We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJayden Haley
Modified over 2 years ago
15.1 © 2002 by Prentice Hall c h a p t e r 15 ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
15.2 © 2002 by Prentice Hall LEARNING OBJECTIVES ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMS IDENTIFY, APPLY MORAL DIMENSIONS OF INFORMATION SOCIETYIDENTIFY, APPLY MORAL DIMENSIONS OF INFORMATION SOCIETY*
15.3 © 2002 by Prentice Hall LEARNING OBJECTIVES APPLY ETHICAL ANALYSISAPPLY ETHICAL ANALYSIS EXAMINE ETHICAL PRINCIPLES FOR CONDUCTEXAMINE ETHICAL PRINCIPLES FOR CONDUCT DESIGN CORPORATE POLICIES FOR ETHICAL CONDUCTDESIGN CORPORATE POLICIES FOR ETHICAL CONDUCT*
15.4 © 2002 by Prentice Hall MANAGEMENT CHALLENGES UNDERSTAND ETHICAL & SOCIAL ISSUES RELATED TO SYSTEMSUNDERSTAND ETHICAL & SOCIAL ISSUES RELATED TO SYSTEMS ETHICS IN AN INFORMATION SOCIETYETHICS IN AN INFORMATION SOCIETY MORAL DIMENSION OF INFORMATION SYSTEMSMORAL DIMENSION OF INFORMATION SYSTEMS*
15.5 © 2002 by Prentice Hall ETHICS PRINCIPLES OF RIGHT AND WRONG USED BY INDIVIDUALS AS FREE MORAL AGENTS TO GUIDE BEHAVIOR *
15.6 © 2002 by Prentice Hall INDIVIDUAL SOCIETY POLITY ETHICAL ISSUES SOCIAL ISSUES POLITICAL ISSUES QUALITY OF LIFE QUALITY OF LIFE INFORMATION RIGHTS & OBLIGATIONS PROPERTY RIGHTS & OBLIGATIONS ACCOUNTABILITY & CONTROL SYSTEM QUALITY ETHICAL, SOCIAL & POLITICAL ISSUES INFORMATION & TECHNOLOGY
15.7 © 2002 by Prentice Hall INFORMATION RIGHTS & OBLIGATIONSINFORMATION RIGHTS & OBLIGATIONS PROPERTY RIGHTSPROPERTY RIGHTS ACCOUNTABILITY & CONTROLACCOUNTABILITY & CONTROL SYSTEM QUALITYSYSTEM QUALITY QUALITY OF LIFEQUALITY OF LIFE* MORAL DIMENSIONS OF THE INFORMATION AGE
15.8 © 2002 by Prentice Hall TECHNOLOGY TRENDS & ETHICAL ISSUES COMPUTING POWER DOUBLES EVERY 18 MONTHSCOMPUTING POWER DOUBLES EVERY 18 MONTHS DECLINING COSTS OF DATA STORAGEDECLINING COSTS OF DATA STORAGE DATA MINING ADVANCESDATA MINING ADVANCES NETWORKING ADVANCES & INTERNETNETWORKING ADVANCES & INTERNET*
15.9 © 2002 by Prentice Hall ETHICS IN AN INFORMATION SOCIETY RESPONSIBILITY: Accepting costs, duties, obligations for decisionsRESPONSIBILITY: Accepting costs, duties, obligations for decisions ACCOUNTABILITY: Assessing responsibilities for decisions & actionsACCOUNTABILITY: Assessing responsibilities for decisions & actions LIABILITY: Must pay for legal damagesLIABILITY: Must pay for legal damages DUE PROCESS: Insures laws are applied properlyDUE PROCESS: Insures laws are applied properly*
15.10 © 2002 by Prentice Hall ETHICS IN AN INFORMATION SOCIETY ETHICAL ANALYSIS: IDENTIFY, DESCRIBE FACTSIDENTIFY, DESCRIBE FACTS DEFINE CONFLICT, IDENTIFY VALUESDEFINE CONFLICT, IDENTIFY VALUES IDENTIFY STAKEHOLDERSIDENTIFY STAKEHOLDERS IDENTIFY OPTIONSIDENTIFY OPTIONS IDENTIFY POTENTIAL CONSEQUENCESIDENTIFY POTENTIAL CONSEQUENCES*
15.11 © 2002 by Prentice Hall ETHICAL PRINCIPLES: TREAT OTHERS AS YOU WANT TO BE TREATEDTREAT OTHERS AS YOU WANT TO BE TREATED IF ACTION NOT RIGHT FOR EVERYONE, NOT RIGHT FOR ANYONE (KANT)IF ACTION NOT RIGHT FOR EVERYONE, NOT RIGHT FOR ANYONE (KANT) IF ACTION NOT REPEATABLE, NOT RIGHT AT ANY TIME (DESCARTES)IF ACTION NOT REPEATABLE, NOT RIGHT AT ANY TIME (DESCARTES) PUT VALUE ON OUTCOMES, UNDERSTAND CONSEQUENCESPUT VALUE ON OUTCOMES, UNDERSTAND CONSEQUENCES INCUR LEAST HARM OR COSTINCUR LEAST HARM OR COST NO FREE LUNCHNO FREE LUNCH* ETHICS IN AN INFORMATION SOCIETY
15.12 © 2002 by Prentice Hall INFORMATION RIGHTS PRIVACY: Right to be left alone FAIR INFORMATION PRACTICES (FIP): NO SECRET PERSONAL RECORDSNO SECRET PERSONAL RECORDS INDIVIDUALS CAN ACCESS, AMEND INFORMATION ABOUT THEMINDIVIDUALS CAN ACCESS, AMEND INFORMATION ABOUT THEM USE INFO ONLY WITH PRIOR CONSENTUSE INFO ONLY WITH PRIOR CONSENT MANAGERS ACCOUNTABLE FOR DAMAGE DONE BY SYSTEMSMANAGERS ACCOUNTABLE FOR DAMAGE DONE BY SYSTEMS GOVERNMENTS CAN INTERVENEGOVERNMENTS CAN INTERVENE*
15.13 © 2002 by Prentice Hall U.S. FEDERAL PRIVACY LAWS GENERAL FEDERAL PRIVACY LAWS: FREEDOM OF INFORMATION ACT, 1968 PRIVACY ACT OF 1974 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 COMPUTER MATCHING AND PRIVACY PROTECTION ACT OF 1988 COMPUTER SECURITY ACT OF 1987 FEDERAL MANAGERS FINANCIAL INTEGRITY ACT OF 1982 *
15.14 © 2002 by Prentice Hall PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS: FAIR CREDIT REPORTING ACT, 1970 FAMILY EDUCATION RIGHTS & PRIVACY ACT OF 1978 RIGHT TO FINANCIAL PRIVACY ACT OF 1978 PRIVACY PROTECTION ACT OF 1980 CABLE COMMUNICATIONS POLICY ACT OF 1984 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1997 * U.S. FEDERAL PRIVACY LAWS
15.15 © 2002 by Prentice Hall MORE PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS: VIDEO PRIVACY PROTECTION ACT OF 1988 CONSUMER INTERNET PRIVACY PROTECTION ACT OF 1997 COMMUNICATIONS PRIVACY & CONSUMER EMPOWERMENT ACT OF 1997 DATA PRIVACY ACT OF 1997 CONSUMER INTERNET PRIVACY PROTECTION ACT OF 1999 * U.S. FEDERAL PRIVACY LAWS
15.16 © 2002 by Prentice Hall ETHICAL ISSUES: Who is morally responsible for consequences of use? SOCIAL ISSUES: What should society expect and allow? POLITICAL ISSUES: To what extent should government intervene, protect? * ACCOUNTABILITY, LIABILITY & CONTROL
15.17 © 2002 by Prentice Hall INTELLECTUAL PROPERTY INTELLECTUAL PROPERTY: Intangible creations protected by law TRADE SECRET: Intellectual work or product belonging to business, not in public domain COPYRIGHT: Statutory grant protecting intellectual property from copying by others for 28 years *
15.18 © 2002 by Prentice Hall INTELLECTUAL PROPERTY TRADE MARK: Legally registered mark, device, or name to distinguish ones goods PATENT: Legal document granting owner exclusive monopoly on an invention for 17 years *
15.19 © 2002 by Prentice Hall ETHICAL ISSUES: When is software or service ready for release? SOCIAL ISSUES: Can people trust quality of software, services, data? POLITICAL ISSUES: Should congress or industry develop standards for software, hardware, data quality? * SYSTEM QUALITY: DATA QUALITY & SYSTEM ERRORS
15.20 © 2002 by Prentice Hall QUALITY OF LIFE CENTRALIZATION VS. DECENTRALIZATION RAPID CHANGE: Reduced response time to competition MAINTAINING BOUNDARIES: Family, work, leisure DEPENDENCE AND VULNERABILITY COMPUTER CRIME & ABUSE *
15.21 © 2002 by Prentice Hall QUALITY OF LIFE EMPLOYMENT: Trickle-down technology; reengineering job loss EQUITY & ACCESS: Increasing racial & social class cleavages HEALTH RISKS *
15.22 © 2002 by Prentice Hall QUALITY OF LIFE HEALTH RISKS: REPETITIVE STRESS INJURY (RSI)REPETITIVE STRESS INJURY (RSI) CARPAL TUNNEL SYNDROME (CTS)CARPAL TUNNEL SYNDROME (CTS) COMPUTER VISION SYNDROME (CVS)COMPUTER VISION SYNDROME (CVS) TECHNOSTRESS: Irritation, hostility, impatience, enervation, fearTECHNOSTRESS: Irritation, hostility, impatience, enervation, fear VDT RADIATIONVDT RADIATION*
15.23 © 2002 by Prentice Hall INTERNET CRIME & ABUSE HACKING: Access to proprietary dataHACKING: Access to proprietary data JAMMING: Tie up host computerJAMMING: Tie up host computer MALICIOUS SOFTWARE: Viruses disable computerMALICIOUS SOFTWARE: Viruses disable computer SNIFFING: Intercept data passing through system, e.g. credit card dataSNIFFING: Intercept data passing through system, e.g. credit card data SPOOFING: Fraudulent misrepresentationSPOOFING: Fraudulent misrepresentation*
15.24 © 2002 by Prentice Hall MANAGEMENT ACTIONS: A CORPORATE CODE OF ETHICS INFORMATION RIGHTS & OBLIGATIONS PROPERTY RIGHTS & OBLIGATIONS ACCOUNTABILITY & CONTROL SYSTEM QUALITY QUALITY OF LIFE *
15.25 © 2002 by Prentice Hall c h a p t e r 15 ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
CHAPTER 4 (U PDATED N OV. 26, 2013) Social, Ethical, & Legal Issues in ISs.
Ethical and Social Issues in Information Systems DIS 302 E-Business.
1 CHAPTER 10. ETHICAL IMPLICATIONS OF INFORMATION TECHNOLOGY Management Information Systems, 9 th edition, By Raymond McLeod, Jr. and George P. Schell.
Information Technology INT1001 Lecture 11 Ethical, Legal & Social Issues in IT 1.
Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo’a i A.Tawalbeh Arab Academy for Banking & Financial Sciences.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
A dialogue document July The Challenge In a country that expects the best of everything we fail to achieve the best in health. What must be.
Ethics and Social Responsibility Chapter 5. Copyright © 2005 by South-Western, a division of Thomson Learning. All rights reserved. 2 Ethics and Social.
Chapter 15 Legal & Ethical Issues. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Ethical Issues –What is Ethics? –Major Threats –Improving.
1 Gramm-Leach-Bliley Act (GLBA) Implementation of the Safeguards Rule Information Security Program University of Minnesota (Adapted from the Federal Trade.
1 Information Security and Privacy Training for [the Agency] Information System Security Officers June 12 & 13, 2000.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 14-1 MANAGING INFORMATION TECHNOLOGY 7 th EDITION CHAPTER 14 INFORMATION SECURITY.
Lawyers Patent and Trade-mark Agents Lawyers · Patent and Trade-mark Agents WORKPLACE VIOLENCE: LEGAL OBLIGATIONS AND RESPONSIBILITIES November 30, 2005.
Essentials of Contemporary Management, 1Ce. Copyright © 2005 The McGraw-Hill Companies, Inc. All rights reserved. 3-1 Managing Ethics, Social Responsibility,
Principles of Information Security, 3rd Edition2 Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Star Wars in the New Millennium: Cyber Liability and Data Risk.
1 The HIPAA Privacy Rule: Scope, Structure, and Implementation James G. Hodge, Jr., J.D., LL.M. Associate Professor, Johns Hopkins Bloomberg School of.
1 IAPP Privacy Certification Workplace Privacy Certified Information Privacy Professional (CIPP) James Koenig Practice Co-leader, Privacy Strategy and.
Dawn D. Bennett-Alexander Laura P. Hartman. Legal Construction of the Employment Environment Chapter 3 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill.
1 NISTIR 7628 Guidelines to Smart Grid Cyber Security Volume II: Privacy Briefing February 16, 2011 CSWG Privacy Subgroup Lead: Rebecca Herold
The Legal Framework for Creating Trust in Cyberspace: Security and Privacy Skopje March 2006 James X. Dempsey Center for Democracy & Technology Global.
1 HIPAA Privacy Standards Health Insurance Portability and Accountability Act – HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003.
Legal Framework Chapter 5. Learning outcomes Explain difference between patent and copyright Computer Miss use Act List 8 principles of Data protection.
Breach Response TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
1 ON- LINE TRAINING EVENT HIPAA (Health Insurance Portability & Accountability Act) ENTER.
PRESENTATION for WIPO July 2005 Suriname & St. Lucia by WILLY MANFROY President Licensing Executives Society International and Bornivall LLC Jamaica &
1 PowerPoint ® to accompany Second Edition Ramutkowski Booth Pugh Thompson Whicker Copyright © The McGraw-Hill Companies, Inc. Permission required for.
CHAPTER 10 MANAGING IT SYSTEMS Staying on Track. As the Business Environment Changes... Introduction Your IT systems will not take care of themselves.
1 Gurmeet S Jakhu, Partner Hamilton Pratt Solicitors Birmingham, United Kingdom Topic 7: IP Issues in a Franchise Agreement.
© 2016 SlidePlayer.com Inc. All rights reserved.