Ethical and social issues in the digital firm
اسلاید 1: Ethical and Social Issues in the Digital FirmChapter 5
اسلاید 2: ObjectivesWhat ethical, social, and political issues are raised by information systems?Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? Why does contemporary information systems technology pose challenges to the protection of individual privacy and intellectual property?
اسلاید 3: ObjectivesHow have information systems affected everyday life? How can organizations develop corporate policies for ethical conduct?
اسلاید 4: Management ChallengesUnderstanding the moral risks of new technology Establishing corporate ethics policies that include information systems issues
اسلاید 5: Ethics: Principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behaviorView shock of new information technology as a “rock thrown into a pond.”Understanding Ethical and Social Issues Related to SystemsA Model for Thinking About Ethical, Social, and Political Issues
اسلاید 6: Understanding Ethical and Social Issues Related to SystemsThe relationship between ethical, social, and political issuesin an information societyFigure 5-1
اسلاید 7: Information rights and obligationsProperty rights and obligationsAccountability and controlSystem qualityQuality of lifeUnderstanding Ethical and Social Issues Related to SystemsMoral Dimensions of the Information Age
اسلاید 8: Computing power doubles every monthRapidly declining data storage costsData analysis advancesNetworking advances and the InternetUnderstanding Ethical and Social Issues Related to SystemsKey Technology Trends that Raise Ethical Issues
اسلاید 9: Profiling: use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individualsNORA (nonobvious relationship awareness): new data analysis technique for even more powerful profilingUnderstanding Ethical and Social Issues Related to SystemsKey Technology Trends that Raise Ethical Issues
اسلاید 10: Understanding Ethical and Social Issues Related to SystemsNonobvious relationship awareness (NORA)Figure 5-2
اسلاید 11: ResponsibilityAccountabilityLiabilityDue processEthics in an Information SocietyBasic Concepts
اسلاید 12: Information technologies are filtered through social institutions, organizations, individualsResponsibility falls on institutions, organizations, and individuals who choose to use the technologyIn an ethical, political society, individuals and others can recover damages done to them through a set of lawsEthics in an Information SocietyBasic Concepts
اسلاید 13: Five-step Process for AnalysisIdentify and describe clearly the factsDefine the conflict and identify the higher-order values involvedIdentify the stakeholdersIdentify reasonable optionsIdentify potential consequences of these optionsEthics in an Information SocietyEthical Analysis
اسلاید 14: Candidate Ethical PrinciplesThe “Golden Rule”Kant’s Categorical ImperativeDescarte’s rule of changeThe Utilitarian PrincipleThe Risk Aversion PrincipleEthical “no free lunch” ruleEthics in an Information SocietyEthical Analysis
اسلاید 15: Codes of ethics: promises by professions to regulate themselves in the general interest of society.Promulgated by professional associations such as American Medical Association (AMA).Association of Computing Machinery (ACM) “General Moral Imperatives” include honoring property rights and respecting privacy. Ethics in an Information SocietyProfessional Codes of Conduct
اسلاید 16: Competing values: one set of interests pitted against anotherE-mail monitoring at the workplaceUse of new technology to reduce workforce and lower costsEthics in an Information SocietySome Real-World Ethical Dilemmas
اسلاید 17: Privacy: Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state.Protected primarily in United States by First Amendment, Fourth Amendment, and Privacy Act of 1974Today, most U.S. federal privacy laws apply only to federal government, not to private sectorThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 18: General Federal Privacy LawsFreedom of Information Act, 1966Privacy Act of 1974Electronic Communications Privacy Act of 1986Computer Matching and Privacy Protection Act of 1988Computer Security Act of 1987Federal Managers Financial Integrity Act of 1982The Moral Dimensions of Information SystemsFederal Privacy Laws in the United States
اسلاید 19: Privacy Laws Affecting Private InstitutionsFair Credit Reporting Act of 1970Family Educational Rights and Privacy Act of 1974Right to Financial Privacy Act of 1978Privacy Protection Act of 1980Cable Communications Policy Act of 1984Electronic Communications Privacy Act of 1986Video Privacy Protection Act of 1988The Health Insurance Portability and Accountability Act of 1996Children’s Online Privacy Protection Act of 1998Financial Modernization Act (Gramm-Leach-Bliley Act) of 1999The Moral Dimensions of Information SystemsFederal Privacy Laws in the United States
اسلاید 20: Fair Information Practices (FIP)Set of principles governing the collection and use of information about individuals, set forth in 1973 federal government reportForms basis of most American and European privacy lawExtended in 1998 by FTC to provide guidelines for online privacyThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 21: Federal Trade Commission Fair Information Practices PrinciplesNotice/Awareness (core principle)Choice/Consent (core principle)Access/ParticipationSecurityEnforcementThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 22: European Commission’s Directive on Data Protection (1998)More stringent than the United StatesRequires companies to inform people of data collection and storageCustomers must provide informed consentDisallows transferring of data to countries without similar lawsU.S. “safe harbor” developed with U.S. Department of CommerceThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 23: Internet Challenges to PrivacyComputer systems able to monitor, capture, store communications passing throughMonitoring toolsCookiesWeb bugsSpywareThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 24: The Moral Dimensions of Information SystemsHow cookies identify Web visitorsFigure 5-3
اسلاید 25: U.S. Online Industry Self-RegulationStatements of information useOpt-out modelOpt-in modelOnline Privacy AllianceNetwork Advertising Initiative (NAI)The Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 26: Technical SolutionsPlatform for Privacy Preferences (P3P)Automatic communication of privacy policies between e-commerce site and visitorOnly works with Web sites who have translated policies into P3P formatThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 27: The Moral Dimensions of Information SystemsThe P3P StandardFigure 5-4
اسلاید 28: Privacy Protection ToolsManaging CookiesBlocking adsSecure e-mail or dataAnonymous e-mailAnonymous surfingThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 29: Ethical IssuesUnder what conditions should privacy be invaded?What legitimates unobtrusive surveillance?The Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 30: Social Issues“Expectations of privacy”, privacy norms.Should people have expectations of privacy while using e-mail, cellular phones, bulletin boards, postal system, etc.?Do expectations of privacy extend to criminal conspirators?The Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 31: Political IssuesStatutes to govern relationship between record keepers and individualsShould FBI monitor e-mail?Should e-commerce sites maintain personal data about individualsThe Moral Dimensions of Information SystemsInformation Rights: Privacy and Freedom in the Internet Age
اسلاید 32: Intellectual PropertyIntangible property created by individuals or corporationsProtected under three different legal traditions: trade secret, copyright, and patent lawThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 33: Trade SecretAny intellectual work product used for a business purpose; cannot be based on information in public domainProtects both ideas in product as well as product itselfApplies to software with unique elements, procedures, compilationsDifficult to prevent ideas in the work from falling into public domain after distributionThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 34: CopyrightStatutory grant that protects creators of intellectual property from having work copied for the life of author plus 70 years; 95 years for corporate-owned propertyComputer Software Copyright Act provides protection for program code and product copies sold in commerceDoes not protect underlying ideas behind workThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 35: PatentsGrants exclusive monopoly on ideas behind invention for 20 yearsEnsures inventors receive full rewards for labor; but prepares for widespread use by providing detailed documentsApplies to underlying concept of softwareStringent criteria of nonobviousness, originality, and novelty; lengthy application processThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 36: Challenges to Intellectual Property RightsDigital media easy to replicateDifficulties establishing uniquenessCompactness of productProliferation of electronic networks, including Internet, World Wide WebFile-sharing softwareWeb site construction and framingThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 37: The Moral Dimensions of Information SystemsWho owns the pieces? Anatomy of a Web pageFigure 5-5
اسلاید 38: Digital Millenium Copyright Act (1998)Implements World Intellectual Property Organization treatyMakes it illegal to circumvent technology-based protections of copyrighted materialsThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 39: Ethical Issues: Is there value in protecting intellectual property when it is so easily copied and distributed?Social Issues: Routine illegal file-sharing creating society of lawbreakersPolitical issues: New protection measures needed to protect investments made by creatorsThe Moral Dimensions of Information SystemsProperty Rights: Intellectual Property
اسلاید 40: Ethical issues: Who is morally responsible for consequences of use of hardware or software?Social issues: What should society expect and allow of service-providing information systems?Political issues: To what extent should government intervene, protect service providers and users?The Moral Dimensions of Information SystemsAccountability, Liability, and Control
اسلاید 41: Ethical issues: At what point should software/services be released for consumption?Social issues: Should people be encouraged to believe systems are infallible?Political Issues: Laws of responsibility and accountabilityThe Moral Dimensions of Information SystemsSystem Quality: Data Quality and System Errors
اسلاید 42: Negative Social Costs of Information TechnologyBalancing power: Key policy decisions still centralizedRapidity of change: More efficient marketplace reduces response time to competitionThe Moral Dimensions of Information SystemsQuality of Life: Equity, Access, and Boundaries
اسلاید 43: Maintaining boundaries: Ubiquitous computing weakening traditional boundaries between family or leisure and workDependence and vulnerability: Vulnerable to system failures; no standards as with other public-utility technologiesThe Moral Dimensions of Information SystemsQuality of Life: Equity, Access, and Boundaries
اسلاید 44: Computer crime: Commission of illegal acts through the use of a computer or against a computer systemComputer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical, i.e. spammingComputer forensics: scientific collection and analysis of data held on or retrieved from computer storage media to be used as evidence in court of lawThe Moral Dimensions of Information SystemsQuality of Life: Equity, Access, and Boundaries
اسلاید 45: Internet Crime and AbuseSpammingHackingJammingMalicious softwareSniffingSpoofingThe Moral Dimensions of Information SystemsQuality of Life: Equity, Access, and Boundaries
اسلاید 46: Can the Spamming Monster Be Tamed?Is spamming an important management decision? Why or why not?The Moral Dimensions of Information SystemsWindow on Management
اسلاید 47: Employment: reengineering work possibly leading to job losses; offshore outsourcingEquity and Access: Will inequitable distribution of access to information system resources lead to digital divide?Health risks: repetitive stress injury (RSI); carpal tunnel syndrome (CTS); computer vision syndrome (CVS); technostress; radiation from display screensThe Moral Dimensions of Information SystemsQuality of Life: Equity, Access, and Boundaries
اسلاید 48: Offshore Outsourcing: Good or Bad?Does offshore outsourcing create an ethical dilemma? Why or why not?The Moral Dimensions of Information SystemsWindow on Organizations
اسلاید 49: Information rights and obligationsProperty rights and obligationsSystem qualityQuality of lifeAccountability and controlThe Moral Dimensions of Information SystemsManagement Actions: A Corporate Code of Ethics
اسلاید 50: Do the increase surveillance power and capability of the U.S. government present an ethical dilemma? Explain your answer.Apply an ethical analysis to the issue of the U.S. government’s use of information technology to ensure public safety and U.S. citizens’ privacy rights.What are the ethical, social, and political issues raised by the U.S. government creating massive databases to collect personal data on individuals and profile them?Chapter 5 Case StudySecurity Versus Privacy: Does Terrorism Change the Debate?
اسلاید 51: How effective are electronic eavesdropping and massive databases as terrorism and crime-prevention tools? Explain your answer.State your views on ways to solve the problems of collecting the key data the U.S. government needs to combat terrorism without interfering with individual privacy.Chapter 5 Case StudySecurity Versus Privacy: Does Terrorism Change the Debate?
نقد و بررسی ها
هیچ نظری برای این پاورپوینت نوشته نشده است.