4/17: Ethical & Social Issues in IS

Slides:



Advertisements
Similar presentations
Ethical and Social Issues in Information Systems
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Social, Ethical, & Legal Issues in ISs
BUSINESS B2 Ethics.
Information Technology in Organizations
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Ethical and Social Issues in Information Systems
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Ethical and Social Issues. Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior.
Chapter Five Ethical and Social Impact of Information Systems.
1 SESSION 5 ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM.
ITIS 1210 Introduction to Web-Based Information Systems Ethical & Social Issues.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3 Ethics and Privacy.
5.1. LEARNING OBJECTIVES UNDERSTAND ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSUNDERSTAND ETHICAL, SOCIAL, POLITICAL ISSUES RAISED.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 4. Understanding Social and Ethical Issues Related to Systems  In the past firms paid for the legal defense of their employees enmeshed in civil.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
11/9: Ethics in IT: Computer Crime
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Ethics Last Update Copyright Kenneth M. Chipps Ph.D
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
14.1 OF INFORMATION SYSTEMS CHAPTER 14. ETHICAL & SOCIAL IMPACT.
Who wants to be an IT Ethics Millionaire. Rules of Play You will get between 30 seconds and 2 minutes to formulate your answer You can opt out at any.
12.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Professional Ethics Its not all about right & wrong.
1 ETHICAL ISSUES INTRODUCTION to E-COMMERCE (COMM1Q) Ethical Issues: source; Laudon & Laudon, Management Information Systems 7th Edn., Prentice-Hall, 1998.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Ethical and Social Impact of Information Systems
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
ETHICAL AND SOCIAL IMPACT OF INFORMATION SYSTEMS
Ethical and Legal Issues in Educational Technology Professional Educator Diploma Graduate School of Education – American University in Cairo (AUC) Spring.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
Security and Ethics Safeguards and Codes of Conduct.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Lecture 7 ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM PRESENTED BY: WALTER O Angol.
4.1 © 2010 by Prentice Hall 6 Chapter Ethical and Social Issues in Information Systems.
4-1 Copyright © 2013 Pearson Canada Inc. CHAPTER FOUR Social, Ethical, and Legal Issues in Information Systems.
Professional Ethics and Responsibilities Part-II
4.1 Copyright © 2014 Pearson Education, Inc. Ethical and Social Issues in Information Systems Chapter 4 Video cases: Case 1: “What Net Neutrality Means.
ETHICS Internet And Online Community Week 10.
Ethical and Social Issues in the Digital Firm
Ethical, Social, and Political Issues in E-commerce
ETHICS IN THE INFORMATION AGE
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Internet And Online Community Week 10
ETHICAL ISSUES IN INFORMATION TECHNOLOGY (CCI410) PERTEMUAN 7
Ethical and Social Issues in Information Systems
Ch8 Ethics, law and e-commerce
Ethical, Social and Political Issues
Management Information Systems: Managing the Digital Firm
Presentation transcript:

4/17: Ethical & Social Issues in IS Define ethics, responsibility, accountability, liability, due process Technology trends that raise ethical issues Ethical analysis An ethical dilemma to consider Four moral dimensions of the information age Information rights & obligations Property rights Accountability & control System quality Computer crime

Definitions Ethics: Principles of right & wrong used by free individuals to make choices in their behavior. Responsibility: Accepting the potential costs, duties, and obligations for one’s decisions. Accountability: Ways of assessing responsibility for decisions made and actions taken. Liability: Laws that permit individuals to recover the damages done to them by others. Due process: Laws are known & understood, and decisions can be appealed to higher authorities.

Trends raising ethical issues Increased dependence on computers Companies shut down if their hardware, software, or networks shut down. Multiplying databases Remember Infospace.com? Profiling: Use of computers to combine data from multiple sources to crease electronic dossiers of detailed information on individuals. Is this an invasion of privacy?

Ethical Analysis Identify & describe clearly the facts. Define the conflict or dilemma, identify the higher-order values involved. Identify the stakeholders. Identify the options that can be reasonably taken. Identify the potential consequences of your options.

Ethical Perspectives to Consider Do unto others as you would have them do unto you. If it’s not right for everyone to do, it’s not right for anyone. If an action cannot be taken repeatedly, it’s not right to take it at all. Take the action that achieves the greatest good. Take the action that incurs the least potential cost. There’s no free lunch. Everything, unless specified otherwise, is owned by someone.

An Ethical Dilemma to Consider Employee monitoring on the Internet Overtime is up at your small insurance company. Network analysis shows the following: Apply ethical analysis User Minutes online URL visited Kelly, Chris 45 57 96 www.stltoday.com www.yahoo.com www.insuremarket.com Miller, Bob 112 43 www.travelocity.com www.sharperimage.com Talbot, Erin 123 27 73 www.e-trade.com www.wine.com www.ebay.com

Four Moral Dimensions of the Information Age Information rights & obligations Property rights Accountability & control System quality

Information rights & obligations Privacy: The claim of individuals to be left alone, free from surveillance or interference from others, including the state. Fair Information Practices Privacy Act of 1974 Internet practices, cookies, spamming Is it legitimate or ethical to keep unobtrusive surveillance?

Property Rights Intellectual property: intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, or patent law.

© Property Rights Trade secret Copyright Patent law Any intellectual work or product used for business classified as belonging to that business, providing that it is not based on information in the public domain. Copyright Protects creators of intellectual property against copying by others for any purpose for 28 years. Patent law Exclusive monopoly on the ideas behind an invention for 17 years.

Software Piracy “The unauthorized copying or use of software for which you have not paid the appropriate licensing fee” Estimate: $11 billion/year lost to piracy In early 1990s, Lotus estimated that half of its revenue was lost per year to software piracy Estimate: 2 of 5 pieces of software are pirated

Accountability & Control Who is to be held responsible for faulty computers? Software? What are the societal ramifications of doing so?

System quality What is an acceptable level of bugs? At what point should software be released to others?

Computer Crime “Any illegal activity using computer software, data, or access as the object, subject, or instrument of the crime”

Theft: Fraud & Abuse Trojan horses: “insertion of false information into a program to profit from its outcome” Data & time bombs: inserting time- or event-triggered code into programs maliciously Salami-slicing: little bits of theft that add up Data diddling: EX: diverting charges