privacy & ethics
TRANSCRIPT
![Page 1: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/1.jpg)
Privacy & EthicsChapter 9
![Page 2: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/2.jpg)
Bélanger, Van Slyke, Crossler © Prospect Press 2018 2
![Page 3: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/3.jpg)
What is your
definition of ethics?
Ethics – The principles and standards that guide our behavior toward other people
![Page 4: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/4.jpg)
INFORMATION ETHICS
• Govern the ethical and moral issues arising from the development and use of information technologies,
as well as the creation, collection, duplication, distribution of data
![Page 5: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/5.jpg)
INFORMATION ETHICS
• Business issues related to information ethics
• Intellectual property
• Copyright
• Pirated software
• Counterfeit software
• Digital rights management
![Page 6: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/6.jpg)
INFORMATION ETHICS
• Individual impact:
• Individuals copy, use , and distribute software
• Search organizational databases for sensitive and
personal information
• Individuals create and spread viruses
• Individuals hack into computer systems to steal
information
• Employees destroy and steal information
![Page 7: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/7.jpg)
Information Does Not Have Ethics,
People Do
• Information does not care how it is used, it
will not stop itself from sending spam,
viruses, or highly-sensitive information
• Tools to prevent information misuse
• Information governance
• Information compliance
![Page 8: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/8.jpg)
Ethical Computer Use Policy
•Contains general
principles to guide
computer user
behavior
![Page 9: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/9.jpg)
Acceptable Use Policy
• Acceptable use policy (AUP) – Requires a
user to agree to follow it to be provided access
to corporate email, information systems, and
the Internet
![Page 10: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/10.jpg)
Consequences of Privacy Violations:
Identity Theft
• Using someone else’s personal information for your own personal gain (Javelin Strategy & Research Center)
• 165 million identity theft victims in 2019 in the United States
• Low-tech methods for steHighest Group – 30 to 39 year old
• aling personal information are still popular
9-10
![Page 11: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/11.jpg)
Email Privacy Policy
• Organizations can mitigate the risks of email and
instant messaging communication tools by
implementing and adhering to an email privacy policy
• Email privacy policy – Details the extent to which
email messages may be read by others
![Page 12: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/12.jpg)
WORKPLACE MONITORING
POLICY
• Common monitoring technologies include:
• Key logger or key trapper software
• Hardware key logger
• Cookie
• Adware
• Spyware
• Web log
• Clickstream
![Page 13: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/13.jpg)
Decision Making
Chapter 6
13
![Page 14: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/14.jpg)
Various types of Information
Systems help with decision
making and problem solving
For many business school graduates the
first job will be problem solving jobs and
not necessarily management
![Page 15: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/15.jpg)
MAKING BUSINESS
DECISIONS
• Managerial decision-making challenges
• Analyze large amounts of information
• Apply sophisticated analysis techniques
• Make decisions quickly
![Page 16: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/16.jpg)
Types of DecisionsOperational control Managerial control Strategic planning
Structured Accounting systems
(accounts
payable/receivable),
order processing,
inventory control,
order processing
Human resources
reporting, short-
term forecasting
Investment analysis,
distribution system
analysis
Semi-structured Production planning Budget variance
analysis
Compensation
planning,
Unstructured Cash management,
project management
Budget preparation,
sales planning
New product
planning, social
responsibility
planning
6-16Table 6.1 – Gorry and Scott-Morton’s Information Systems Framework
![Page 17: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/17.jpg)
SUPPORT: ENHANCING
DECISION MAKING WITH MIS
Types of Decision Making MIS Systems
![Page 18: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/18.jpg)
Decision Support System generally
combine internal / external sources
Database
with
TPS
Data
Budget Data
Management
Information
System
External
Databases
Modeling
Techniques
User Input
Dialog
Decision Support System
Goal of DSS:
Solve a problem
![Page 19: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/19.jpg)
Modeling Techniques in DSS
Model Type Description Software
Financial Provide IRR on a project Spreadsheets
Statistical Trend projections Spreadsheets or
SPSS/SAS
Graphical Trends in a visual manner Spreadsheets or
Presentation Software
Project Management Time lines, critical paths MS Project or similar
![Page 20: Privacy & Ethics](https://reader030.vdocuments.net/reader030/viewer/2022013005/61ccd13b316c0e4601646739/html5/thumbnails/20.jpg)
DSS versus MIS
Factor DSS MIS
Problem Type Unstructured , cannot be
easily programmed,
preparations for a hurricane
Structured Problems
order quantity
Users College grads
Upper management
Operations / front line
College grads
Emphasis Making a decision Information Providing
Development Users are part of the
development
Provided by others