Understanding Ethical and Social Issues Related to Systems
In the past 10 years, we have witnessed, arguably, one of
the most ethically challenging periods for U.S. and global business. In today’s new legal environment, managers
who violate the law and are convicted will most likely spend time in prison. Ethics refers to the principles of
right and wrong that individuals, acting as free moral agents, use to make
choices to guide their behaviors. When using information systems, it is
essential to ask, “What is the ethical and socially responsible course of
actin?”
A Model for Thinking about Ethical, Social and Political
Issues
Ethical, social, and political issues are closely linked.
The ethical dilemma you may face as a manager of information systems typically
is reflected in social and political debate.
Five Moral Dimensions Of The Information Age
The major ethical, social, and political issues raised by
information systems include the following moral dimensions:
Information rights and obligations. What information rights do individuals and
organizations possess with respect to themselves? What can they protect?
Property rights and obligations. How will traditional intellectual property
rights be protected in a digital society in which tracing and accounting for
ownership are difficult and ignoring such property rights is so easy?
Accountability and control.
Who can and will be held accountable and liable for the harm done to
individual and collective information and property rights?
System quality. What
standards of data and system quality should we demand to protect individual
rights and the safety of society?
Quality of Life. What
values should be preserved in an information- and knowledge-based society?
Key Technology Trends that Raise Ethical Issues
Profiling – the use of computers to combine data from
multiple sources and create electronic dossiers of detailed information on
individuals.
Nonobvious relationship awareness (NORA) – a more powerful
profiling capabilities technology, can take information about people from many
disparate sources, such as employment applications, telephone records, customer
listings, and “wanted” lists, and correlated relationships to find obscure
hidden connections that might help identify criminals or terrorists.
Fig. Nonobvious relationship awareness (NORA)
Ethics In An Information Society
Basic Concepts: Responsibility, Accountability, and LiabilityEthical choices are decisions made by individuals who are responsible for the consequences of their actions. Responsibility is a key element and means that you accept the potential costs, duties, and obligations for the decisions you make. Accountability is a feature of systems and social institutions and means mechanisms are in place to determine who took responsible action, and who is responsible. Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. Due process is a related feature of law-governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.
Information Rights: Privacy And Freedom In The Internet Age
Privacy is the claim of individuals to be left alone, free from
surveillance or interference from other individuals or organizations, including
the state. Most American and European privacy law is based on a regime called
Fair Information Practices (FIP) first set forth in a report written in 1973 by
a federal government advisory committee (U.S. Department of Health, Education,
and Welfare, 1973).
The European Directive on Data Protection
In Europe, privacy protection is much more stringent than in the United
States. Unlike the United States, European countries do not allow businesses to
use personally identifiable information without consumers’ prior consent. Informed consent can be defined as
consent given with knowledge of all the facts needed to make a rational
decision.
Working with the European Commission, the U.S. Department of Commerce
developed a safe harbor framework for U.S. firms. A safe harbor is a private self-regulating policy and enforcement
mechanism that meets the objectives of government regulators and legislation
but does not involve government regulation or enforcement.
Internet Challenges to Privacy
Internet technology has posed new challenges for the protection of
individual privacy. Information sent over this vast network of networks may
pass through many different computer systems before it reaches its final
destination. Each of these systems is capable of monitoring, capturing, and
storing communications that pass through it.
Cookies are small text files deposited on a computer hard drive when a
user visits to the web sites. Cookies identify the visitor’s web browser
software and track visits to the website. Web beacons, also called web bugs,
are tiny objects invisibly embedded in e-mail messages and Web pages that are
designed to monitor the behavior of the user visiting a web site or sending
e-mail. Spyware can secretly install itself on an Internet user’s computer by
piggybacking on larger applications. Once installed, the spyware calls out to
Web sites to send banner ads and other unsolicited material to the user, and it
can also report the user’s movements on the Internet to other computers.
Property Rights: Intellectual Property
Intellectual property is considered to be intangible property created
by individuals or corporations. Information technology has made it difficult to
protect intellectual property because computerized information can be so easily
copied or distributed on networks. Intellectual property is subject to a variety
of protections under three different legal traditions: trade secrets,
copyright, and patent law.
Trade Secrets
Any intellectual work product – a formula, device, pattern, or
compilation of data-used for a business purpose can be classified as a trade
secret, provided it is not based on information in the public domain.
Copyright
Copyright is a statutory grant that protects creators of intellectual
property from having their work copied by others for any purpose during the
life of the author plus an additional 70 years after the author’s death.A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. The congressional intent behind patent law was to ensure that inventors of new machines, devices, or methods receive the full financial and other rewards of their labor and yet make widespread use of the invention possible by providing detailed diagrams for those wishing to use the idea under license from the patent’s owner.
System Quality: Data Quality and System Errors
Three principle sources of poor system performance are (1) software
bugs and errors (2) hardware or facility failures caused by natural or other
causes and (3) poor input data quality. The software industry has not yet
arrived at testing standards for producing software of acceptable but not
perfect performance.
Quality of Life: Equity, Access, and Boundaries
Balancing Power: Center Versus Periphery
Lower level employees many be empowered to make minor decisions but the
key policy decisions may be as centralized as in the past.
Rapidity of Change: Reduced Response Time to Competition
Information systems have helped to create much more efficient national
and international market. The now-more-efficient global marketplace has reduced
the normal social buffers that permitted businesses many years to adjust to
competiton. We stand the risk of developing a “just-in-time society” with
“just-in-time jobs” and “just-in-time” workplaces, families, and vacations.
Maintaining Boundaries: Family, Work, and Leisure
The danger to ubiquitous computing, telecommuting, nomad computing, and
the “do anything anywhere” computing environment is that it is actually coming
true. The traditional boundaries that separate work from family and just plain
leisure have been weakened. The work umbrella now extends far beyond the
eight-hour day.
Dependence and Vulnerability
Today our businesses, governments, schools, and private associations,
such as churches are incredibly dependent on information systems and are,
therefore, highly vulnerable if these systems fail. The absence of standards
and the criticality of some system applications will probably call forth
demands for national standards and perhaps regulatory oversight.
Computer Crime and Abuse
New technologies, including computers, create new opportunities for
committing crimes by creating new valuable items to steal, new way to steal
them, and new ways to harm others. Computer
crime is the commission illegal acts through the use of a computer or
against a computer system. Simply accessing a computer system without
authorization or with intent to do harm, even by accident, is now a federal
crime.
Computer abuse is the
commission of acts involving a computer that may not illegal but that are
considered unethical. The popularity of the Internet and e-mail has turned one
form of computer abuse – spamming – into a serious problem for both individuals
and businesses. Spam is junk e-mail
sent by an organization or individual to a mass audience of Internet users who
have expressed no interest in the product or service being marketed.
Employment: Trickle-Down Technology and Reengineering Job Loss
Reengineering work is typically hailed in the information systems
community as a major benefit of new information technology. It is much less
frequently noted that redesigning business processes could potentially cause
millions of mid-level managers and clerical workers to lose their jobs. One
economist has raised the possibility that we will create a society run by a
small “high tech elite of corporate professionals…in a nation of permanently
unemployed” (Rifkin, 1993). Careful
planning and sensitivity to employee needs can help companies redesign work to
minimize job losses.
Several studies have found that certain ethnic and income groups in the
United States are less likely to have computers or online Internet access even
though computer ownership and Internet access have soared in the past five
years. A similar digital divide exists in U.S. schools, with schools in
high-poverty areas less likely to have computers, high-quality educational
technology programs, or internet access availability for their students. Public
interest groups want to narrow this digital divide by making digital
information services – including the Internet – available to virtually
everyone, just as basic telephone service is now.
The most common occupational disease today is repetitive stress injury
(RSI). RSI occurs when muscle groups are forced through repetitive actions
often with high-impact loads (such as tennis) or tens of thousands of
repetitions under low-impact loads (such as working at a computer keyboard).
The single largest source of RSI is computer keyboards. The most common
kind of computer-related RSI is carpal tunnel syndrome (CTS), in which pressure
on the median nerve through the wrist’s bony structure, called a carpal tunnel,
produces pain. Millions of workers have been diagnosed with carpal tunnel
syndrome. Computer vision syndrome (CVS) refers to any eyestrain condition
related to display screen use in desktop computers, laptops, e-readers,
smart-phones, and hand-held video games. Its symptoms, which are usually
temporary, include headaches, blurred vision, and dry and irritated eyes.
The newest computer-related malady is technostress, which is stress
induced by computer use. Its symptoms include aggravation, hostility toward
humans, impatience, and fatigue. Technostress is thought to be related to high
levels of job turnover in the computer industry, high levels of early
retirement from computer-intense occupations, and elevated levels of drug and
alcohol abuse.
Technology can be a double-edged sword. It can be the source of many benefits
but it can also create new opportunities for invading your privacy, and
enabling the reckless use of that information in a variety of decisions about
you. The computer has become a part of our lives – personally as well as
socially, culturally, and politically. It is unlikely that the issues and our
choices will become easier as information technology continues to transform our
world. The growth of the Internet and the information economy suggests that all
the ethical and social issues we have described will be heightened further as
we move into the first digital century.
Here is the original source: http://vivauniversity.files.wordpress.com/2013/08/ugbswkd609session4.pdf
ReplyDeleteGood sharing, MIS Jobs or management information systems job is currently one of the in-demand career according to Forbes magazine with good salary range. These professionals analyze technology and industry trends to determine organizational objectives, and then develop strategic plans to meet goals. Below link do have more info on MIS Salary and MIS career paths:
Deletehttp://kidbuxblog.com/mis-jobs-description-major-duties-and-salary/
what are the sources of information for this document
Deletethank u for this. it helps me a lot. :)
ReplyDeletethanx
ReplyDeleteThnx a lot
ReplyDeleteGet information on most popular websites from the reliable portal of ebusiness information guide.
ReplyDeletethank u so much.. it help me to create my assignment.
ReplyDeleteI am happy to find this post Very useful for me, as it contains lot of information. I Always prefer to read The Quality and glad I found this thing in you post. Thanks
ReplyDeleteGhana passport online
Nice blog..! I really loved reading through this article. Thanks for sharing such a amazing post with us and keep blogging..
ReplyDeleteProperty Management Services in India
property management Bangalore
Thanks for sharing the information and keep on updating us regularly.
ReplyDeleteProperty Value | Property Valuation | My Property Value
thanks.
ReplyDeleteWe are one of the best rental property management in Vaughan. so visit ace living
ReplyDeletethank u sir
ReplyDeletethank u soo much
ReplyDeleteit's a wonderful description of ethical, social and political concerns about the information system. but try to explain the issues by each item (social, political and ethical).
ReplyDeleteTHANKS FOR SHARING SUCH A AMAZING CONTENT
ReplyDeleteGREAT PIECE OF WORK!!!
REALLY APPRECIATE YOUR WORK!!!
wireless network solutions in dubai
THANKS FOR SHARING SUCH A GREAT WORK
ReplyDeleteinfrastructure solutions services
Thanks for sharing information
ReplyDeleteEverything in marketing should be measured. You should periodically measure and analyse your social marketing performance and produce reports to your clients to demonstrate your value. tiktok
ReplyDeleteThe Travel Cloud Suite's flight search engine streamlines your airline booking process, boosting income. It is made for online travel firms to make it simple for users to book flights, allowing them to search and do so immediately. Users can choose their favorite seat and be informed as the booking progresses.
ReplyDelete