کسب و کارمدیریت و رهبری

Ethical and social issues in the digital firm

صفحه 1:
5 Chapter 5 Ethical and Social Issues in the Digital Firm 5.1 ©0008 by Prevece ‏ادنلا"‎

صفحه 2:
0 موی ات ما بط مب يفا هه . What ethical, social, and political issues are raised by information systems? . Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? . Why does contemporary information systems technology pose challenges to the protection of individual privacy and intellectual property? ©0006 by Prevace “I 5.2

صفحه 3:
0 موی ات ما بط مب يفا سوه How have information systems affected everyday life? How can organizations develop corporate policies for ethical conduct? ©0006 by Prevace “I 55

صفحه 4:
0 موی ات ما بط مب يفا Oe Ola ree 1. Understanding the moral risks of new technology 2. Establishing corporate ethics policies that include information systems issues 5.4 ©0008 by Prevece ‏ادنلا"‎

صفحه 5:
0 موی ات ما بط مب يفا CRC Roel MERC te ar ® Oocel Por Thichtoy bout Ciicd, Govid, wad Policd Issues * Ethics: Principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior * View shock of new information technology as a “rock thrown into a pond.” 55 ©0008 by Prevece ‏ادنلا"‎

صفحه 6:
هو ای مود و ما و ‎ag‏ ۱ CRC Roel MERC te ar Dhe rehtocehip betwee ehicd, sortd, ocd pohicd baer ia ‏رت مس‎ ماه وضو 4 سبه ‎ty Preece Wd‏ 2006© 5.6

صفحه 7:
0 موی ات ما بط مب يفا CRC Roel MERC te ar ord Onrewtow oP te kPorwton Or * Information rights and obligations * Property rights and obligations * Accountability and control ° System quality * Quality of life اما عبط با ۵66069 57

صفحه 8:
0 موی ات ما بط مب يفا CRC Roel MERC te ar Key Teckwbw Treads to Ruse Chicd ‏حصحها‎ ‎* Computing power doubles every month * Rapidly declining data storage costs * Data analysis advances ¢ Networking advances and the Internet 58 ©0008 by Prevece ‏ادنلا"‎

صفحه 9:
0 موی ات ما بط مب يفا CRC Roel MERC te ar Key Teckwbw Treads to Ruse Chicd ‏حصحها‎ * Profiling: use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals * NORA (nonobvious relationship awareness): new data analysis technique for even more powerful profiling 5.9 ©0008 by Prevece ‏ادنلا"‎

صفحه 10:
0 موی ات ما بط مب يفا CRC Roel MERC te ar 5.10 ©0008 by Prevece ‏ادنلا"‎

صفحه 11:
0 موی ات ما بط مب يفا ی * Responsibility ¢ Accountability * Liability ¢ Due process اما عبط با ۵66069 5.11

صفحه 12:
0 موی ات ما بط مب يفا ی Owe Cowepe Information technologies are filtered through social institutions, organizations, individuals Responsibility falls on institutions, organizations, and individuals who choose to use the technology In an ethical, political society, individuals and others can recover damages done to them through a set of laws ©0006 by Prevace “I 1 5.12

صفحه 13:
0 موی ات ما بط مب يفا ی Cted Onder Five-step Process for Analysis Identify and describe clearly the facts . Define the conflict and identify the higher-order values involved Identify the stakeholders Identify reasonable options Identify potential consequences of these options ©0006 by Prevace “I S 5.13

صفحه 14:
0 موی ات ما بط مب يفا ی حصا © لس ‎Candidate Ethical Principles‏ The “Golden Rule” Kant’s Categorical Imperative Descarte’s rule of change The Utilitarian Principle The Risk Aversion Principle Ethical “no free lunch” rule ©0006 by Prevace “I ع ات ات ده

صفحه 15:
0 موی ات ما بط مب يفا ی @roPessirad Onder oP ‏اسلمه0‎ Codes of ethics: promises by professions to regulate themselves in the general interest of society. Promulgated by professional associations such as American Medical Association (AMA). Association of Computing Machinery (ACM) “General Moral Imperatives” include honoring property rights and respecting privacy. ©0006 by Prevace “I 5.15

صفحه 16:
0 موی ات ما بط مب يفا ی Gowe Red-Oorkt Chicd Oiewwer Competing values: one set of interests pitted against another E-mail monitoring at the workplace Use of new technology to reduce workforce and lower costs ©0006 by Prevace “I 5.16

صفحه 17:
0 موی ات ما بط مب يفا ل ل ل الك 4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy Privacy: Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. Protected primarily in United States by First Amendment, Fourth Amendment, and Privacy Act of 1974 Today, most U.S. federal privacy laws apply only to federal government, not to private sector ©0006 by Prevace “I 5.17

صفحه 18:
0 موی ات ما بط مب يفا ل ل ل الك Cederd Pray Lav ta he Outed Grier General Federal Privacy Laws Freedom of Information Act, 1966 Privacy Act of 1974 Electronic Communications Privacy Act of 1986 Computer Matching and Privacy Protection Act of 1988 Computer Security Act of 1987 Federal Managers Financial Integrity Act of 1982 ©0006 by Prevace “I 5.18

صفحه 19:
0 موی ات ما بط مب يفا ل ل ل الك Cederd Pray Lav ta he Outed Grier Privacy Laws Affecting Private Institutions Fair Credit Reporting Act of 1970 Family Educational Rights and Privacy Act of 1974 Right to Financial Privacy Act of 1978 Privacy Protection Act of 1980. Cable Communications Policy Act of 1984 Electronic Communications Privacy Act of 1986 Video Privacy Protection Act of 1988 The Health Insurance Portability and Accountability Act of 1996 Children’s Online Privacy Protection Act of 1998 ‏یز‎ Modernization Act (Gramm-Leach-Bliley Act) of 5.19 ©0008 by Prevece ‏ادنلا"‎

صفحه 20:
0 موی ات ما بط مب يفا ل ل ل الك 4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy Fair Information Practices (FIP) Set of principles governing the collection and use of information about individuals, set forth in 1973 federal government report Forms basis of most American and European privacy law Extended in 1998 by FTC to provide guidelines for online privacy ©0008 by Preece ‏ادنلا"‎ 5.20

صفحه 21:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy ‎Federal Trade Commission Fair Information Practices Principles ‎Notice/Awareness (core principle) Choice/Consent (core principle) Access/Participation ‎Security ‎Enforcement ‏الت ا ا ‏ما سم ‎by‏ 0008© 5

صفحه 22:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy ‎European Commission’s ‎Directive on Data Protection (1998) ‎More stringent than the United States ‎Requires companies to inform people of data collection and storage ‎Customers must provide informed consent ‎Disallows transferring of data to countries without similar laws ‎U.S. “safe harbor” developed with U.S. Department of Commerce ‎©0008 by Preece ‏ادنلا"‎ ‎5.22

صفحه 23:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎SPorwdios Rights: Privacy wed Preedow ta the Intercet Bye Internet Challenges to Privacy ‎Computer systems able to monitor, capture, store communications passing through ‎Monitoring tools Cookies ‎Web bugs Spyware ‎©0006 by Prevace “I ‎5.23

صفحه 24:
هو ای مود و ما و ‎ag‏ ۱ ل ل ل الك Cookie 931032944 Previous buyer Welcome back Jane Doe! 0 Server |. The Web server reads the user's Web browser and determines the operating system, browser name, version number, Internet address, and other information. 2. The server transmits a tiny text file with user identification information called a cookie, which the user's browser receives and stores on the user's computer hard drive. 3. When the user returns to the Web site, the server requests the contents of any cookie it deposited previously in the user's computer. 4, The Web server reads the cookie, identifies the visitor and calls up data on the user. rue 9-3 5.24 ©0008 by Prevece ‏ادنلا"‎

صفحه 25:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy ‎ ‎U.S. Online Industry Self-Regulation ‎Statements of information use Opt-out model ‎Opt-in model ‎Online Privacy Alliance ‎Network Advertising Initiative (NAI) ‎©0008 by Preece ‏ادنلا"‎ ‎5.25

صفحه 26:
0 موی ات ما بط مب يفا ل ل ل الك SPorwdios Rights: Privacy wed Preedow ta the ‏اصمسجاها‎ Bye Technical Solutions Platform for Privacy Preferences (P3P) Automatic communication of privacy policies between e-commerce site and visitor Only works with Web sites who have translated policies into P3P format ©0006 by Prevace “I 5.26

صفحه 27:
هو ای مود و ما و ‎ag‏ ۱ ل ل ل الك Te POP Grandad ۱ ‏و‎ Request for Web page User Server 1. The user with a P3P web browsing software requests a Web page. 2. The Web server returns the Web page along with a compact version of the Web site's policy and a pointer to the full P3P policy. If the Web site is not P3P compliant, no P3P data are returned. 3. The user's Web browsing software compares the response from the Web site with the user's privacy preferences. If the Web site does not have a P3P policy or the policy does not match the privacy levels established by the user, it warns the user or rejects the cookies from the Web site. Otherwise, the Web page loads normally. rue OF ©0006 by Prevace “I 5.27

صفحه 28:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎4kPorentios Right: Privagy und Preedow ta the Tetercet Boe Privacy Protection Tools ‎Managing Cookies Blocking ads ‎Secure e-mail or data Anonymous e-mail Anonymous surfing ‎©0006 by Prevace “I ‎5.28

صفحه 29:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy ‎Ethical Issues ‎٠ Under what conditions should privacy be invaded? ‎٠ What legitimates unobtrusive surveillance? ‎5.29 ©0008 by Prevece ‏ادنلا"‎

صفحه 30:
0 موی ات ما بط مب يفا ل ل ل الك 4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy Social Issues “Expectations of privacy”, privacy norms. Should people have expectations of privacy while using e-mail, cellular phones, bulletin boards, postal system, etc.? Do expectations of privacy extend to criminal conspirators? ©0006 by Prevace “I 5.30

صفحه 31:
0 موی ات ما بط مب يفا ل ل ل الك 4kPorwntion Ricks: Privagy ond Preedow ta the Inert Oy Political Issues Statutes to govern relationship between record keepers and individuals Should FBI monitor e-mail? Should e-commerce sites maintain personal data about individuals ©0006 by Prevace “I 5.31

صفحه 32:
0 موی ات ما بط مب يفا ‎sae eS eas ake ad‏ ل للك ‎Property Rights: Intelertud Property‏ ‎Intellectual Property‏ ‎٠ Intangible property created by individuals or corporations ‎٠ Protected under three different legal traditions: trade secret, copyright, and patent law ‎5.32 ©0008 by Preece ‏ادنلا"‎

صفحه 33:
0 موی ات ما بط مب يفا ل ل ل الك Property Right: Tetelertidl Property Trade Secret Any intellectual work product used for a business purpose; cannot be based on information in public domain Protects both ideas in product as well as product itself Applies to software with unique elements, procedures, compilations Difficult to prevent ideas in the work from falling into public domain after distribution ©0006 by Prevace “I 5.33

صفحه 34:
0 موی ات ما بط مب يفا ل ل ل الك Property Right: Tetelertidl Property Copyright Statutory grant that protects creators of intellectual property from having work copied for the life of author plus 70 years; 95 years for corporate-owned property Computer Software Copyright Act provides protection for program code and product copies sold in commerce Does not protect underlying ideas behind work ©0006 by Prevace “I 5.34

صفحه 35:
0 موی ات ما بط مب يفا ل ل ل الك Property Right: Tetelertidl Property Patents Grants exclusive monopoly on ideas behind invention for 20 years Ensures inventors receive full rewards for labor; but prepares for widespread use by providing detailed documents Applies to underlying concept of software Stringent criteria of nonobviousness, originality, and novelty; lengthy application process ©0006 by Prevace “I 5.35

صفحه 36:
0 موی ات ما بط مب يفا ل ل ل الك Property Right: Tetelertidl Property Challenges to Intellectual Property Rights Digital media easy to replicate Difficulties establishing uniqueness Compactness of product Proliferation of electronic networks, including Internet, World Wide Web File-sharing software Web site construction and framing ©0006 by Prevace “I 5.36

صفحه 37:
0 موی ات ما بط مب يفا ل ل ل الك Oho cure | ‏رومستظ وم‎ 9۴ a Deb poe i deg fem, We ate per PHOTOGRAPH و مس 5.37 ©0008 by Preece ‏ادنلا"‎

صفحه 38:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎Property Rights: “Tetelevtd Property Digital Millenium Copyright Act (1998) ٠ Implements World Intellectual ‎Property Organization treaty ‎٠ Makes it illegal to circumvent technology-based protections of copyrighted materials ‎5.38 ©0008 by Preece ‏ادنلا"‎

صفحه 39:
0 موی ات ما بط مب يفا ل ل ل الك Property Right: “Tielevhd Property Ethical Issues: Is there value in protecting intellectual property when it is so easily copied and distributed? Social Issues: Routine illegal file-sharing creating society of lawbreakers Political issues: New protection measures needed to protect investments made by creators ©0006 by Prevace “I 5.39

صفحه 40:
0 موی ات ما بط مب يفا ل ل ل الك ‎Licbity, ord Ovcirol‏ يك ‎Ethical issues: Who is morally responsible for consequences of use of hardware or software? ‎Social issues: What should society expect and allow of service-providing information systems? ‎Political issues: To what extent should government intervene, protect service providers and users? ‎©0006 by Prevace “I ‎5.40

صفحه 41:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎Grady: Dota Qudiy od Opstew Brrore‏ حور ‎Ethical issues: At what point should software/services be released for consumption? ‎Social issues: Should people be encouraged to believe systems are infallible? ‎Political Issues: Laws of responsibility and accountability ‎©0006 by Prevace “I ‎5.41

صفحه 42:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎Quay oF LPe: quip, Boveve, wd Bruker ‎Negative Social Costs of Information Technology ‎٠ Balancing power: Key policy decisions still centralized ‎٠ Rapidity of change: More efficient marketplace reduces response time to competition ‏ما سم ‎by‏ 0008© 5

صفحه 43:
0 موی ات ما بط مب يفا ل ل ل الك Quay oF LPe: quip, Boveve, wd Bruker Maintaining boundaries: Ubiquitous computing weakening traditional boundaries between family or leisure and work Dependence and vulnerability: Vulnerable to system failures; no standards as with other public-utility technologies ©0006 by Prevace “I 5.43

صفحه 44:
0 موی ات ما بط مب يفا ل ل ل الك Quay oF LPe: quip, Boveve, wd Bruker Computer crime: Commission of illegal acts through the use of a computer or against a computer system Computer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical, i.e. spamming Computer forensics: scientific collection and analysis of data held on or retrieved from computer storage media to be used as evidence in court of law ©0006 by Prevace “I 5.44

صفحه 45:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎ ‎Quay oF LPe: quip, Boveve, wd Bruker ‎Internet Crime and Abuse * Spamming ٠ Hacking ٠ Jamming ٠ Malicious software * Sniffing * Spoofing ‎5.45 ©0008 by Prevece ‏ادنلا"‎

صفحه 46:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎Orndow va Oucngeoet ‎Can the Spamming Monster Be Tamed? ‎Is spamming an important management decision? Why or why not? ‏ما سم ‎by‏ 0008© 526

صفحه 47:
0 موی ات ما بط مب يفا ل ل ل الك Quay oF LPe: quip, Boveve, wd Bruker Employment: reengineering work possibly leading to job losses; offshore outsourcing Equity and Access: Will inequitable distribution of access to information system resources lead to digital divide? Health risks: repetitive stress injury (RSI); carpal tunnel syndrome (CTS); computer vision syndrome (CVS); technostress; radiation from display screens ©0006 by Prevace “I 5.47

صفحه 48:
0 موی ات ما بط مب يفا ‎ass el oa‏ ل مر( ‎Ordo oa Orquctraious ‎Offshore Outsourcing: Good or Bad? ‎Does offshore outsourcing create an ethical dilemma? Why or why not? ‎5.48 ©0008 by Prevece ‏ادنلا"‎

صفحه 49:
0 موی ات ما بط مب يفا ل ل ل الك Ovaxpwrd Oriow: 8 Cprporde Orde oP Chee Information rights and obligations Property rights and obligations System quality Quality of life Accountability and control ©0006 by Prevace “I 5.49

صفحه 50:
0 موی ات ما بط مب يفا 3 Genny Orr Privacy: Over Terrortew Okun te Debuts? Do the increase surveillance power and capability of the U.S. government present an ethical dilemma? Explain your answer. Apply an ethical analysis to the issue of the U.S. government's use of information technology to ensure public safety and U.S. citizens’ privacy rights. What are the ethical, social, and political issues raised by the U.S. government creating massive databases to collect personal data on individuals and profile them? ©0006 by Prevace “I 5.50

صفحه 51:
0 موی ات ما بط مب يفا 3 Genny Orr Privacy: Over Terrortew Okun te Debuts? How effective are electronic eavesdropping and massive databases as terrorism and crime-prevention tools? Explain your answer. State your views on ways to solve the problems of collecting the key data the U.S. government needs to combat terrorism without interfering with individual privacy. ©0006 by Prevace “I 5.51

Chapter 5 Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethical and Social Issues in the Digital Firm 5.1 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Objectives 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information systems technology pose challenges to the protection of individual privacy and intellectual property? 5.2 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Objectives 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? 5.3 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Management Challenges 1. Understanding the moral risks of new technology 2. Establishing corporate ethics policies that include information systems issues 5.4 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Understanding Ethical and Social Issues Related to Systems A Model for Thinking About Ethical, Social, and Political Issues • Ethics: Principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior • View shock of new information technology as a “rock thrown into a pond.” 5.5 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Understanding Ethical and Social Issues Related to Systems The relationship between ethical, social, and political issues in an information society Figure 5-1 5.6 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Understanding Ethical and Social Issues Related to Systems Moral Dimensions of the Information Age • Information rights and obligations • Property rights and obligations • Accountability and control • System quality • Quality of life 5.7 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Understanding Ethical and Social Issues Related to Systems Key Technology Trends that Raise Ethical Issues • Computing power doubles every month • Rapidly declining data storage costs • Data analysis advances • Networking advances and the Internet 5.8 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Understanding Ethical and Social Issues Related to Systems Key Technology Trends that Raise Ethical Issues • Profiling: use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals • NORA (nonobvious relationship awareness): new data analysis technique for even more powerful profiling 5.9 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Understanding Ethical and Social Issues Related to Systems Nonobvious relationship awareness (NORA) Figure 5-2 5.10 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethics in an Information Society Basic Concepts • Responsibility • Accountability • Liability • Due process 5.11 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethics in an Information Society Basic Concepts 1. Information technologies are filtered through social institutions, organizations, individuals 2. Responsibility falls on institutions, organizations, and individuals who choose to use the technology 3. In an ethical, political society, individuals and others can recover damages done to them through a set of laws 5.12 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethics in an Information Society Ethical Analysis Five-step Process for Analysis 1. Identify and describe clearly the facts 2. Define the conflict and identify the higher-order values involved 3. Identify the stakeholders 4. Identify reasonable options 5. Identify potential consequences of these options 5.13 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethics in an Information Society Ethical Analysis Candidate Ethical Principles 1. 2. 3. 4. 5. 6. 5.14 The “Golden Rule” Kant’s Categorical Imperative Descarte’s rule of change The Utilitarian Principle The Risk Aversion Principle Ethical “no free lunch” rule © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethics in an Information Society Professional Codes of Conduct • Codes of ethics: promises by professions to regulate themselves in the general interest of society. • Promulgated by professional associations such as American Medical Association (AMA). • Association of Computing Machinery (ACM) “General Moral Imperatives” include honoring property rights and respecting privacy. 5.15 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Ethics in an Information Society Some Real-World Ethical Dilemmas • Competing values: one set of interests pitted against another • E-mail monitoring at the workplace • Use of new technology to reduce workforce and lower costs 5.16 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age • Privacy: Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. • Protected primarily in United States by First Amendment, Fourth Amendment, and Privacy Act of 1974 • Today, most U.S. federal privacy laws apply only to federal government, not to private sector 5.17 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Federal Privacy Laws in the United States General Federal Privacy Laws • • • • • • 5.18 Freedom of Information Act, 1966 Privacy Act of 1974 Electronic Communications Privacy Act of 1986 Computer Matching and Privacy Protection Act of 1988 Computer Security Act of 1987 Federal Managers Financial Integrity Act of 1982 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Federal Privacy Laws in the United States Privacy Laws Affecting Private Institutions • • • • • • • • • • 5.19 Fair Credit Reporting Act of 1970 Family Educational Rights and Privacy Act of 1974 Right to Financial Privacy Act of 1978 Privacy Protection Act of 1980 Cable Communications Policy Act of 1984 Electronic Communications Privacy Act of 1986 Video Privacy Protection Act of 1988 The Health Insurance Portability and Accountability Act of 1996 Children’s Online Privacy Protection Act of 1998 Financial Modernization Act (Gramm-Leach-Bliley Act) of 1999 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Fair Information Practices (FIP) • Set of principles governing the collection and use of information about individuals, set forth in 1973 federal government report • Forms basis of most American and European privacy law • Extended in 1998 by FTC to provide guidelines for online privacy 5.20 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Federal Trade Commission Fair Information Practices Principles 1. 2. 3. 4. 5. 5.21 Notice/Awareness (core principle) Choice/Consent (core principle) Access/Participation Security Enforcement © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age European Commission’s Directive on Data Protection (1998) • • • • • 5.22 More stringent than the United States Requires companies to inform people of data collection and storage Customers must provide informed consent Disallows transferring of data to countries without similar laws U.S. “safe harbor” developed with U.S. Department of Commerce © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Internet Challenges to Privacy • • • • • 5.23 Computer systems able to monitor, capture, store communications passing through Monitoring tools Cookies Web bugs Spyware © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems How cookies identify Web visitors Figure 5-3 5.24 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age U.S. Online Industry Self-Regulation • • • • • 5.25 Statements of information use Opt-out model Opt-in model Online Privacy Alliance Network Advertising Initiative (NAI) © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Technical Solutions • Platform for Privacy Preferences (P3P) • Automatic communication of privacy policies between e-commerce site and visitor • Only works with Web sites who have translated policies into P3P format 5.26 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems The P3P Standard Figure 5-4 5.27 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Privacy Protection Tools • • • • • 5.28 Managing Cookies Blocking ads Secure e-mail or data Anonymous e-mail Anonymous surfing © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Ethical Issues • Under what conditions should privacy be invaded? • What legitimates unobtrusive surveillance? 5.29 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Social Issues • “Expectations of privacy”, privacy norms. • Should people have expectations of privacy while using e-mail, cellular phones, bulletin boards, postal system, etc.? • Do expectations of privacy extend to criminal conspirators? 5.30 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Information Rights: Privacy and Freedom in the Internet Age Political Issues • Statutes to govern relationship between record keepers and individuals • Should FBI monitor e-mail? • Should e-commerce sites maintain personal data about individuals 5.31 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property Intellectual Property • Intangible property created by individuals or corporations • Protected under three different legal traditions: trade secret, copyright, and patent law 5.32 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property Trade Secret • Any intellectual work product used for a business purpose; cannot be based on information in public domain • Protects both ideas in product as well as product itself • Applies to software with unique elements, procedures, compilations • Difficult to prevent ideas in the work from falling into public domain after distribution 5.33 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property Copyright • Statutory grant that protects creators of intellectual property from having work copied for the life of author plus 70 years; 95 years for corporate-owned property • Computer Software Copyright Act provides protection for program code and product copies sold in commerce • Does not protect underlying ideas behind work 5.34 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property Patents • Grants exclusive monopoly on ideas behind invention for 20 years • Ensures inventors receive full rewards for labor; but prepares for widespread use by providing detailed documents • Applies to underlying concept of software • Stringent criteria of nonobviousness, originality, and novelty; lengthy application process 5.35 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property Challenges to Intellectual Property Rights • • • • • • 5.36 Digital media easy to replicate Difficulties establishing uniqueness Compactness of product Proliferation of electronic networks, including Internet, World Wide Web File-sharing software Web site construction and framing © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Who owns the pieces? Anatomy of a Web page Figure 5-5 5.37 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property Digital Millenium Copyright Act (1998) • Implements World Intellectual Property Organization treaty • Makes it illegal to circumvent technology-based protections of copyrighted materials 5.38 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Property Rights: Intellectual Property • Ethical Issues: Is there value in protecting intellectual property when it is so easily copied and distributed? • Social Issues: Routine illegal file-sharing creating society of lawbreakers • Political issues: New protection measures needed to protect investments made by creators 5.39 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Accountability, Liability, and Control • Ethical issues: Who is morally responsible for consequences of use of hardware or software? • Social issues: What should society expect and allow of service-providing information systems? • Political issues: To what extent should government intervene, protect service providers and users? 5.40 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems System Quality: Data Quality and System Errors • Ethical issues: At what point should software/services be released for consumption? • Social issues: Should people be encouraged to believe systems are infallible? • Political Issues: Laws of responsibility and accountability 5.41 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Quality of Life: Equity, Access, and Boundaries Negative Social Costs of Information Technology • Balancing power: Key policy decisions still centralized • Rapidity of change: More efficient marketplace reduces response time to competition 5.42 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Quality of Life: Equity, Access, and Boundaries • Maintaining boundaries: Ubiquitous computing weakening traditional boundaries between family or leisure and work • Dependence and vulnerability: Vulnerable to system failures; no standards as with other public-utility technologies 5.43 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Quality of Life: Equity, Access, and Boundaries • Computer crime: Commission of illegal acts through the use of a computer or against a computer system • Computer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical, i.e. spamming • Computer forensics: scientific collection and analysis of data held on or retrieved from computer storage media to be used as evidence in court of law 5.44 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Quality of Life: Equity, Access, and Boundaries Internet Crime and Abuse • • • • • • 5.45 Spamming Hacking Jamming Malicious software Sniffing Spoofing © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Window on Management Can the Spamming Monster Be Tamed? Is spamming an important management decision? Why or why not? 5.46 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Quality of Life: Equity, Access, and Boundaries • Employment: reengineering work possibly leading to job losses; offshore outsourcing • Equity and Access: Will inequitable distribution of access to information system resources lead to digital divide? • Health risks: repetitive stress injury (RSI); carpal tunnel syndrome (CTS); computer vision syndrome (CVS); technostress; radiation from display screens 5.47 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Window on Organizations Offshore Outsourcing: Good or Bad? Does offshore outsourcing create an ethical dilemma? Why or why not? 5.48 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm The Moral Dimensions of Information Systems Management Actions: A Corporate Code of Ethics • • • • • 5.49 Information rights and obligations Property rights and obligations System quality Quality of life Accountability and control © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Chapter 5 Case Study Security Versus Privacy: Does Terrorism Change the Debate? 1. Do the increase surveillance power and capability of the U.S. government present an ethical dilemma? Explain your answer. 2. Apply an ethical analysis to the issue of the U.S. government’s use of information technology to ensure public safety and U.S. citizens’ privacy rights. 3. What are the ethical, social, and political issues raised by the U.S. government creating massive databases to collect personal data on individuals and profile them? 5.50 © 2005 by Prentice Hal Essentials of Management Information Systems, 6e Chapter 5 Ethical and Social Issues in the Digital Firm Chapter 5 Case Study Security Versus Privacy: Does Terrorism Change the Debate? 4. How effective are electronic eavesdropping and massive databases as terrorism and crime-prevention tools? Explain your answer. 5. State your views on ways to solve the problems of collecting the key data the U.S. government needs to combat terrorism without interfering with individual privacy. 5.51 © 2005 by Prentice Hal

51,000 تومان