ethical and social issues in information systems: facebook
Post on 24-Dec-2021
1 Views
Preview:
TRANSCRIPT
資訊管理專題HotIssuesofInformationManagement
1
1061IM4C05TLMXB4C(M0842)
Thu7,8(14:10-16:00)B702
Min-Yuh Day戴敏育
Assistant Professor專任助理教授
Dept. of Information Management, Tamkang University淡江大學資訊管理學系
http://mail. tku.edu.tw/myday/2017-10-19
TamkangUniversity
Tamkang University
EthicalandSocialIssuesinInformationSystems:Facebook(Chap.4)
週次 (Week)日期 (Date)內容 (Subject/Topics)12017/09/21IntroductiontoCaseStudyforHotIssuesof
InformationManagement22017/09/28InformationSystemsinGlobalBusiness:UPS
(Chap.1)(pp.53-54)32017/10/05GlobalE-BusinessandCollaboration:P&G
(Chap.2)(pp.84-85)42017/10/12InformationSystems,Organization,andStrategy:
Starbucks(Chap.3)(pp.129-130)52017/10/19EthicalandSocialIssuesinInformationSystems:
Facebook(Chap.4)(pp.188-190)62017/10/26ITInfrastructureandEmergingTechnologies:
AmazonandCloudComputing(Chap.5)(pp.234-236)
課程大綱 (Syllabus)
2
週次 (Week)日期 (Date)內容 (Subject/Topics)72017/11/02Foundations of BusinessIntelligence:
IBMand BigData(Chap.6)(pp.261-262)82017/11/09Telecommunications,the Internet,and Wireless
Technology:Google,Apple,and Microsoft(Chap.7)(pp.318-320)
92017/11/16Midterm Report(期中報告)102017/11/23Midterm ExamWeek (期中考試週)112017/11/30EnterpriseApplications:Summit and SAP
(Chap.9)(pp.396-398)122017/12/07E-commerce:Zagat (Chap.10)(pp.443-445)
3
課程大綱 (Syllabus)
週次 日期 內容(Subject/Topics)132017/12/14Enhancing Decision Making:Zynga
(Chap.12)(pp.512-514)142017/12/21BuildingInformationSystems:USAA
(Chap.13)(pp.547-548)152017/12/28ManagingProjects:NYCAPSand CityTime
(Chap.14)(pp.586-588)162018/01/04FinalReportI(期末報告 I)172018/01/11FinalReportII(期末報告 II)182018/01/18FinalExamWeek (期末考試週)
4
課程大綱 (Syllabus)
ManagementInformationSystems:ManagingtheDigitalFirm
5
Organization,Management,and theNetworkedEnterprise
InformationTechnologyInfrastructure
KeySystemApplicationsfortheDigitalAge
Buildingand ManagingSystems
Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
1
32
4
Chap.4EthicalandSocialIssuesin
InformationSystems:Facebook
6
CaseStudy:Facebook(Chap.4)(pp.188-190)Facebook:It’sabouttheMoney
1.PerformanethicalanalysisofFacebook.Whatistheethicaldilemmapresentedbythiscase?
2.WhatistherelationshipofprivacytoFacebook’sbusinessmodel?
3.DescribetheweaknessesofFacebook’sprivacypoliciesandfeatures.Whatmanagement,organization,andtechnologyfactorshavecontributedtothoseweaknesses?
4.WillFacebookbeabletohaveasuccessfulbusinessmodelwithoutinvadingprivacy?Explainyouranswer.ArethereanymeasuresFacebookcouldtaketomakethispossible?
7Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
8
Management
Organization
Technology
InformationSystem
BusinessChallenges
BusinessSolutions
Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
OverviewofFundamentalMISConcepts
BusinessModel
9Source:AlexanderOsterwalder &YvesPigneur,BusinessModelGeneration:AHandbookforVisionaries,GameChangers,andChallengers,Wiley,2010.
KeyActivities
KeyResources
CustomerSegments
KeyPartners
CustomerRelationships
Channels
RevenueStreams
CostStructure
ValueProposition
12
36
7 4
9 5
8
InformationSystemsandEthics
• Informationsystemsraisenewethicalquestionsbecausetheycreateopportunitiesfor:– Intensesocialchange,threateningexistingdistributionsofpower,money,rights,andobligations
– Newkindsofcrime
10Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
THERELATIONSHIPAMONGETHICAL,SOCIAL,POLITICALISSUESINANINFORMATIONSOCIETY
11Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Amodelforthinkingaboutethical,social,andpoliticalIssues• Societyasacalmpond• ITasrockdroppedinpond,creatingripplesofnewsituationsnotcoveredbyoldrules
• Socialandpoliticalinstitutionscannotrespondovernighttotheseripples—itmaytakeyearstodevelopetiquette,expectations,laws– Requiresunderstandingofethicstomakechoicesinlegallygrayareas
12Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Fivemoraldimensionsoftheinformationage
1. Informationrightsandobligations2. Propertyrightsandobligations3. Accountabilityandcontrol4. Systemquality5. Qualityoflife
13Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Keytechnologytrendsthatraiseethicalissues
1.Doublingofcomputerpower–Moreorganizationsdependoncomputersystemsforcriticaloperations.
2.Rapidlydecliningdatastoragecosts– Organizationscaneasilymaintaindetaileddatabasesonindividuals.
3.NetworkingadvancesandtheInternet– Copyingdatafromonelocationtoanotherandaccessingpersonaldatafromremotelocationsaremucheasier.
14Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Keytechnologytrendsthatraiseethicalissues
4.Advancesindataanalysistechniques– Profiling• Combiningdatafrommultiplesourcestocreatedossiersofdetailedinformationonindividuals
– Nonobviousrelationshipawareness(NORA)• Combiningdatafrommultiplesourcestofindobscurehiddenconnectionsthatmighthelpidentifycriminalsorterrorists
5.Mobiledevicegrowth– Trackingofindividualcellphones
15Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
NONOBVIOUSRELATIONSHIPAWARENESS(NORA)
16Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Basicconceptsforethicalanalysis
• Responsibility:– Acceptingthepotentialcosts,duties,andobligationsfordecisions
• Accountability:– Mechanismsforidentifyingresponsibleparties
• Liability:– Permitsindividuals(andfirms)torecoverdamagesdonetothem
• Dueprocess:– Lawsarewell-knownandunderstood,withanabilitytoappealtohigherauthorities
17Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Five-stepethicalanalysis
1. Identifyandclearlydescribethefacts.2. Definetheconflictordilemmaandidentify
thehigher-ordervaluesinvolved.3. Identifythestakeholders.4. Identifytheoptionsthatyoucanreasonably
take.5. Identifythepotentialconsequencesofyour
options.
18Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Informationrights:privacyandfreedomintheInternetage
• Privacy:– Claimofindividualstobeleftalone,freefromsurveillanceorinterferencefromotherindividuals,organizations,orstate;claimtobeabletocontrolinformationaboutyourself
• IntheUnitedStates,privacyprotectedby:– FirstAmendment(freedomofspeech)– FourthAmendment(unreasonablesearchandseizure)
– Additionalfederalstatues(e.g.,PrivacyActof1974)19Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
FairInformationPractices(FIP)• Setofprinciplesgoverningthecollectionanduseof
information– BasisofmostU.S.andEuropeanprivacylaws– Basedonmutualityofinterestbetweenrecordholderandindividual
– RestatedandextendedbyFTCin1998toprovideguidelinesforprotectingonlineprivacy
• Usedtodrivechangesinprivacylegislation– COPPA– Gramm-Leach-BlileyAct– HIPAA– Do-Not-TrackOnlineActof2011
20Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
FederalTradeCommission(FTC)FairInformationPractices(FIP)principles
1.Notice/awareness(coreprinciple)–Websitesmustdisclosepracticesbeforecollectingdata.
2.Choice/consent(coreprinciple)– Consumersmustbeabletochoosehowinformationisusedforsecondarypurposes.
3.Access/participation– Consumersmustbeabletoreviewandcontestaccuracyofpersonaldata.
21Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
FederalTradeCommission(FTC)FairInformationPractices(FIP)principles
4.Security– Datacollectorsmusttakestepstoensureaccuracy,securityofpersonaldata.
5.Enforcement–MustbemechanismtoenforceFIPprinciples.
22Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Internetchallengestoprivacy• Cookies– Identifybrowserandtrackvisitstosite– Supercookies(Flashcookies)
• Webbeacons(Webbugs)– Tinygraphicsembeddedine-mailsandWebpages– Monitorwhoisreadinge-mailmessageorvisitingsite
• Spyware– Surreptitiouslyinstalledonuser’scomputer– Maytransmituser’skeystrokesordisplayunwantedads
• Googleservicesandbehavioraltargeting23Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
HOWCOOKIESIDENTIFYWEBVISITORS
24Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
• TheUnitedStatesallowsbusinessestogathertransactioninformationandusethisforothermarketingpurposes.– Opt-outvs.opt-inmodel
• Onlineindustrypromotesself-regulationoverprivacylegislation.
• However,extentofresponsibilitytakenvaries:– Complex/ambiguousprivacystatements– Opt-outmodelsselectedoveropt-in– Online“seals”ofprivacyprinciples
25
Internetchallengestoprivacy
Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Technicalsolutionsforprivacy
• E-mailencryption• Anonymitytools• Anti-spywaretools• Browserfeatures– “Private”browsing– “Donottrack”options
• Overall,fewtechnicalsolutions
26Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Propertyrights:Intellectualproperty
• Intellectualproperty:intangiblepropertyofanykindcreatedbyindividualsorcorporations
• Threemainwaysthatintellectualpropertyisprotected:– Tradesecret: intellectualworkorproductbelongingtobusiness,notinthepublicdomain
– Copyright: statutorygrantprotectingintellectualpropertyfrombeingcopiedforthelifeoftheauthor,plus70years
– Patents: grantscreatorofinventionanexclusivemonopolyonideasbehindinventionfor20years
27Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Challengestointellectualpropertyrights
• Digitalmediadifferentfromphysicalmedia(e.g.,books)– Easeofreplication– Easeoftransmission(networks,Internet)– Difficultyinclassifyingsoftware– Compactness– Difficultiesinestablishinguniqueness
• DigitalMillenniumCopyrightAct(DMCA)–Makesitillegaltocircumventtechnology-basedprotectionsofcopyrightedmaterials
28Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Accountability,liability,control
• Computer-relatedliabilityproblems– Ifsoftwarefails,whoisresponsible?• Ifseenaspartofmachinethatinjuresorharms,softwareproducerandoperatormaybeliable.• Ifseenassimilartobook,difficulttoholdauthor/publisherresponsible.• Whatshouldliabilitybeifsoftwareseenasservice?Wouldthisbesimilartotelephonesystemsnotbeingliablefortransmittedmessages?
29Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Systemquality:Dataqualityandsystemerrors
• Whatisanacceptable,technologicallyfeasiblelevelofsystemquality?– Flawlesssoftwareiseconomicallyunfeasible.
• Threeprincipalsourcesofpoorsystemperformance:– Softwarebugs,errors– Hardwareorfacilityfailures– Poorinputdataquality(mostcommonsourceofbusinesssystemfailure)
30Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
Qualityoflife:Equity,access,boundaries
• Negativesocialconsequencesofsystems– Balancingpower:althoughcomputingpowerdecentralizing,keydecisionmakingremainscentralized
– Rapidityofchange:businessesmaynothaveenoughtimetorespondtoglobalcompetition
– Maintainingboundaries:computing,Internetuselengthenswork-day,infringesonfamily,personaltime
– Dependenceandvulnerability:publicandprivateorganizationsevermoredependentoncomputersystems
31Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
• Computercrimeandabuse– Computercrime:commissionofillegalactsthroughuseofcomputeroragainstacomputersystem—computermaybeobjectorinstrumentofcrime
– Computerabuse:unethicalacts,notillegal• Spam:highcostsforbusinessesindealingwithspam
• Employment:– Reengineeringworkresultinginlostjobs
• Equityandaccess—thedigitaldivide:– CertainethnicandincomegroupsintheUnitedStateslesslikelytohavecomputersorInternetaccess
32
Qualityoflife:Equity,access,boundaries
Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
• Healthrisks– Repetitivestressinjury(RSI)• Largestsourceiscomputerkeyboards• Carpaltunnelsyndrome(CTS)
– Computervisionsyndrome(CVS)• Eyestrainandheadachesrelatedtoscreenuse
– Technostress• Aggravation,impatience,fatigue
33
Qualityoflife:Equity,access,boundaries
Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
CaseStudy:AmazonandCloudComputing(Chap.5) (pp.234-236)
ShouldBusinessesMovetotheCloud?
1.Whatbusinessbenefitsdocloudcomputingservicesprovide?Whatproblemsdotheysolve?
2.Whatarethedisadvantagesofcloudcomputing?3.Howdotheconceptsofcapacityplanning,scalability,andTCOapplytothiscase?ApplytheseconceptsbothtoAmazonandtosubscribersofitsservices.
4.Whatkindsofbusinessesaremostlikelytobenefitfromusingcloudcomputing?Why?
34Source:KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
資訊管理專題(HotIssuesofInformationManagement)
35
1.請同學於資訊管理專題個案討論前應詳細研讀個案,並思考個案研究問題。
2.請同學於上課前複習相關資訊管理相關理論,以作為個案分析及擬定管理對策的依據。
3.請同學於上課前先繳交資訊管理專題個案研究問題書面報告。
4.上課時間地點:週四 7,8(14:10-16:00)B702
References– KennethC.Laudon&JaneP.Laudon(2014),ManagementInformationSystems:ManagingtheDigitalFirm,ThirteenthEdition,Pearson.
– KennethC.Laudon&JaneP.Laudon原著,游張松主編,陳文生翻譯 (2014),資訊管理系統,第13版,滄海
36
top related