Essentials of Management Information Systems PDF
Document Details
Uploaded by AstoundedIslamicArt2039
UAEU
Kenneth C. Laudon and Jane P. Laudon
Tags
Related
- Management Information Systems Managing The Digital Firm PDF
- Management Information Systems Managing the Digital Firm PDF
- Management information systems managing the digital firm (Jane Price Laudon Kenneth C. Laudon) (Z-Library) - Copy (1) (9).pdf
- DAMA重点.pdf
- Sesión 11 Guión de Presentación Sesión Sincrónica 2024 PDF
- Principles Of Marketing PowerPoint Presentation PDF
Summary
This is a chapter on ethical and social issues in management information systems, from a textbook entitled "Essentials of Management Information Systems". It discusses topics such as privacy, intellectual property, and the responsibility, accountability and liability associated with information systems.
Full Transcript
Essentials of Management Information Systems Fourteenth Edition, Global Edition Chapter 4 Ethical and Social Issues in Information Systems Copyr...
Essentials of Management Information Systems Fourteenth Edition, Global Edition Chapter 4 Ethical and Social Issues in Information Systems Copyright © 2020 Pearson Education Ltd. Learning Objectives 4.1 What ethical, social, and political issues are raised by information systems? 4.2 Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? 4.3 How have information systems affected laws for establishing accountability, liability, and the quality of everyday life? 4.4 What is privacy and what are examples of privacy? What are fundamental components of privacy? Copyright © 2019 Pearson Education Ltd. The Dark Side of Big Data (1 of 2) Problem – Opportunities from new technology – Undeveloped legal environment Solutions – Develop big data strategy – Develop privacy policies – Develop big data predictive models – Develop big data mining technology – Develop big data analytics tools and predictive modeling systems Copyright © 2019 Pearson Education Ltd. The Dark Side of Big Data (2 of 2) Organizations like Progressive and Deloitte Consulting L LP use predictive modeling to identify individual customers that fit risk or vulnerability profiles Demonstrates how technological innovations can be a double-edged sword Illustrates the ability of IT systems to support decision making Copyright © 2019 Pearson Education Ltd. Ethics Ethics – Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors Copyright © 2019 Pearson Education Ltd. Ethical Analysis Five-step process for ethical analysis 1. Identify and clearly describe the facts. 2. Define the conflict or dilemma and identify the higher- order values involved. 3. Identify the stakeholders. 4. Identify the options that you can reasonably take. 5. Identify the potential consequences of your options. Copyright © 2019 Pearson Education Ltd. What Ethical, Social, and Political Issues are Raised by Information Systems? Information systems raise new ethical questions because they create opportunities for: – Intense social change, threatening existing distributions of power, money, rights, and obligations – New kinds of crime, ex. ransomware Copyright © 2019 Pearson Education Ltd. Basic Concepts: Responsibility, Accountability, and Liability Responsibility – Accepting the potential costs, duties, and obligations for decisions Accountability – Mechanisms for identifying responsible parties Liability legal enforcement – Permits individuals (and firms) to recover damages done to them Due process – Laws are well-known and understood, with an ability to appeal to higher authorities Copyright © 2019 Pearson Education Ltd. Information Rights: Privacy and Freedom in the Internet Age (1 of 3) Privacy – Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself In the United States, privacy protected by: – First Amendment (freedom of speech and association) – Fourth Amendment (unreasonable search and seizure) – Additional federal statues (e.g., Privacy Act of 1974) Copyright © 2019 Pearson Education Ltd. Keys to Trust Assurance: I know exactly how my data is going to be used. Commitment: The company doesn’t pass my data on to any third parties. Choice: I can control exactly which pieces of information I share and don’t share. Value: I have a clear understanding of how giving up my data will benefit me, i.e. what’s in it for me. 10 Copyright © 2019 Pearson Education Ltd. Internet Challenges to Privacy (1 of 2) Cookies – Identify browser and track visits to site – Super cookies (Flash cookies) Web beacons (web bugs) – Tiny graphics embedded in emails and web pages – Monitor who is reading email message or visiting site Spyware – Surreptitiously installed on user’s computer – May transmit user’s keystrokes or display unwanted ads Google services and behavioral targeting Copyright © 2019 Pearson Education Ltd. Internet Challenges to Privacy (2 of 2) The United States allows businesses to gather transaction information and use this for other marketing purposes. Opt-out v s. opt-in model ersu Online industry promotes self-regulation over privacy legislation. – Complex/ambiguous privacy statements – Opt-out models selected over opt-in – Online “seals” of privacy principles Copyright © 2019 Pearson Education Ltd. Technical Solutions Solutions include: – Email encryption – Anonymity tools – Anti-spyware tools Overall, technical solutions have failed to protect users from being tracked from one site to another – Browser features ▪ “Private” browsing ▪ “Do not track” options Copyright © 2019 Pearson Education Ltd. Property Rights: Intellectual Property Intellectual property – Tangible and intangible products of the mind created by individuals or corporations Protected in four main ways: – Copyright – Patents – Trademarks – Trade secret Copyright © 2019 Pearson Education Ltd. Copyright Protects original forms of expression (not ideas) from being copied by others for a period of time Fair use doctrine Digital Millennium Copyright Act of 1998 – First major effort to adjust copyright laws to Internet age – Implements WIPO treaty that makes it illegal to make, distribute, or use devices that circumvent technology- based protections of copyrighted materials – Safe-harbor provisions Copyright © 2019 Pearson Education Ltd. Copyright © 2020 Pearson Education Ltd. All Rights Reserved Patents Grant owner 20-year monopoly on ideas behind an invention Invention must be new, non-obvious, novel Encourages inventors Promotes dissemination of new techniques through licensing Stifles competition by raising barriers to entry Copyright © 2019 Pearson Education Ltd. Copyright © 2020 Pearson Education Ltd. All Rights Reserved Trademarks Identify, distinguish goods, and indicate their source Purpose – Ensure consumer gets what is paid for/expected to receive – Protect owner against piracy and misappropriation Infringement Dilution – Federal Trademark Dilution Act and Trademark Dilution Revision Act Uniform Rapid Suspension System (URS) Copyright © 2019 Pearson Education Ltd. Copyright © 2020 Pearson Education Ltd. All Rights Reserved Trade Secrets Business procedures, formulas, methods of manufacture and service delivery May not be unique or novel Trade secrets are – (a) secret – (b) have commercial value to owner – (c) owner has taken steps to protect 2016 Defend Trade Secrets Act Copyright © 2019 Pearson Education Ltd. Copyright © 2020 Pearson Education Ltd. All Rights Reserved Challenges to Intellectual Property Rights Digital media different from physical media – Ease of replication – Ease of transmission (networks, Internet) – Ease of alteration – Compactness – Difficulties in establishing uniqueness Digital Millennium Copyright Act (DMCA) Copyright © 2019 Pearson Education Ltd.