF 1982
**
15.15.1414 © 2002 by Prentice Hall
PRIVACY LAWS AFFECTING PRIVATE PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS:INSTITUTIONS:
FAIR CREDIT REPORTING ACT, 1970FAIR CREDIT REPORTING ACT, 1970
FAMILY EDUCATION RIGHTS & PRIVACY ACT OF FAMILY EDUCATION RIGHTS & PRIVACY ACT OF 19781978
RIGHT TO FINANCIAL PRIVACY ACT OF 1978RIGHT TO FINANCIAL PRIVACY ACT OF 1978
PRIVACY PROTECTION ACT OF 1980PRIVACY PROTECTION ACT OF 1980
CABLE COMMUNICATIONS POLICY ACT OF 1984CABLE COMMUNICATIONS POLICY ACT OF 1984
ELECTRONIC COMMUNICATIONS PRIVACY ACT OF ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 19971997
**
U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
15.15.1515 © 2002 by Prentice Hall
MORE PRIVACY LAWS AFFECTING PRIVATE MORE PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS:INSTITUTIONS:
VIDEO PRIVACY PROTECTION ACT OF 1988VIDEO PRIVACY PROTECTION ACT OF 1988
CONSUMER INTERNET PRIVACY PROTECTION CONSUMER INTERNET PRIVACY PROTECTION ACT OF 1997ACT OF 1997
COMMUNICATIONS PRIVACY & CONSUMER COMMUNICATIONS PRIVACY & CONSUMER EMPOWERMENT ACT OF 1997EMPOWERMENT ACT OF 1997
DATA PRIVACY ACT OF 1997DATA PRIVACY ACT OF 1997
CONSUMER INTERNET PRIVACY PROTECTION CONSUMER INTERNET PRIVACY PROTECTION ACT OF 1999ACT OF 1999
**
U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS
15.15.1616 © 2002 by Prentice Hall
ETHICAL ISSUES:ETHICAL ISSUES: Who is morally Who is morally responsible for consequences of responsible for consequences of use?use?
SOCIAL ISSUES:SOCIAL ISSUES: What should society What should society expect and allow?expect and allow?
POLITICAL ISSUES:POLITICAL ISSUES: To what extent To what extent should government intervene, should government intervene, protect?protect?
**
ACCOUNTABILITY, LIABILITY & ACCOUNTABILITY, LIABILITY & CONTROLCONTROL
15.15.1717 © 2002 by Prentice Hall
INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
INTELLECTUAL PROPERTY:INTELLECTUAL PROPERTY: Intangible Intangible creations protected by lawcreations protected by law
TRADE SECRET:TRADE SECRET: Intellectual work or Intellectual work or product belonging to business, not in product belonging to business, not in public domainpublic domain
COPYRIGHT:COPYRIGHT: Statutory grant protecting Statutory grant protecting intellectual property from copying by intellectual property from copying by others for 28 yearsothers for 28 years
**
15.15.1818 © 2002 by Prentice Hall
INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
TRADE MARK:TRADE MARK: Legally registered mark, Legally registered mark, device, or name to distinguish one’s device, or name to distinguish one’s goodsgoods
PATENT:PATENT: Legal document granting owner Legal document granting owner exclusive monopoly on an invention for 17 exclusive monopoly on an invention for 17 yearsyears
**
15.15.1919 © 2002 by Prentice Hall
ETHICAL ISSUES:ETHICAL ISSUES: When is software or When is software or service ready for release?service ready for release?
SOCIAL ISSUES:SOCIAL ISSUES: Can people trust quality of Can people trust quality of software, services, data?software, services, data?
POLITICAL ISSUES:POLITICAL ISSUES: Should congress or Should congress or industry develop standards for software, industry develop standards for software, hardware, data quality?hardware, data quality?
**
SYSTEM QUALITY: SYSTEM QUALITY: DATA QUALITY & DATA QUALITY & SYSTEM ERRORSSYSTEM ERRORS
15.15.2020 © 2002 by Prentice Hall
QUALITY OF LIFEQUALITY OF LIFE
CENTRALIZATION VS. DECENTRALIZATIONCENTRALIZATION VS. DECENTRALIZATION
RAPID CHANGE:RAPID CHANGE: Reduced response time to Reduced response time to competitioncompetition
MAINTAINING BOUNDARIES:MAINTAINING BOUNDARIES: Family, work, Family, work, leisureleisure
DEPENDENCE AND VULNERABILITYDEPENDENCE AND VULNERABILITY
COMPUTER CRIME & ABUSECOMPUTER CRIME & ABUSE
**
15.15.2121 © 2002 by Prentice Hall
QUALITY OF LIFEQUALITY OF LIFE
EMPLOYMENT:EMPLOYMENT: Trickle-down Trickle-down technology; reengineering job losstechnology; reengineering job loss
EQUITY & ACCESS:EQUITY & ACCESS: Increasing racial Increasing racial & social class cleavages& social class cleavages
HEALTH RISKSHEALTH RISKS **
15.15.2222 © 2002 by Prentice Hall
QUALITY OF LIFEQUALITY OF LIFE
HEALTH RISKS:HEALTH RISKS: • REPETITIVE STRESS INJURY (RSI)REPETITIVE STRESS INJURY (RSI)• CARPAL TUNNEL SYNDROME (CTS)CARPAL TUNNEL SYNDROME (CTS)• COMPUTER VISION SYNDROME (CVS)COMPUTER VISION SYNDROME (CVS)• TECHNOSTRESS: Irritation, hostility, TECHNOSTRESS: Irritation, hostility,
impatience, enervation, fearimpatience, enervation, fear
• VDT RADIATIONVDT RADIATION**
15.15.2323 © 2002 by Prentice Hall
INTERNET CRIME & ABUSEINTERNET CRIME & ABUSE
• HACKING:HACKING: Access to proprietary data Access to proprietary data• JAMMING:JAMMING: Tie up host computer Tie up host computer
• MALICIOUS SOFTWARE:MALICIOUS SOFTWARE: Viruses disable Viruses disable computercomputer
• SNIFFING:SNIFFING: Intercept data passing through Intercept data passing through system, e.g. credit card datasystem, e.g. credit card data
• SPOOFING:SPOOFING: Fraudulent misrepresentation Fraudulent misrepresentation
**