social & ethical issues in information systems

23
15. 15.1 © 2002 by Prentice Hall c h a p t e r 15 ETHICAL & SOCIAL ETHICAL & SOCIAL IMPACT OF IMPACT OF INFORMATION INFORMATION SYSTEMS SYSTEMS

Upload: university-of-educationlahore

Post on 16-Jul-2015

623 views

Category:

Education


1 download

TRANSCRIPT

15.15.11 © 2002 by Prentice Hall

c h a p t e r

15ETHICAL & SOCIAL ETHICAL & SOCIAL

IMPACT OF IMPACT OF INFORMATION INFORMATION

SYSTEMSSYSTEMS

15.15.22 © 2002 by Prentice Hall

LEARNING OBJECTIVESLEARNING OBJECTIVES

• ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES ANALYZE ETHICAL, SOCIAL, POLITICAL ISSUES RAISED BY INFORMATION SYSTEMSRAISED BY INFORMATION SYSTEMS

• IDENTIFY, APPLY MORAL DIMENSIONS OF IDENTIFY, APPLY MORAL DIMENSIONS OF INFORMATION SOCIETYINFORMATION SOCIETY

15.15.33 © 2002 by Prentice Hall

LEARNING OBJECTIVESLEARNING OBJECTIVES

• APPLY ETHICAL ANALYSISAPPLY ETHICAL ANALYSIS

• EXAMINE ETHICAL PRINCIPLES EXAMINE ETHICAL PRINCIPLES FOR CONDUCTFOR CONDUCT

• DESIGN CORPORATE POLICIES DESIGN CORPORATE POLICIES FOR ETHICAL CONDUCTFOR ETHICAL CONDUCT

15.15.44 © 2002 by Prentice Hall

MANAGEMENT CHALLENGESMANAGEMENT CHALLENGES

• UNDERSTAND ETHICAL & SOCIAL UNDERSTAND ETHICAL & SOCIAL ISSUES RELATED TO SYSTEMSISSUES RELATED TO SYSTEMS

• ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY

• MORAL DIMENSION OF MORAL DIMENSION OF INFORMATION SYSTEMSINFORMATION SYSTEMS

**

15.15.55 © 2002 by Prentice Hall

ETHICSETHICS

PRINCIPLES OF RIGHT AND WRONGPRINCIPLES OF RIGHT AND WRONG

USED BY INDIVIDUALSUSED BY INDIVIDUALS

AS FREE MORAL AGENTSAS FREE MORAL AGENTS

TO GUIDE BEHAVIORTO GUIDE BEHAVIOR

**

15.15.66 © 2002 by Prentice Hall

INDIVIDUAL

SOCIETY

POLITY

ETHICAL ISSUES

SOCIAL ISSUES

POLITICAL ISSUES

QUALITY OF LIFEQUALITY OF LIFE

INFORMATION INFORMATION RIGHTS & RIGHTS & OBLIGATIONSOBLIGATIONS

PROPERTY PROPERTY RIGHTS & RIGHTS & OBLIGATIONSOBLIGATIONS

ACCOUNTABILITY ACCOUNTABILITY & CONTROL& CONTROL

SYSTEM SYSTEM QUALITYQUALITY

ETHICAL, SOCIAL & POLITICAL ISSUESETHICAL, SOCIAL & POLITICAL ISSUES

INFORMATION INFORMATION & &

TECHNOLOGYTECHNOLOGY

15.15.77 © 2002 by Prentice Hall

• INFORMATION RIGHTS & OBLIGATIONSINFORMATION RIGHTS & OBLIGATIONS• PROPERTY RIGHTSPROPERTY RIGHTS• ACCOUNTABILITY & CONTROLACCOUNTABILITY & CONTROL

• SYSTEM QUALITYSYSTEM QUALITY

• QUALITY OF LIFEQUALITY OF LIFE

**

MORAL DIMENSIONS OF THE MORAL DIMENSIONS OF THE INFORMATION AGEINFORMATION AGE

15.15.88 © 2002 by Prentice Hall

TECHNOLOGY TRENDS & ETHICAL TECHNOLOGY TRENDS & ETHICAL ISSUESISSUES

• COMPUTING POWER DOUBLES EVERY 18 COMPUTING POWER DOUBLES EVERY 18 MONTHSMONTHS

• DECLINING COSTS OF DATA STORAGEDECLINING COSTS OF DATA STORAGE• DATA MINING ADVANCES DATA MINING ADVANCES • NETWORKING ADVANCES & INTERNETNETWORKING ADVANCES & INTERNET

**

15.15.99 © 2002 by Prentice Hall

ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY

• RESPONSIBILITY:RESPONSIBILITY: Accepting costs, Accepting costs, duties, obligations for decisionsduties, obligations for decisions

• ACCOUNTABILITY:ACCOUNTABILITY: Assessing Assessing responsibilities for decisions & actionsresponsibilities for decisions & actions

• LIABILITY:LIABILITY: Must pay for legal damages Must pay for legal damages• DUE PROCESS:DUE PROCESS: Insures laws are applied Insures laws are applied

properlyproperly

**

15.15.1010 © 2002 by Prentice Hall

ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY

ETHICAL ANALYSIS:ETHICAL ANALYSIS:• IDENTIFY, DESCRIBE FACTSIDENTIFY, DESCRIBE FACTS

• DEFINE CONFLICT, IDENTIFY VALUESDEFINE CONFLICT, IDENTIFY VALUES• IDENTIFY STAKEHOLDERSIDENTIFY STAKEHOLDERS• IDENTIFY OPTIONSIDENTIFY OPTIONS• IDENTIFY POTENTIAL CONSEQUENCESIDENTIFY POTENTIAL CONSEQUENCES

**

15.15.1111 © 2002 by Prentice Hall

ETHICAL PRINCIPLES:ETHICAL PRINCIPLES:• TREAT OTHERS AS YOU WANT TO BE TREATEDTREAT OTHERS AS YOU WANT TO BE TREATED• IF ACTION NOT RIGHT FOR EVERYONE, NOT IF ACTION NOT RIGHT FOR EVERYONE, NOT

RIGHT FOR ANYONE (KANT)RIGHT FOR ANYONE (KANT)

• IF ACTION NOT REPEATABLE, NOT RIGHT AT IF ACTION NOT REPEATABLE, NOT RIGHT AT ANY TIME (DESCARTES)ANY TIME (DESCARTES)

• PUT VALUE ON OUTCOMES, UNDERSTAND PUT VALUE ON OUTCOMES, UNDERSTAND CONSEQUENCESCONSEQUENCES

• INCUR LEAST HARM OR COSTINCUR LEAST HARM OR COST• NO FREE LUNCHNO FREE LUNCH

**

ETHICS IN AN INFORMATION ETHICS IN AN INFORMATION SOCIETYSOCIETY

15.15.1212 © 2002 by Prentice Hall

INFORMATION RIGHTSINFORMATION RIGHTS

PRIVACY:PRIVACY: Right to be left alone Right to be left alone

FAIR INFORMATION PRACTICESFAIR INFORMATION PRACTICES (FIP)(FIP)::• NO SECRET PERSONAL RECORDSNO SECRET PERSONAL RECORDS• INDIVIDUALS CAN ACCESS, AMEND INDIVIDUALS CAN ACCESS, AMEND

INFORMATION ABOUT THEMINFORMATION ABOUT THEM• USE INFO ONLY WITH PRIOR CONSENTUSE INFO ONLY WITH PRIOR CONSENT

• MANAGERS ACCOUNTABLE FOR MANAGERS ACCOUNTABLE FOR DAMAGE DONE BY SYSTEMSDAMAGE DONE BY SYSTEMS

• GOVERNMENTS CAN INTERVENEGOVERNMENTS CAN INTERVENE

**

15.15.1313 © 2002 by Prentice Hall

U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS

GENERAL FEDERAL PRIVACY LAWS:GENERAL FEDERAL PRIVACY LAWS:

FREEDOM OF INFORMATION ACT, 1968FREEDOM OF INFORMATION ACT, 1968

PRIVACY ACT OF 1974PRIVACY ACT OF 1974

ELECTRONIC COMMUNICATIONS PRIVACY ACT OF ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 19861986

COMPUTER MATCHING AND PRIVACY COMPUTER MATCHING AND PRIVACY PROTECTION ACT OF 1988PROTECTION ACT OF 1988

COMPUTER SECURITY ACT OF 1987COMPUTER SECURITY ACT OF 1987

FEDERAL MANAGERS FINANCIAL INTEGRITY ACT FEDERAL MANAGERS FINANCIAL INTEGRITY ACT OF 1982OF 1982

**

15.15.1414 © 2002 by Prentice Hall

PRIVACY LAWS AFFECTING PRIVATE PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS:INSTITUTIONS:

FAIR CREDIT REPORTING ACT, 1970FAIR CREDIT REPORTING ACT, 1970

FAMILY EDUCATION RIGHTS & PRIVACY ACT OF FAMILY EDUCATION RIGHTS & PRIVACY ACT OF 19781978

RIGHT TO FINANCIAL PRIVACY ACT OF 1978RIGHT TO FINANCIAL PRIVACY ACT OF 1978

PRIVACY PROTECTION ACT OF 1980PRIVACY PROTECTION ACT OF 1980

CABLE COMMUNICATIONS POLICY ACT OF 1984CABLE COMMUNICATIONS POLICY ACT OF 1984

ELECTRONIC COMMUNICATIONS PRIVACY ACT OF ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 19971997

**

U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS

15.15.1515 © 2002 by Prentice Hall

MORE PRIVACY LAWS AFFECTING PRIVATE MORE PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS:INSTITUTIONS:

VIDEO PRIVACY PROTECTION ACT OF 1988VIDEO PRIVACY PROTECTION ACT OF 1988

CONSUMER INTERNET PRIVACY PROTECTION CONSUMER INTERNET PRIVACY PROTECTION ACT OF 1997ACT OF 1997

COMMUNICATIONS PRIVACY & CONSUMER COMMUNICATIONS PRIVACY & CONSUMER EMPOWERMENT ACT OF 1997EMPOWERMENT ACT OF 1997

DATA PRIVACY ACT OF 1997DATA PRIVACY ACT OF 1997

CONSUMER INTERNET PRIVACY PROTECTION CONSUMER INTERNET PRIVACY PROTECTION ACT OF 1999ACT OF 1999

**

U.S. FEDERAL PRIVACY LAWSU.S. FEDERAL PRIVACY LAWS

15.15.1616 © 2002 by Prentice Hall

ETHICAL ISSUES:ETHICAL ISSUES: Who is morally Who is morally responsible for consequences of responsible for consequences of use?use?

SOCIAL ISSUES:SOCIAL ISSUES: What should society What should society expect and allow?expect and allow?

POLITICAL ISSUES:POLITICAL ISSUES: To what extent To what extent should government intervene, should government intervene, protect?protect?

**

ACCOUNTABILITY, LIABILITY & ACCOUNTABILITY, LIABILITY & CONTROLCONTROL

15.15.1717 © 2002 by Prentice Hall

INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY

INTELLECTUAL PROPERTY:INTELLECTUAL PROPERTY: Intangible Intangible creations protected by lawcreations protected by law

TRADE SECRET:TRADE SECRET: Intellectual work or Intellectual work or product belonging to business, not in product belonging to business, not in public domainpublic domain

COPYRIGHT:COPYRIGHT: Statutory grant protecting Statutory grant protecting intellectual property from copying by intellectual property from copying by others for 28 yearsothers for 28 years

**

15.15.1818 © 2002 by Prentice Hall

INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY

TRADE MARK:TRADE MARK: Legally registered mark, Legally registered mark, device, or name to distinguish one’s device, or name to distinguish one’s goodsgoods

PATENT:PATENT: Legal document granting owner Legal document granting owner exclusive monopoly on an invention for 17 exclusive monopoly on an invention for 17 yearsyears

**

15.15.1919 © 2002 by Prentice Hall

ETHICAL ISSUES:ETHICAL ISSUES: When is software or When is software or service ready for release?service ready for release?

SOCIAL ISSUES:SOCIAL ISSUES: Can people trust quality of Can people trust quality of software, services, data?software, services, data?

POLITICAL ISSUES:POLITICAL ISSUES: Should congress or Should congress or industry develop standards for software, industry develop standards for software, hardware, data quality?hardware, data quality?

**

SYSTEM QUALITY: SYSTEM QUALITY: DATA QUALITY & DATA QUALITY & SYSTEM ERRORSSYSTEM ERRORS

15.15.2020 © 2002 by Prentice Hall

QUALITY OF LIFEQUALITY OF LIFE

CENTRALIZATION VS. DECENTRALIZATIONCENTRALIZATION VS. DECENTRALIZATION

RAPID CHANGE:RAPID CHANGE: Reduced response time to Reduced response time to competitioncompetition

MAINTAINING BOUNDARIES:MAINTAINING BOUNDARIES: Family, work, Family, work, leisureleisure

DEPENDENCE AND VULNERABILITYDEPENDENCE AND VULNERABILITY

COMPUTER CRIME & ABUSECOMPUTER CRIME & ABUSE

**

15.15.2121 © 2002 by Prentice Hall

QUALITY OF LIFEQUALITY OF LIFE

EMPLOYMENT:EMPLOYMENT: Trickle-down Trickle-down technology; reengineering job losstechnology; reengineering job loss

EQUITY & ACCESS:EQUITY & ACCESS: Increasing racial Increasing racial & social class cleavages& social class cleavages

HEALTH RISKSHEALTH RISKS **

15.15.2222 © 2002 by Prentice Hall

QUALITY OF LIFEQUALITY OF LIFE

HEALTH RISKS:HEALTH RISKS: • REPETITIVE STRESS INJURY (RSI)REPETITIVE STRESS INJURY (RSI)• CARPAL TUNNEL SYNDROME (CTS)CARPAL TUNNEL SYNDROME (CTS)• COMPUTER VISION SYNDROME (CVS)COMPUTER VISION SYNDROME (CVS)• TECHNOSTRESS: Irritation, hostility, TECHNOSTRESS: Irritation, hostility,

impatience, enervation, fearimpatience, enervation, fear

• VDT RADIATIONVDT RADIATION**

15.15.2323 © 2002 by Prentice Hall

INTERNET CRIME & ABUSEINTERNET CRIME & ABUSE

• HACKING:HACKING: Access to proprietary data Access to proprietary data• JAMMING:JAMMING: Tie up host computer Tie up host computer

• MALICIOUS SOFTWARE:MALICIOUS SOFTWARE: Viruses disable Viruses disable computercomputer

• SNIFFING:SNIFFING: Intercept data passing through Intercept data passing through system, e.g. credit card datasystem, e.g. credit card data

• SPOOFING:SPOOFING: Fraudulent misrepresentation Fraudulent misrepresentation

**